Monitor vulnerabilities that affect your stack. Sign up free to get alerts when software you use is affected.

CVE Vulnerabilities - 14 April 2026

RSS

605 vulnerabilities published on 14 April 2026

Severity:
Webkul Krayin CRM v2.2.x Internal Resource Exposure via Malicious Webhooks
CVE-2026-38527
A security issue in Webkul Krayin CRM v2.2.x allows attackers to potentially access sensitive internal resources. This is a concern because it could lead to unauthorized access to your company's inter...
8.5
Microsoft Office Word allows unauthorized code execution on your computer
CVE-2026-33115
A security issue in Microsoft Office Word could allow an attacker to run malicious code on your computer without your knowledge or permission. This could lead to the theft of sensitive information or ...
8.4
Microsoft Office Word allows unauthorized code execution locally
CVE-2026-33114
An attacker can exploit a flaw in Microsoft Office Word to run their own code on a computer, potentially causing damage or stealing sensitive information. This affects all versions of Microsoft Office...
8.4
Microsoft Graphics Component allows local code execution via buffer overflow
CVE-2026-32221
An attacker can exploit a weakness in the Microsoft Graphics Component to run unauthorized code on a system, potentially causing harm. This weakness can be exploited by a malicious actor who has acces...
8.4
Microsoft Office: Unauth attacker can execute code locally
CVE-2026-32190
A vulnerability in Microsoft Office can allow an attacker to run malicious code on your computer if they can send you a specially crafted file. If you open this file, the attacker can take control of ...
8.4
Windows COM Privilege Elevation via Untrusted Data Acceptance
CVE-2026-32162
Attackers can exploit a weakness in Windows' Component Object Model to gain elevated privileges on a local computer. This means they could potentially take control of your system, which is a serious r...
8.4
Microsoft Brokering File System Privilege Escalation Risk
CVE-2026-32091
An attacker can potentially gain elevated access to sensitive files on a local system due to a flaw in the way Microsoft Brokering File System handles shared resources. This issue is significant becau...
8.4
Deno can accidentally grant too much permission to some files
JLSEC-2026-107
Deno's security settings may not prevent some files from being accessed, which could allow an attacker to do more than they should. This could happen if you're running code that lets Deno read or writ...
8.4
PraisonAI versions 4.5.138 and below allow malicious code to run on your computer
CVE-2026-40287
If you're using PraisonAI version 4.5.138 or earlier, an attacker could put a fake 'tools.py' file in the folder where you run PraisonAI and execute malicious code on your computer. This could comprom...
8.4
free5gc UDR improper path validation allows unauthenticated creation and modification of Traffic Influence Subscriptions
GHSA-jgq2-qv8v-5cmj CVE-2026-40248
### Summary An improper path validation vulnerability in the UDR service allows any unauthenticated attacker with access to the 5G Service Based Interface (SBI) to create or overwrite Traffic Influenc...
8.3
Free5GC UDR lets attackers access sensitive data without login
GHSA-x5r2-r74c-3w28 CVE-2026-40247
The Free5GC UDR system has a security weakness that allows unauthorized users to access sensitive data by sending a special request. This means attackers can potentially get access to confidential inf...
8.3
Free5GC UDR allows unauthorized deletion of traffic influence subscriptions
GHSA-g9cw-qwhf-24jp CVE-2026-40246
The free5GC UDR service has a security weakness that lets anyone delete traffic influence subscriptions without logging in. This is because the system doesn't properly check the path of incoming reque...
8.3
Deno's AES GCM encryption fails to verify authentication tags
JLSEC-2026-108
Deno's AES encryption doesn't check if encrypted data has been tampered with, which can lead to data being compromised. This affects Deno's AES-256-GCM and AES-128-GCM encryption. To protect your data...
8.3
Deno: Infinite Encryptions with Node Crypto
JLSEC-2026-114
Deno's crypto module in Node.js can be tricked into allowing an attacker to repeatedly perform encryption operations without finalizing the process, potentially leading to brute force attacks or attem...
8.3
Monetr Stripe Webhook Memory Exhaustion by Oversized Request
GHSA-v7xq-3wx6-fqc2
An unauthenticated attacker can send large requests to Monetr's Stripe webhook, causing excessive memory usage and potential denial of service. To protect against this, ensure that any upstream proxie...
8.3
OpenEdge AdminServer on all platforms allows attackers to access the server's files
CVE-2025-7389
A security issue in OpenEdge's AdminServer lets authorized users access sensitive files on the server. This could happen if the user has the right permissions and knows how to exploit it. OpenEdge has...
8.2
Large POST body crashes Stripe webhook endpoint on Monetr
GHSA-v7xq-3wx6-fqc2
A security flaw in Monetr's Stripe webhook endpoint allows an attacker to crash the service with a large, specially crafted POST request. This can make the service unresponsive or crash, disrupting it...
8.2
Kyverno Leaks Kubernetes Service Account Token
GHSA-q93q-v844-jrqp
A bug in Kyverno allows an attacker to steal a Kubernetes service account token by creating a malicious policy. This can happen if a policy doesn't explicitly set an Authorization header, allowing the...
8.1
Kyverno Service Call Leaks Service Account Token
GHSA-q93q-v844-jrqp
Kyverno's service call feature may send your service account token to an attacker-controlled endpoint if you don't explicitly set the Authorization header in your policy. This can happen if your polic...
8.1
Windows TCP/IP Allows Unauthorized Code Execution via Network
CVE-2026-33827
A security flaw in Windows TCP/IP could allow an attacker to execute code on a computer over a network. This could happen if an attacker sends a malicious message to a vulnerable computer at the right...
8.1
Webkul Krayin CRM v2.2.x: Unauthorized Access to Other Users' Contacts
CVE-2026-38532
An attacker who has logged in to Webkul Krayin CRM can access, edit, or delete any contact that belongs to other users. This happens because the system does not properly check permissions. To fix this...
8.1
Webkul Krayin CRM v2.2.x Allows Attackers to Delete Other Users' Leads
CVE-2026-38530
A security issue in Webkul Krayin CRM version 2.2.x allows anyone with a login to access, change, or delete leads from other users. This could let attackers erase valuable sales data or disrupt busine...
8.1
Fortinet FortiAnalyzer and FortiManager Cloud: Remote Code Execution Risk
CVE-2026-22828
A potential security issue exists in Fortinet's cloud-based management software for network devices. An attacker could potentially take control of the system if they send a specially crafted request. ...
8.1
Deno: Command Injection on Windows Through Batch File Bypass
JLSEC-2026-115
Deno's patch for preventing Windows batch file execution can be bypassed using alternate casing. This can allow attackers to inject commands on Windows systems. To fix this, update to Deno version 2.5...
8.1
Deno's Deny-Env Option Ignored by toObject Method
JLSEC-2026-110
Deno's Deny-Env option is bypassed when using toObject. This means that environment variables listed in Deny-Env can still be accessed using this method. If you're using Deno and rely on the Deny-Env ...
8.1