Monitor vulnerabilities that affect your stack. Sign up free to get alerts when software you use is affected.

CVE Vulnerabilities - 14 April 2026

RSS

670 vulnerabilities published on 14 April 2026

Severity:
Unauthorized Code Execution in Windows Active Directory
CVE-2026-33826
An attacker on a connected network can run malicious code on a Windows Active Directory server if they send a specially crafted request. This could allow them to access sensitive data or disrupt the d...
8.0
Kerberos on Windows allows unauthorized privilege escalation
CVE-2026-27912
An attacker with access to an adjacent network can gain elevated permissions on a Windows system using an improperly secured Kerberos configuration. This could allow the attacker to access sensitive d...
8.0
Adobe InCopy 20.5.2 and earlier: Malicious File Can Execute Harmful Code
CVE-2026-34631
Adobe InCopy versions 20.5.2 and 21.2 and earlier have a security flaw that allows a malicious file to execute code on your computer if you open it. This could potentially harm your system or data. Up...
7.8
Adobe InCopy versions 20.5.2 and earlier: Malicious File Can Execute Code as You
CVE-2026-27287
Adobe InCopy versions 20.5.2 and earlier have a security issue that could allow a malicious file to run code on your system if you open it. This could happen if you unknowingly open a file that was se...
7.8
Bridge: Malicious files can run code on your computer
CVE-2026-34630
Versions 16.0.2 and earlier of Bridge have a security flaw that could let malicious files take control of your computer if you open them. This means that if you open a file from an untrusted source, i...
7.8
Adobe Illustrator Users: Malicious Files Can Execute Code on Your Computer
CVE-2026-34618
Adobe Illustrator versions 30.2 and earlier have a security flaw that can be exploited when you open a malicious file. This could allow an attacker to run code on your computer with your current user ...
7.8
Bridge Software: Malicious File Opens Code Execution Risk
CVE-2026-27313
Older versions of Bridge software are vulnerable to a security flaw that could allow attackers to take control of a user's computer if they open a malicious file. This only happens if a user manually ...
7.8
Bridge versions 16.0.2 and earlier: Malicious file can run code as user
CVE-2026-27312
If a user opens a malicious file using Bridge, it may allow an attacker to run arbitrary code with the user's permissions. This could potentially lead to data theft or system compromise. Update to Bri...
7.8
Bridge versions 16.0.2 and earlier: Malicious file can run as you.
CVE-2026-27311
If you use Bridge, a malicious file sent to you could potentially allow an attacker to take actions on your computer. To protect yourself, update Bridge to the latest version. If you're using an affec...
7.8
Bridge versions 16.0.2 and earlier: Malicious File Opening Risks User's PC
CVE-2026-27310
Using Bridge versions 16.0.2 or earlier, a hacker can create a file that, when opened by a user, could let the hacker take control of the user's PC. This requires the user to open the file themselves....
7.8
Photoshop 27.4 and earlier: Malicious File Can Run Code on Your Computer
CVE-2026-27289
Photoshop Desktop versions 27.4 and earlier have a security flaw that can be exploited if you open a specially made file. This could let an attacker run code on your computer with your user permission...
7.8
Composer allows malicious Perforce repository to run arbitrary commands
GHSA-wg36-wvj6-r67p CVE-2026-40176
A vulnerability in Composer allows a malicious Perforce repository to execute arbitrary commands on your system if you run Composer on a project with a malicious composer.json file. This can happen if...
7.8
InDesign Desktop: Opening Malicious File Can Run Harmful Code
CVE-2026-34629
Adobe InDesign Desktop versions 20.5.2 and earlier are vulnerable to a critical security flaw. If a user opens a malicious file, it could allow an attacker to run unauthorized code on their computer, ...
7.8
InDesign Desktop versions 20.5.2 and 21.2: Malicious file can run code on your computer
CVE-2026-34628
Adobe InDesign Desktop versions 20.5.2 and 21.2 are vulnerable to a security threat. If you open a malicious file in one of these versions, a hacker could potentially take control of your computer. Up...
7.8
Adobe InDesign: Opening Malicious Files Can Crashes System or Steal Data
CVE-2026-34627
InDesign users may be at risk if they open a malicious file in Adobe InDesign. This could allow an attacker to take control of the user's system or steal sensitive information. Update to the latest ve...
7.8
Microsoft Defender Privilege Elevation on Local Systems
CVE-2026-33825
A security weakness in Microsoft Defender allows an authorized user to gain higher access levels on a system. This could be exploited by an attacker who already has some level of access, potentially l...
7.8
Windows Print Spooler Privilege Escalation Risk
CVE-2026-33101
An attacker with authorized access can exploit a weakness in Windows Print Spooler components to gain elevated privileges on a local system. This could allow them to perform actions they shouldn't be ...
7.8
Windows Container Isolation Driver Privilege Escalation
CVE-2026-33098
An attacker can exploit a flaw in the Windows Container Isolation driver to gain elevated privileges on a system, potentially allowing them to access sensitive data or take control of the system. This...
7.8
Microsoft Office Word allows unauthorized code execution locally
CVE-2026-33095
A security issue in Microsoft Office Word could allow an attacker to run malicious code on a victim's computer without their permission. This could happen if a user opens a specially crafted file. To ...
7.8
Windows Win32K Untrusted Pointer Dereference Allows Local Privilege Escalation
CVE-2026-32222
Certain applications using Windows Win32K may allow an authorized user to gain more access to the system than they should have, potentially giving them the ability to make changes to system settings o...
7.8
Microsoft PowerPoint Remote Code Execution Vulnerability
CVE-2026-32200
An attacker can execute malicious code on a computer by tricking a user into opening a specially crafted PowerPoint file. This can happen when the file is opened in a specific way, allowing the attack...
7.8
Microsoft Office Excel: Unsecured Code Execution via Local File Access
CVE-2026-32199
An attacker can exploit a weakness in Microsoft Office Excel to run malicious code on a victim's system if they gain unauthorized access to a file. This could lead to data theft or disruption of busin...
7.8
Microsoft Office Excel Allows Unapproved Code Execution
CVE-2026-32198
Malicious actors might run unauthorized software on a user's computer if they exploit a flaw in Excel. This could lead to data theft, system damage, or other security breaches. Update to the latest ve...
7.8
Excel allows unauthorized code execution on your computer
CVE-2026-32197
A security issue in Excel might let an attacker run malicious code on your computer if you open a specially crafted file. This could lead to data theft or system damage. Update Excel to the latest ver...
7.8
Azure Monitor Agent Privilege Escalation Vulnerability
CVE-2026-32192
An attacker who can manipulate Azure Monitor Agent data can gain elevated local access to your system. This could allow them to install malware, steal sensitive data, or disrupt your operations. Updat...
7.8