Monitor vulnerabilities that affect your stack.
Sign up free to get alerts when software you use is affected.
CVE Vulnerabilities - 14 April 2026
RSS759 vulnerabilities published on 14 April 2026
Severity:
Deno on Windows: Malicious Batch Files Can Launch Unintended Programs
JLSEC-2026-113
Deno, a JavaScript runtime, has a security issue on Windows that allows attackers to execute unauthorized programs by manipulating batch files. This can happen if user-input data is not properly valid...
8.1
Deno Command Injection Allows Malicious Scripts to Run
JLSEC-2026-116
A Deno update is required to fix a security issue that lets attackers run unauthorized scripts. This affects Deno users who have not updated to version 2.6.8. To stay safe, update Deno to the latest v...
8.1
nanobot Personal AI Assistant: Unauthorized Access Risk
CVE-2026-35589
Versions of the nanobot personal AI assistant prior to 0.1.5 have a security flaw that allows hackers to take control of the AI assistant's access to your WhatsApp account. This means they could read ...
8.0
Oxia's TLS Certificate Validation Fails with Multi-Certificate Files
GHSA-7jrq-q4pq-rhm6
Oxia's TLS configuration has a bug that prevents it from properly checking the identity of clients using multi-certificate files. This can cause legitimate clients to be rejected, potentially forcing ...
8.0
Unauthorized Code Execution in Windows Active Directory
CVE-2026-33826
An attacker on a connected network can run malicious code on a Windows Active Directory server if they send a specially crafted request. This could allow them to access sensitive data or disrupt the d...
8.0
Kerberos on Windows allows unauthorized privilege escalation
CVE-2026-27912
An attacker with access to an adjacent network can gain elevated permissions on a Windows system using an improperly secured Kerberos configuration. This could allow the attacker to access sensitive d...
8.0
AVideo: Insecure File Deletion via Path Traversal
GHSA-5879-4fmr-xwf2
AVideo's CloneSite feature allows attackers to delete arbitrary files on the server by manipulating the 'deleteDump' parameter in a GET request. This is because the fix for this issue was incomplete, ...
7.8
libsixel: Image Processing Code Can Crash or Leak Memory
CVE-2026-33023
The libsixel library, used by some image-processing applications, has a bug in older versions that can cause a crash or memory leak if a specially crafted image is processed. If you're using one of th...
7.8
Adobe Framemaker: Opening Malicious Files Can Crash System
CVE-2026-27298
Adobe Framemaker versions 2022.8 and earlier are at risk if you open a malicious file. If you do, it could allow an attacker to take control of your system. Update to the latest version to fix this is...
7.8
Adobe Framemaker: Malicious File Can Run Code as User
CVE-2026-27297
Adobe Framemaker versions 2022.8 and earlier have a security flaw that could allow an attacker to run malicious code on your computer if you open a specially crafted file. This requires you to activel...
7.8
Adobe Framemaker 2022.8 and earlier: Malicious files can run as you.
CVE-2026-27296
If you use Adobe Framemaker 2022.8 or an earlier version, you're at risk of running malicious files on your computer when you open them. This can happen if you open a file that has been designed to ex...
7.8
Adobe Framemaker: Opening Malicious Files Can Execute Harmful Code
CVE-2026-27295
Adobe Framemaker versions 2022.8 and earlier are at risk if you open a malicious file. An attacker can trick you into opening a file that contains hidden code, which could then run without your knowle...
7.8
Adobe Framemaker may crash or run malicious code when opening a file
CVE-2026-27294
Adobe Framemaker versions 2022.8 and earlier are vulnerable to a bug that can be exploited by opening a specially crafted file. This could cause the program to crash or allow an attacker to run unauth...
7.8
Adobe Framemaker allows malicious files to run code on your computer
CVE-2026-27293
Adobe Framemaker versions 2022.8 and earlier may allow a hacker to run malicious code on your computer if you open a specially crafted file. This could potentially lead to unauthorized access to your ...
7.8
Adobe Framemaker 2022.8 and earlier: Opening malicious files can run code as you.
CVE-2026-27292
Adobe Framemaker versions 2022.8 and earlier are vulnerable to a serious security issue. If you open a malicious file, an attacker could potentially run unauthorized code on your computer. Update to t...
7.8
Adobe InCopy 20.5.2 and earlier: Malicious File Can Execute Harmful Code
CVE-2026-34631
Adobe InCopy versions 20.5.2 and 21.2 and earlier have a security flaw that allows a malicious file to execute code on your computer if you open it. This could potentially harm your system or data. Up...
7.8
Adobe InCopy versions 20.5.2 and earlier: Malicious File Can Execute Code as You
CVE-2026-27287
Adobe InCopy versions 20.5.2 and earlier have a security issue that could allow a malicious file to run code on your system if you open it. This could happen if you unknowingly open a file that was se...
7.8
Bridge: Malicious files can run code on your computer
CVE-2026-34630
Versions 16.0.2 and earlier of Bridge have a security flaw that could let malicious files take control of your computer if you open them. This means that if you open a file from an untrusted source, i...
7.8
Adobe Illustrator Users: Malicious Files Can Execute Code on Your Computer
CVE-2026-34618
Adobe Illustrator versions 30.2 and earlier have a security flaw that can be exploited when you open a malicious file. This could allow an attacker to run code on your computer with your current user ...
7.8
Bridge Software: Malicious File Opens Code Execution Risk
CVE-2026-27313
Older versions of Bridge software are vulnerable to a security flaw that could allow attackers to take control of a user's computer if they open a malicious file. This only happens if a user manually ...
7.8
Bridge versions 16.0.2 and earlier: Malicious file can run code as user
CVE-2026-27312
If a user opens a malicious file using Bridge, it may allow an attacker to run arbitrary code with the user's permissions. This could potentially lead to data theft or system compromise. Update to Bri...
7.8
Bridge versions 16.0.2 and earlier: Malicious file can run as you.
CVE-2026-27311
If you use Bridge, a malicious file sent to you could potentially allow an attacker to take actions on your computer. To protect yourself, update Bridge to the latest version. If you're using an affec...
7.8
Bridge versions 16.0.2 and earlier: Malicious File Opening Risks User's PC
CVE-2026-27310
Using Bridge versions 16.0.2 or earlier, a hacker can create a file that, when opened by a user, could let the hacker take control of the user's PC. This requires the user to open the file themselves....
7.8
Photoshop 27.4 and earlier: Malicious File Can Run Code on Your Computer
CVE-2026-27289
Photoshop Desktop versions 27.4 and earlier have a security flaw that can be exploited if you open a specially made file. This could let an attacker run code on your computer with your user permission...
7.8
Composer allows malicious Perforce repository to run arbitrary commands
GHSA-wg36-wvj6-r67p
CVE-2026-40176
A vulnerability in Composer allows a malicious Perforce repository to execute arbitrary commands on your system if you run Composer on a project with a malicious composer.json file. This can happen if...
7.8