Monitor vulnerabilities that affect your stack.
Sign up free to get alerts when software you use is affected.
CVE Vulnerabilities - 14 April 2026
RSS761 vulnerabilities published on 14 April 2026
Severity:
Unauthorized Privilege Elevation in Microsoft Brokering File System
CVE-2026-26181
A security issue in Microsoft Brokering File System could allow someone with authorized access to gain more permissions on a local machine than they should have. This could potentially lead to data be...
7.8
Windows Kernel Privilege Elevation through Local Buffer Overflow
CVE-2026-26180
A security flaw in the Windows Kernel allows a malicious program running on a local machine to potentially gain elevated access. This could lead to unauthorized changes to system settings or data. Upd...
7.8
Windows Kernel Double Free Privilege Escalation Vulnerability
CVE-2026-26179
An attacker with authorized access to a Windows system can exploit a flaw in the operating system's kernel, potentially allowing them to gain elevated privileges and access sensitive areas of the syst...
7.8
Windows Client Side Caching driver csc.sys Privilege Elevation Vulnerability
CVE-2026-26176
A flaw in the Windows Client Side Caching driver (csc.sys) could allow a hacker with access to the system to gain higher-level access than they normally should have. This could happen if a specific se...
7.8
Windows Push Notifications Privilege Elevation Vulnerability
CVE-2026-26172
An attacker with permission to send push notifications to a Windows system may be able to gain elevated privileges on the system, potentially allowing them to access sensitive data or make unauthorize...
7.8
Microsoft PowerShell Elevation of Privilege Vulnerability
CVE-2026-26170
An attacker with local access to a Windows system can exploit a weakness in PowerShell to gain higher-level user permissions. This could allow the attacker to make unauthorized changes or access sensi...
7.8
Windows Ancillary Function Driver for WinSock Privilege Escalation
CVE-2026-26168
An issue with how Windows manages networking functions can allow an attacker with local access to gain higher-level access to the system. This could potentially let an attacker do things they shouldn'...
7.8
Windows Kernel Double Free Vulnerability Allows Local Privilege Escalation
CVE-2026-26163
An issue in Windows Kernel software may allow an authorized user to gain more access to a system than they should have. This could potentially allow a malicious user to take control of a system. Updat...
7.8
Windows OLE Privilege Elevation Vulnerability
CVE-2026-26162
An attacker with authorized access to a Windows system can misuse a specific feature to gain higher-level permissions. This puts sensitive data and system settings at risk. To protect your system, app...
7.8
Windows Sensor Data Service Local Privilege Escalation Risk
CVE-2026-26161
An attacker with authorized access to the Windows Sensor Data Service can potentially gain elevated system privileges on a Windows system. This means they could make changes that a normal user shouldn...
7.8
Windows Remote Desktop Licensing Service Privilege Escalation Risk
CVE-2026-26160
The Windows Remote Desktop Licensing Service does not require authentication for a critical function, which could allow an authorized user to gain more access on a local network. This could lead to un...
7.8
Unauthorized access to Windows Remote Desktop Licensing Service
CVE-2026-26159
An attacker with access to the Windows Remote Desktop Licensing Service can potentially gain elevated local privileges. This is a concern because it could allow an attacker to make unauthorized change...
7.8
Windows Hyper-V: Local Code Execution via Heap Overflow
CVE-2026-26156
A security issue in Windows Hyper-V allows an attacker with local access to execute malicious code on a vulnerable system. This could potentially allow the attacker to take control of the system or di...
7.8
Windows Encrypting File System (EFS) Privilege Escalation Risk
CVE-2026-26153
An authorized user on a Windows system can potentially exploit a weakness in the Encrypting File System, allowing them to gain elevated access to the system. This means an attacker with legitimate acc...
7.8
Microsoft PowerShell: Bypass Local Security Feature
CVE-2026-26143
An attacker can bypass a security feature on a local system by sending special input to PowerShell. This means an attacker could potentially access restricted areas of the system without proper author...
7.8
Microsoft Office Word allows unauthorized code execution
CVE-2026-23657
An attacker can run unauthorized code on your computer if they know how to exploit a weakness in Microsoft Office Word. This could lead to data theft or system damage. Update your Office software to t...
7.8
Windows Management Services allows local privilege escalation via race condition
CVE-2026-20930
Windows Management Services has a bug that can let authorized users gain more access on a local computer than they should have. This could let them do things they shouldn't be able to do, like install...
7.8
Adobe InDesign allows malicious files to run code on your computer
CVE-2026-27291
Adobe InDesign versions 20.5.2 and earlier have a security flaw that lets hackers write malicious code to your computer if you open a bad file. This requires you to open the file yourself, so it's not...
7.8
Adobe InDesign: Open malicious file to execute code as the user
CVE-2026-27284
Adobe InDesign versions 20.5.2 and earlier are at risk if a user opens a specially crafted file. This could allow an attacker to run malicious code on the user's computer. To protect yourself, make su...
7.8
InDesign: Opening a malicious file can run bad code on your computer
CVE-2026-27283
If you use InDesign Desktop versions 20.5.2 or earlier, opening a malicious file could let an attacker run code on your computer with your user permissions. This could potentially lead to unauthorized...
7.8
Adobe InDesign: Opening Malicious Files Can Crash App or Run Malware
CVE-2026-27238
Adobe InDesign versions 20.5.2 and earlier are vulnerable to a security issue that could cause the app to crash or run malicious code on your computer if you open a poisoned file. This means you could...
7.8
Deno runtime ignores 'deny-read' flag when combined with 'allow-read'
JLSEC-2026-109
A specific combination of flags in Deno's command line interface can allow more access than intended, potentially allowing a program to read files it shouldn't be able to. This issue affects users who...
7.8
Axios Leaks Custom Authentication Headers to Cross-Domain Redirect Targets
GHSA-r4q5-vmmm-2653
If you use Axios to send requests to a server and that server redirects you to a different site, sensitive information like API keys or authentication tokens may be sent to the new site. This is a sec...
7.8
GraphQL PHP: Malicious Query Can Cause Excessive CPU Usage
GHSA-68jq-c3rv-pcrr
A specific type of malicious GraphQL query can cause a GraphQL PHP application to become unresponsive due to excessive CPU usage. This occurs when a query contains many repeated fields with the same n...
7.8
WWBN AVideo has a SSRF via same-domain hostname with alternate port bypasses isSSRFSafeURL
GHSA-j432-4w3j-3w8j
## Summary
The `isSSRFSafeURL()` function in `objects/functions.php` contains a same-domain shortcircuit (lines 4290-4296) that allows any URL whose hostname matches `webSiteRootURL` to bypass all SS...
7.7