Monitor vulnerabilities that affect your stack. Sign up free to get alerts when software you use is affected.

CVE Vulnerabilities - 14 April 2026

RSS

745 vulnerabilities published on 14 April 2026

Severity:
Microsoft Windows upnp.dll allows unauthorized access to local data
CVE-2026-32214
A security issue in the upnp.dll component of Windows allows an attacker who has already gained some level of access to the system to access sensitive information that should be kept private. This cou...
5.5
Windows upnp.dll allows attackers to access sensitive files
CVE-2026-32212
A flaw in Windows' upnp.dll lets authorized attackers view files on the same network. This could expose sensitive business information. Patch your Windows systems to fix this issue.
5.5
Windows Improper Privilege Management Allows Local Service Denial
CVE-2026-32181
A weakness in Windows allows an authorized user to intentionally block a system from functioning. This could be done by a legitimate user who has elevated privileges, potentially disrupting the system...
5.5
Windows Remote Procedure Call leaks sensitive information on Windows
CVE-2026-32085
A security issue in Windows Remote Procedure Call allows an authorized user's sensitive information to be accessed by others on the same system. This means that an attacker who already has local acces...
5.5
Windows File Explorer leaks sensitive information to local attackers
CVE-2026-32084
If you use Windows File Explorer, an attacker with normal user rights on your computer can see sensitive information. This could be useful for a malicious user to learn more about your system or plans...
5.5
Windows File Explorer Leaks Sensitive Information to Local Attackers
CVE-2026-32081
Windows File Explorer has a flaw that lets attackers who are already on a computer see sensitive information. This is a concern for organizations that store confidential data on their computers. To mi...
5.5
Windows File Explorer Leaks Sensitive Information on Local Machines
CVE-2026-32079
An issue in Windows File Explorer can reveal sensitive information to anyone with access to the computer. This makes it easier for an attacker who already has permission to access the machine to disco...
5.5
Windows GDI Allows Unauthorized Access to Sensitive Data
CVE-2026-27931
A security weakness in Windows GDI could allow an attacker to access sensitive information on a local computer. This means an attacker could potentially access confidential data without permission. Us...
5.5
Windows GDI can reveal sensitive information on Windows systems
CVE-2026-27930
An attacker with local access can exploit a vulnerability in Windows' Graphics Device Interface (GDI) to access and reveal sensitive information on a Windows system. This could potentially allow an at...
5.5
Adobe DNG SDK versions 1.7.1 2502 and earlier can be crashed by malicious files.
CVE-2026-27258
If you use Adobe DNG SDK, update to a fixed version to avoid potential crashes when opening malicious files. A hacker could create a file that crashes your application, making it unresponsive. Update ...
5.5
Windows COM Type Confusion Allows Local Information Disclosure
CVE-2026-20806
A flaw in Windows COM can allow attackers with local access to access sensitive information. This means that a user with normal privileges on a Windows system could potentially read data they shouldn'...
5.5
InDesign: Malicious File Can Expose Sensitive Information
CVE-2026-27286
Adobe InDesign Desktop versions 20.5.2 and earlier are vulnerable to a security risk. If you open a malicious file with InDesign, an attacker could access sensitive information stored on your computer...
5.5
InDesign Crashes or Freezes if You Open a Malicious File
CVE-2026-27285
Adobe InDesign versions 20.5.2 and earlier are at risk of crashing if you open a specially crafted file. This could disrupt your work and make your program unusable. Update to the latest version to pr...
5.5
Sigstore Timestamp Authority Verifier Allows Unauthorized Access
GHSA-xm5m-wgh2-rrg3 CVE-2026-39984
A bug in the Sigstore Timestamp Authority Verifier can allow attackers to pretend to be someone else, potentially gaining unauthorized access. This issue only affects users of the specific 'timestamp-...
5.5
WWBN AVideo stores harmful code in video durations
GHSA-8pv3-29pp-pf8f
A weakness in WWBN AVideo's video duration handling allows attackers to inject malicious code into the video database. This can lead to unauthorized actions when users view videos with crafted duratio...
5.4
Unsecured Video Duration Input Can Inject Malicious Code
GHSA-8pv3-29pp-pf8f
A security flaw in the video encoder of WWBN AVideo allows attackers to inject malicious code into video durations. This could potentially allow an attacker to steal sensitive information or take cont...
5.4
Avideo allows attackers to delete comments by tricking moderators
GHSA-8qm8-g55h-xmqr
A flaw in AVideo's comment deletion system allows an attacker to trick a moderator or content creator into deleting multiple comments at once. This can happen when the moderator visits a malicious web...
5.4
Avideo Comment Deletion Vulnerability: Mass Comment Deletion by Attacker
GHSA-8qm8-g55h-xmqr
Avideo's comment deletion feature is vulnerable to a security issue that allows an attacker to trick a victim into deleting multiple comments at once. This can happen when a victim, who has permission...
5.4
AVideo: Attackers Can Force Comment Votes with Browser Exploit
GHSA-x2pw-9c38-cp2j
AVideo's comment voting system is vulnerable to attacks that can manipulate votes without the user's consent. This can happen when a victim visits a malicious website and their browser is tricked into...
5.4
AVideo: Attackers Can Manipulate Comments and Votes
GHSA-x2pw-9c38-cp2j
AVideo's comment and vote system is at risk because attackers can trick logged-in users into changing their likes and dislikes or creating new comments. This can happen when a user visits a malicious ...
5.4
Docmost: Low-Privilege User Can Overwrite Attachments
CVE-2026-34213
A security patch is available for Docmost versions prior to 0.71.0. A low-privileged user on the same workspace can upload a file to overwrite another user's attachment without permission. Update to v...
5.4
Docmost: Malicious JavaScript Can Run When Viewing Attachments
CVE-2026-34212
Versions of Docmost prior to 0.71.0 have a security issue where a malicious user can trick another user into running their own JavaScript code when viewing a specially crafted attachment. This can hap...
5.4
Adobe Experience Manager: Malicious Script Can Run in Your Browser
CVE-2026-34625
Adobe Experience Manager versions 6.5.24 and earlier have a security issue that lets an attacker add malicious code to a website you visit. This requires you to click on a link or visit a specific web...
5.4
Adobe Experience Manager versions vulnerable to malicious website attacks
CVE-2026-34624
Adobe Experience Manager versions 6.5.24 and earlier are at risk of being exploited by malicious websites. If a user visits a specially designed website, an attacker could inject harmful code into the...
5.4
Adobe Experience Manager: Malicious Code Can Run in Your Browser
CVE-2026-34623
Adobe Experience Manager versions 6.5.24 and earlier are vulnerable to a browser attack that allows malicious code to run if a user visits a specially crafted website. This could lead to unauthorized ...
5.4