Monitor vulnerabilities that affect your stack. Sign up free to get alerts when software you use is affected.

CVE Vulnerabilities - 14 April 2026

RSS

745 vulnerabilities published on 14 April 2026

Severity:
SAP S/4HANA OData Service allows unauthorized updates and deletions
CVE-2026-27679
An attacker can update and delete sensitive data without permission. This is a serious issue because it could compromise the integrity of your SAP S/4HANA system. We recommend you apply the latest sec...
6.5
SAP S/4HANA: Unauthorized Updates and Deletions of Company Data
CVE-2026-27678
An attacker can update and delete sensitive company data without permission. This could lead to financial loss or disruption of business operations. Organizations should apply the latest security patc...
6.5
SAP S/4HANA OData Service: Unauthorized Changes to Equipment Records
CVE-2026-27677
An attacker can update and delete equipment records without permission. This could lead to incorrect or malicious changes to critical business data. SAP S/4HANA users should ensure they have proper au...
6.5
Microsoft SharePoint Server allows unauthorized network spoofing
CVE-2026-32201
Microsoft SharePoint Server's failure to properly validate user input can allow hackers to pretend to be a trusted source on the network, potentially leading to unauthorized access or data theft. This...
6.5 KEV
ShopLentor WordPress Plugin Allows Attacker-Added Scripts to Run
CVE-2026-4059
The ShopLentor WordPress plugin has a security weakness that allows an attacker with administrative access to inject malicious code into a website. This could allow the attacker to perform unauthorize...
6.4
Booking.com Shortcode plugin for WordPress allows hackers to inject malicious scripts
CVE-2026-1607
The Booking.com Shortcode plugin for WordPress is affected by a security flaw that allows an attacker to inject malicious scripts into web pages. If an attacker with contributor-level access or higher...
6.4
Adobe Framemaker versions 2022.8 and earlier: Sensitive Files May Be Accessed
CVE-2026-27299
If you use Adobe Framemaker 2022.8 or earlier, a malicious file could be used to access sensitive files on your system. This happens if you open the malicious file. We recommend updating to the latest...
6.3
Giskard's Pattern Matching Can Be Tricked to Hang Indefinitely
GHSA-rq2q-4r55-9877 CVE-2026-40319
Using Giskard's pattern matching feature, an attacker with access to a check definition can cause a denial of service by crafting a malicious pattern that makes the system take a long time to respond....
6.3
Adobe Acrobat Reader: Malicious File Access via User Action
CVE-2026-34626
Adobe Acrobat Reader versions 26.001.21411 and earlier have a security flaw that could allow a malicious file to access your computer's files without your knowledge. This happens when you open a suspi...
6.3
MaxKB 2.7.1 and Below: Authenticated Attackers Can Steal Data
CVE-2026-39421
The MaxKB open-source AI assistant has a security flaw in its ToolExecutor component that allows an attacker with certain permissions to execute malicious code and steal sensitive data from the networ...
6.3
MaxKB versions 2.7.1 and below allow attackers to escape restrictions
CVE-2026-39420
Authenticated users with tool execution privileges can escape the security restrictions in MaxKB, allowing them to execute unauthorized code and access the network. This vulnerability affects versions...
6.3
ImageMagick Crashes if Given Malformed Image File
CVE-2026-40169 GHSA-5592-p365-24xh
ImageMagick versions before 7.1.2-19 can crash if given a specially crafted image file. This could potentially allow an attacker to make the software stop working. To fix this, update to version 7.1.2...
6.2
Windows Active Directory Spoofing via Unauthenticated Access
CVE-2026-32072
Attackers can pretend to be a legitimate user on a local network by exploiting a weakness in Windows Active Directory authentication. This could allow them to access sensitive information or disrupt s...
6.2
Authenticated File Deletion and Directory Creation via CSRF in goshs
GHSA-jrq5-hg6x-j6g3
A security issue in goshs allows an attacker to delete files and create directories on a server even if they are not authenticated, as long as the victim is logged in. This can happen if a malicious w...
6.1
Radware Alteon vADC load-balancer Allows Malicious Script Injection
CVE-2026-5754
A security issue in Radware Alteon's vADC load-balancer allows an attacker to inject malicious code into websites, potentially leading to unauthorized actions or data theft. If not addressed, this cou...
6.1
Adobe Connect versions 2025.3 and earlier: Malicious scripts can run in your browser
CVE-2026-34614
Adobe Connect versions 2025.3 and earlier contain a security flaw that allows hackers to run malicious scripts in your browser if you visit a specially crafted link. This could potentially lead to you...
6.1
Microsoft Office Word: Unauthorized Information Disclosure
CVE-2026-33822
An attacker can access sensitive information stored in Microsoft Office Word files without permission. This is a concern because it could allow an attacker to gain unauthorized access to confidential ...
6.1
Windows Admin Center allows attackers to impersonate websites and steal credentials
CVE-2026-32196
An attacker can inject malicious code into Windows Admin Center, which can trick users into revealing sensitive information or taking control of their accounts. This can happen when a user visits a ma...
6.1
Windows Biometric Service Can Be Bypassed with Physical Attack
CVE-2026-32088
An attacker can bypass security features in the Windows Biometric Service if they can execute multiple actions at the same time, potentially allowing unauthorized access. This requires a physical atta...
6.1
Windows Kernel Memory Can Leak Sensitive Information
CVE-2026-26169
A flaw in Windows Kernel Memory could allow an authorized user on the same machine to view sensitive information they shouldn't have access to. This is a concern for businesses with shared computers o...
6.1
Adobe Connect: Malicious Scripts Can Run in Your Browser
CVE-2026-21331
Adobe Connect versions 2025.3 and earlier have a security flaw that could let hackers trick users into running malicious code in their browser. If you use Adobe Connect, update to the latest version t...
6.1
Manikandan580 School Management System allows malicious scripts to run
CVE-2025-65136
The Manikandan580 School Management System has a security issue that allows an attacker to inject malicious code into the system. This could happen when a user visits a specially crafted link. This vu...
6.1
Hotel Management Software's Room Editing Page Allows Malicious Code Injection
CVE-2025-65132
The hotel management software's room editing page has a security weakness. If an attacker knows how to exploit this, they can inject and run malicious code on your website, potentially causing issues ...
6.1
Leaflet: Malicious code injected through map popup
CVE-2025-69993
Leaflet versions 1.9.4 and below allow attackers to inject malicious code into map popups. This can happen when a user views a popup with malicious content, which can execute scripts in the user's bro...
6.1
SAP NetWeaver Application Server ABAP: Malicious Redirect to Attacker-Controlled Site
CVE-2026-34257
An attacker can trick users into visiting a fake website by creating a malicious link. This could potentially lead to phishing or other attacks. SAP has likely released a patch or advisory to address ...
6.1