Monitor vulnerabilities that affect your stack.
Sign up free to get alerts when software you use is affected.
CVE Vulnerabilities - 14 April 2026
RSS605 vulnerabilities published on 14 April 2026
Severity:
SP1 V6 Software Allows Malicious Proofs to be Accepted
GHSA-63x8-x938-vx33
CVE-2026-40323
A critical security issue in SP1 V6 allows a malicious user to create fake proof data that could trick the system into accepting it. This affects versions 6.0.0 to 6.0.2. You should update to a fixed ...
8.9
Composer can execute malicious commands from compromised package repositories
GHSA-gqw4-4w2p-838q
CVE-2026-40261
A security issue in Composer allows an attacker to inject commands that can be executed on your system. This can happen when installing or updating dependencies from a compromised or malicious Compose...
8.8
SQL Server allows execution of malicious code over the network
CVE-2026-33120
An attacker with authorized access to SQL Server can potentially execute malicious code on a network, allowing them to access or modify sensitive data. This can happen if the attacker knows how to exp...
8.8
Windows Shell Bypass Allows Remote Attack
CVE-2026-32225
An issue in the Windows Shell could allow an attacker to bypass security features over a network. This could allow an attacker to potentially access sensitive data or perform actions on a Windows syst...
8.8
Azure Logic Apps Credentials Exposed to Unauthorized Access
CVE-2026-32171
An attacker with authorized access to Azure Logic Apps can gain elevated network privileges by exploiting insufficiently protected credentials. This could allow them to access sensitive data or take c...
8.8
Remote Desktop Client allows unauthorized code execution over the network
CVE-2026-32157
An attacker can execute code on your computer if you use the Remote Desktop Client and connect to a malicious server. This could allow them to access and steal sensitive information, or take control o...
8.8
WARP elevation of privilege vulnerability in Windows
CVE-2026-26178
An attacker can exploit a weakness in Windows WARP to gain higher-than-normal access to the system. This means an attacker who already has some level of access to the system could potentially gain eve...
8.8
Windows Push Notifications Local Privilege Escalation Risk
CVE-2026-26167
An attacker with permission to send notifications can potentially gain elevated privileges on a Windows system. This is because a security flaw in the way Windows handles notifications allows unauthor...
8.8
Critical Update Needed for Ruby: Protection Against Data Corruption and Attacks
RLSA-2023:7025
An update is available for Ruby to fix critical security issues that could allow attackers to manipulate web applications and corrupt data. This update is essential to prevent potential data breaches ...
8.8
Fortinet FortiDDoS-F: Unauthorized Code Execution via SQL Injection
CVE-2026-39815
A security issue in Fortinet's FortiDDoS-F software versions 7.2.1 to 7.2.2 could allow an attacker to run unauthorized code or commands. This could potentially harm your network. You should update to...
8.8
Webkul Krayin CRM Password Reset Exploit Allows Account Takeover
CVE-2026-38529
An attacker can reset any user's password and take control of their account in Webkul Krayin CRM if they are logged in. This is a serious security risk as an attacker could use this to access sensitiv...
8.8
Deno's permission requests can be tricked into showing fake file paths
JLSEC-2026-105
A malicious program can alter the text shown in permission requests to Deno, potentially deceiving users. This can happen when a program requests access to a file with a specially crafted path. To avo...
8.8
Deno Run Prompt Spoofing Vulnerability
JLSEC-2026-102
A malicious program can modify the Deno run prompt to trick users into granting access. This can happen when a user is asked to confirm a run permission, and an attacker can manipulate the prompt to d...
8.8
Unauthorized Access to Device Groups in RUGGEDCOM CROSSBOW SAM-P
CVE-2026-27668
A security issue in RUGGEDCOM CROSSBOW Secure Access Manager Primary (SAM-P) versions before V5.8 allows administrators to access and control device groups they belong to. This could enable an adminis...
8.7
SINEC NMS: Unauthorized Password Resets in Older Versions
CVE-2026-25654
Older versions of SINEC NMS don't verify user access rights when resetting passwords, allowing an authorized user to reset any account's password. This means an attacker could potentially take control...
8.7
MinIO: Unauthenticated Object Uploads via Missing Security Check
GHSA-9c4q-hq6p-c237
Any MinIO user with a valid access key can upload objects to any bucket without needing a secret key or digital signature. This affects all MinIO deployments. To fix, update to the latest version of M...
8.8
Microsoft Office Excel Malicious File Attack
CVE-2009-0238
Opening a specially crafted Excel file in Microsoft Office Excel can give an attacker control over your computer. This affects users who open Excel files from untrusted sources. Update your Microsoft ...
8.8
KEV
Adobe Connect versions 2025.3 and earlier allow attackers to take control of user accounts
CVE-2026-34617
Adobe Connect versions 2025.3 and earlier have a security weakness that allows an attacker to trick a user into clicking on a malicious link, potentially giving the attacker control over the user's ac...
8.7
Windows Hello: Unauthorized access over network
CVE-2026-27928
A flaw in Windows Hello's security feature can allow an attacker to access a user's account over a network without permission. This can happen if a hacker sends malicious input to a Windows Hello syst...
8.7
Craft Commerce: SQL Injection Can Run Unwanted Code on Server
CVE-2026-32271
GHSA-875v-7m49-8x88
The Craft Commerce platform has a security flaw that lets anyone with access to the control panel run malicious code on the server. This could happen if a user with a control panel account makes a spe...
8.7
Craft Commerce Ecommerce Platform SQL Injection Risk
CVE-2026-32272
GHSA-r54v-qq87-px5r
A security flaw in Craft Commerce versions 5.0.0 through 5.5.4 lets a hacker steal sensitive information from your store's database, potentially taking control of your admin account. To stay safe, upd...
8.7
SSH/SCP option injection allowing local RCE in @aiondadotcom/mcp-ssh
GHSA-p4h8-56qp-hpgv
## Impact
A crafted `hostAlias` argument such as `-oProxyCommand=...` was passed to `ssh`/`scp` without an argument terminator. SSH interprets arguments starting with `-` as options regardless of pos...
8.7
Adobe Acrobat Reader: Malicious File Can Run Code as You
CVE-2026-34622
Older versions of Adobe Acrobat Reader can be tricked into running malicious code if you open a specially crafted document. This could let the attacker take control of your computer. Update to the lat...
8.6
MinIO has an Unauthenticated Object Write via Missing Signature Verification in Unsigned-Trailer Uploads
GHSA-9c4q-hq6p-c237
### Impact
_What kind of vulnerability is it? Who is impacted?_
Two authentication bypass vulnerabilities in MinIO's `STREAMING-UNSIGNED-PAYLOAD-TRAILER` code path
allow any user who knows a valid a...
8.6
FlashBlade Sensitive Data Logging Error
CVE-2026-0207
A flaw in FlashBlade's logging system may expose sensitive data when certain conditions are met. This could potentially allow unauthorized access to confidential information. Users should review their...
8.5