Monitor vulnerabilities that affect your stack.
Sign up free to get alerts when software you use is affected.
CVE Vulnerabilities - 14 April 2026
RSS744 vulnerabilities published on 14 April 2026
Severity:
Fortinet FortiSOAR PaaS: Attackers Can Access Internal Server Ports
CVE-2025-59809
An attacker with an account on Fortinet's FortiSOAR platform can use a malicious request to discover which internal server ports are open, potentially allowing them to access sensitive information or ...
4.3
Apache PDFBox Examples Allow Malicious File Write Access
CVE-2026-33929
GHSA-gcj8-76p4-g2fq
Apache PDFBox Examples contain a flaw that can allow an attacker to write malicious files to any location on a user's system. This happens when a specially crafted PDF is opened. To fix this issue, us...
4.3
Unauthorized Access to Eventin Plugin Data
CVE-2026-4109
The Eventin plugin for WordPress has a security flaw that allows attackers with Subscriber-level access to read sensitive customer information, such as names, emails, and phone numbers, from event ord...
4.3
Open WebUI: Local Network Port Scanning via Image Editing
CVE-2026-34225
Self-hosted AI platform Open WebUI has a security issue that allows an attacker to scan the local network and potentially identify open ports. This could allow them to access sensitive services that u...
4.3
SAP S/4HANA OData Service lets attackers update and delete data
CVE-2026-27676
An attacker can make unauthorized changes to certain data in the SAP S/4HANA system through the OData service. This could lead to incorrect or malicious data being stored in the system. To protect aga...
4.3
Material Master Reports Expose Sensitive Data for Authenticated Users
CVE-2026-27672
The Material Master application doesn't check if users have permission to view sensitive data when generating reports. This means that users who are already logged in can potentially see information t...
4.3
SAP Business Objects: Unauthenticated Session Hijacking Possible
CVE-2026-24318
An attacker can steal and reuse valid session tokens to access sensitive information and make changes in the SAP Business Objects Business Intelligence Platform. This could compromise confidential dat...
4.2
Fortinet FortiSOAR PaaS passwords can be accessed by unauthorized users
CVE-2026-22574
A security weakness in FortiSOAR PaaS and on-premise versions means that an attacker with access to the system can potentially retrieve sensitive account passwords. This could allow them to gain unaut...
4.1
SAP BusinessObjects lets attackers inject malicious JavaScript
CVE-2026-27683
An attacker with a valid login can trick users into running malicious code in their web browser, potentially exposing sensitive information. This means that a logged-in user can be tricked into reveal...
4.1
Podman's HyperV Machine Allows Unrestricted PowerShell Commands
GHSA-hc8w-h2mf-hp59
CVE-2026-33414
Podman's HyperV machine backend has a security flaw that allows an attacker to execute arbitrary PowerShell commands on the Windows host with elevated privileges. This affects Windows users who run Po...
4.0
ImageMagick: Memory Leak in PNG Image Encoding
GHSA-x928-4434-crqj
ImageMagick's PNG encoder can leak memory when an MNG image fails to be written, which can cause performance issues and potentially lead to system crashes. This issue affects users who rely on ImageMa...
3.7
Siemens Software Center and Simcenter Products Allow Man-in-the-Middle Attacks
CVE-2025-40745
Siemens' software center and certain engineering tools, including Simcenter 3D and Femap, are at risk of being exploited by hackers who can intercept sensitive communications. This could allow unautho...
6.3
ImageMagick CLI Tool Allows Data Exposure
GHSA-pmpg-6pww-fg6q
Using ImageMagick's command line tool with an invalid index can cause the program to crash or potentially leak sensitive data. This issue affects users who rely on ImageMagick for image processing. To...
3.3
ImageMagick allows unauthorized access to sensitive data in images
GHSA-8vfj-q2cp-5m5j
ImageMagick, a popular image processing tool, has a bug that can allow an attacker to access sensitive data in images. This is a serious issue because it could potentially allow hackers to steal or ma...
3.3
ImageMagick: Out-of-bounds read in image processing can reveal sensitive information
GHSA-q8h3-jv9v-57qx
A bug in ImageMagick's image processing can allow an attacker to read sensitive information from memory. This can happen when the software tries to process certain types of images. Update ImageMagick ...
3.3
ImageMagick FTXT encoder can read beyond its allowed memory space
GHSA-w54j-7wpm-crhj
The FTXT encoder in ImageMagick does not properly check the size of input data, which can lead to unexpected behavior or crashes. This issue affects users who use the FTXT encoder, particularly those ...
3.3
Deno allows unauthorized access to file stats even with restricted permissions
JLSEC-2026-112
Deno's Deno.FsFile.prototype.stat and Deno.FsFile.prototype.statSync methods can reveal file information to scripts that don't have permission to read the file. This can happen even if you've restrict...
3.3
Deno's --deny-write check does not prevent permission bypass
JLSEC-2026-111
### Summary
`Deno.FsFile.prototype.utime` and `Deno.FsFile.prototype.utimeSync` are not limited by the permission model check `--deny-write=./`.
It's possible to change to change the access (`atime`...
3.3
OpenJPEG Library OpenJPEG 2.5.4 Integer Overflow Allows Local Code Execution
CVE-2026-6192
ECHO-a92e-9791-007a
A security issue in the OpenJPEG library, used in certain image processing software, can be exploited by a local attacker to execute malicious code. This could potentially lead to unauthorized access ...
4.8
OpenTofu Can Be Slow, Freeze, or Crash When Installing Malicious Modules
GHSA-hw5x-4r37-72w7
OpenTofu may use too much memory, take up too many CPU resources, or freeze when installing modules from untrusted sources. This could cause your computer to become unresponsive or slow down other pro...
3.1
MaxKB 2.7.1 and below: Malicious AI Assistant Output Spoofing
CVE-2026-39419
An attacker with access to MaxKB can manipulate the output of tools to deceive the system, potentially leading to incorrect or malicious decisions. This vulnerability affects users of MaxKB versions 2...
3.1
pyLoad: Users Can Access Data After Permission Changes
GHSA-fj52-5g4h-gmq8
If a user's permissions are changed in pyLoad, the application doesn't properly update their session. This means a user might still access data they shouldn't have access to. To protect your data, ens...
2.9
Fortinet FortiSandbox: Administrator Can Read LDAP Server Credentials
CVE-2026-27316
If an attacker has administrative access, they can view sensitive LDAP server login credentials. This could lead to unauthorized access to the LDAP server. Fortinet has released a patch to fix this is...
2.7
Patient Appointment Scheduler System SQL Injection vulnerability
CVE-2026-37602
The Patient Appointment Scheduler System has a security weakness that allows an attacker to access sensitive information by manipulating database queries. This can lead to unauthorized access to user ...
2.7
SQL Injection in Patient Appointment Scheduler System
CVE-2026-37601
A bug in the Patient Appointment Scheduler System allows an attacker to access sensitive patient data. This means that a hacker could potentially steal or manipulate patient information. Update the sy...
2.7