Monitor vulnerabilities that affect your stack. Sign up free to get alerts when software you use is affected.

CVE Vulnerabilities - 14 April 2026

RSS

761 vulnerabilities published on 14 April 2026

Severity:
Windows TDI Translation Driver Privilege Elevation Vulnerability
CVE-2026-27908
An attacker with local access can exploit a weakness in Windows TDI Translation Driver to gain administrator-level control over a system. This could allow the attacker to install malware, change syste...
7.0
Windows Ancillary Function Driver for WinSock Privilege Escalation
CVE-2026-26182
An issue in the Windows Ancillary Function Driver for WinSock could allow a local attacker to access sensitive data or take control of the system. This driver is used in Windows networks, so affected ...
7.0
Windows Ancillary Function Driver for WinSock Privilege Escalation
CVE-2026-26177
The Windows Ancillary Function Driver for WinSock has a bug that allows a malicious user with administrative rights to potentially gain even higher-level access to the system. This means an attacker c...
7.0
Windows Server Update Service Privilege Escalation Risk
CVE-2026-26174
A bug in Windows Server Update Service could let an authorized user gain extra privileges on the system. This is a concern because it could allow an attacker to take control of your server. To protect...
7.0
Windows Ancillary Function Driver for WinSock Allows Privilege Escalation
CVE-2026-26173
An issue in the Windows Ancillary Function Driver for WinSock could allow a malicious user to gain more access to a Windows system than they should. This is a security concern because it could be expl...
7.0
Windows Shell Privilege Elevation Vulnerability
CVE-2026-26166
An attacker with authorized access to Windows Shell can potentially gain elevated privileges on a local machine. This means they could gain control over the system or access sensitive information. To ...
7.0
Windows Shell Privilege Escalation Vulnerability
CVE-2026-26165
A security flaw in Windows Shell could let a malicious user gain more access to a computer than they should have. This could happen if an attacker knows how to exploit the issue. To protect your syste...
7.0
Windows Cryptographic Services stores sensitive data insecurely
CVE-2026-26152
Sensitive information in Windows Cryptographic Services is not properly secured, potentially allowing authorized attackers to escalate their privileges locally. This could lead to unauthorized access ...
7.0
Windows AppLocker Driver Allows Local Privilege Escalation
CVE-2026-25184
An attacker with administrative access can exploit a flaw in the Windows AppLocker Driver to gain elevated privileges on a local machine, potentially allowing them to access or modify sensitive data. ...
7.0
ImageMagick: Overflows when Processing Large Image Files
GHSA-98cp-rj9f-6v5g
A security issue in ImageMagick can cause it to crash or behave unexpectedly when processing certain types of image files. This can allow an attacker to potentially disrupt service or execute code. Up...
6.9
AVideo CloneSite allows attackers to delete arbitrary files
GHSA-5879-4fmr-xwf2
AVideo's CloneSite feature has a bug that lets attackers delete files they shouldn't be able to. This is a problem because sensitive data could be deleted or overwritten. To fix this, update to the la...
6.9
XWiki REST APIs can list all pages, causing performance issues
GHSA-mrqg-xmgm-rc5g CVE-2026-40104
Large wikis using XWiki's REST APIs may experience performance issues due to excessive resource usage. This can happen when a malicious user requests a list of all pages. To fix this, update to XWiki ...
6.9
Serendipity allows attackers to steal user sessions
GHSA-4m6c-649p-f6gf CVE-2026-39963
Serendipity's authentication cookies can be set to target an attacker's website, allowing them to hijack user sessions. This happens when an attacker controls the 'Host' header during login, which can...
6.9
Free5GC UDR Service Allows Unintended Subscription Updates
GHSA-gx38-8h33-pmxr CVE-2026-40249
A flaw in the Free5GC UDR service allows unauthorized updates to Policy Data notification subscriptions if the service receives invalid or incomplete input. This could lead to unintended modifications...
6.9
NetApp FlashArray Purity: Inconsistent Snapshot Retention
CVE-2026-0209
This issue affects NetApp's FlashArray Purity software, which may not follow the intended snapshot retention schedule. This could lead to unexpected data loss or retention. Affected administrators sho...
6.9
Router's Hard-Coded Password Allows Unauthenticated Access
CVE-2026-4832
A password for a router's SNMP (Simple Network Management Protocol) feature is hardcoded, allowing anyone to access sensitive information without needing a password. This could lead to unauthorized ac...
6.9
Unsecured Log Output on Apache Struts Allows Log Injection
CVE-2026-2404
Apache Struts contains a security issue that allows attackers to manipulate log entries by altering a specific request. This could potentially lead to false or misleading information in the logs. To p...
6.9
Unlimited Login Attempts Can Allow Hackers to Access User Accounts
CVE-2026-2402
An issue with a Microsoft Exchange Server or related product allows an attacker to keep trying different passwords until they guess correctly. This could let a hacker access a user's account. To fix t...
6.9
Critical Files Overwritten with Malicious Input in Web Admin Tool
CVE-2026-2399
A weakness in a popular web admin tool could allow an attacker to overwrite critical files by sending malicious input in a specific request. This could lead to data loss or system compromise. Update t...
6.9
Keycloak Login Page Allows Remote Code Execution
CVE-2026-37980
A critical flaw in the Keycloak login page for organization selection can allow a hacker with administrative privileges to inject malicious code into a user's browser, potentially leading to stolen se...
6.9
MaxKB AI Assistant: Malicious Code Can Run in Other Users' Browsers
CVE-2026-39423
MaxKB's chat interface in versions 2.7.1 and below can let attackers inject malicious code into other users' browsers, including admins. This can lead to stolen data or compromised accounts. Update to...
6.9
MaxKB AI Assistant: Malicious JavaScript Can Be Injected
CVE-2026-39422
Versions of MaxKB AI Assistant 2.7.1 and below are vulnerable to a security flaw that allows attackers to inject malicious JavaScript code into the application's chat interface. This could potentially...
6.9
follow-redirects leaks Custom Authentication Headers to Cross-Domain Redirect Targets
GHSA-r4q5-vmmm-2653
## Summary When an HTTP request follows a cross-domain redirect (301/302/307/308), `follow-redirects` only strips `authorization`, `proxy-authorization`, and `cookie` headers (matched by regex at ind...
6.9
GraphQL-php: Repeated Fields Can Cause Slowing or Crashing Queries
GHSA-68jq-c3rv-pcrr
A specially crafted GraphQL query with many repeated fields can cause the graphql-php library to use excessive CPU resources, potentially leading to slow or crashed queries. This issue affects GraphQL...
6.9
Windows USB Print Driver Allows Physical Attack Privilege Escalation
CVE-2026-32223
A flaw in the Windows USB Print Driver can be exploited by an attacker with physical access to the system, allowing them to potentially gain elevated privileges. This means a malicious person could ga...
6.8