Monitor vulnerabilities that affect your stack.
Sign up free to get alerts when software you use is affected.
CVE Vulnerabilities - 14 April 2026
RSS759 vulnerabilities published on 14 April 2026
Severity:
InDesign Desktop: Opening Malicious File Can Run Harmful Code
CVE-2026-34629
Adobe InDesign Desktop versions 20.5.2 and earlier are vulnerable to a critical security flaw. If a user opens a malicious file, it could allow an attacker to run unauthorized code on their computer, ...
7.8
InDesign Desktop versions 20.5.2 and 21.2: Malicious file can run code on your computer
CVE-2026-34628
Adobe InDesign Desktop versions 20.5.2 and 21.2 are vulnerable to a security threat. If you open a malicious file in one of these versions, a hacker could potentially take control of your computer. Up...
7.8
Adobe InDesign: Opening Malicious Files Can Crashes System or Steal Data
CVE-2026-34627
InDesign users may be at risk if they open a malicious file in Adobe InDesign. This could allow an attacker to take control of the user's system or steal sensitive information. Update to the latest ve...
7.8
Microsoft Defender Privilege Elevation on Local Systems
CVE-2026-33825
A security weakness in Microsoft Defender allows an authorized user to gain higher access levels on a system. This could be exploited by an attacker who already has some level of access, potentially l...
7.8
Windows Print Spooler Privilege Escalation Risk
CVE-2026-33101
An attacker with authorized access can exploit a weakness in Windows Print Spooler components to gain elevated privileges on a local system. This could allow them to perform actions they shouldn't be ...
7.8
Windows Container Isolation Driver Privilege Escalation
CVE-2026-33098
An attacker can exploit a flaw in the Windows Container Isolation driver to gain elevated privileges on a system, potentially allowing them to access sensitive data or take control of the system. This...
7.8
Microsoft Office Word allows unauthorized code execution locally
CVE-2026-33095
A security issue in Microsoft Office Word could allow an attacker to run malicious code on a victim's computer without their permission. This could happen if a user opens a specially crafted file. To ...
7.8
Windows Win32K Untrusted Pointer Dereference Allows Local Privilege Escalation
CVE-2026-32222
Certain applications using Windows Win32K may allow an authorized user to gain more access to the system than they should have, potentially giving them the ability to make changes to system settings o...
7.8
Microsoft PowerPoint Remote Code Execution Vulnerability
CVE-2026-32200
An attacker can execute malicious code on a computer by tricking a user into opening a specially crafted PowerPoint file. This can happen when the file is opened in a specific way, allowing the attack...
7.8
Microsoft Office Excel: Unsecured Code Execution via Local File Access
CVE-2026-32199
An attacker can exploit a weakness in Microsoft Office Excel to run malicious code on a victim's system if they gain unauthorized access to a file. This could lead to data theft or disruption of busin...
7.8
Microsoft Office Excel Allows Unapproved Code Execution
CVE-2026-32198
Malicious actors might run unauthorized software on a user's computer if they exploit a flaw in Excel. This could lead to data theft, system damage, or other security breaches. Update to the latest ve...
7.8
Excel allows unauthorized code execution on your computer
CVE-2026-32197
A security issue in Excel might let an attacker run malicious code on your computer if you open a specially crafted file. This could lead to data theft or system damage. Update Excel to the latest ver...
7.8
Azure Monitor Agent Privilege Escalation Vulnerability
CVE-2026-32192
An attacker who can manipulate Azure Monitor Agent data can gain elevated local access to your system. This could allow them to install malware, steal sensitive data, or disrupt your operations. Updat...
7.8
Microsoft Office Excel Local Code Execution Vulnerability
CVE-2026-32189
An attacker can run malicious code on your computer if you open a specially crafted Excel file. This could allow them to access sensitive information or take control of your system. Update to the late...
7.8
Microsoft HPC Pack Privilege Escalation Risk
CVE-2026-32184
An attacker with access to a system running Microsoft HPC Pack can exploit a flaw to gain elevated permissions. This could allow them to access sensitive data or take control of the system. To mitigat...
7.8
Windows Snipping Tool: Unprivileged Code Execution Possible
CVE-2026-32183
The Windows Snipping Tool has a security flaw that allows an attacker to run unauthorized code on a Windows computer. This could be used to steal sensitive information or cause system damage. Update t...
7.8
Azure Monitor Agent Allows Local Privilege Escalation
CVE-2026-32168
The Azure Monitor Agent has a flaw that lets an authorized user take control of a Windows system. This is a concern because it allows someone with legitimate access to the system to do more than they ...
7.8
Windows User Interface Core Privilege Elevation Exploit
CVE-2026-32165
A vulnerability in Windows User Interface Core allows an attacker with normal user privileges to potentially gain elevated access to a Windows system. This could allow an attacker to access sensitive ...
7.8
Windows UI Core Privilege Elevation Vulnerability
CVE-2026-32164
An attacker with local access to a Windows system can exploit a flaw in the Windows User Interface Core to potentially gain administrator privileges. This is a security concern because it could allow ...
7.8
Windows User Interface Core Privilege Escalation Risk
CVE-2026-32163
An attacker can take control of your computer if they have authorized access to it. This is because of a weakness in how Windows handles certain interactions between different parts of the system. To ...
7.8
Windows Push Notifications Privilege Escalation Risk
CVE-2026-32160
A security flaw in Windows Push Notifications can allow an authorized user to gain more access to a system than they should have. This issue affects Windows users and can be exploited by an attacker w...
7.8
Windows Push Notifications Local Privilege Escalation Risk
CVE-2026-32159
An attacker who has permission to use Windows Push Notifications on a Windows system could potentially gain more power on the system. This risk is highest for systems with multiple users, where an att...
7.8
Windows Push Notifications Privilege Elevation Vulnerability
CVE-2026-32158
An attacker with permission to use Windows Push Notifications can potentially gain elevated privileges on a local system. This is a serious issue because it allows unauthorized access to sensitive sys...
7.8
Windows Desktop Manager Privilege Escalation Vulnerability
CVE-2026-32155
An attacker with administrative rights on a Windows system can potentially take control of critical system functions. This could happen if an attacker exploits a weakness in the Desktop Window Manager...
7.8
Elevated Privileges Possible with Desktop Window Manager Exploit
CVE-2026-32154
An attacker with authorized access to a system can potentially exploit a flaw in the Desktop Window Manager to gain elevated privileges on the local machine. This could allow the attacker to perform a...
7.8