Skip to content
Threat Feed

Briefs

April 2026 (30)

high advisory

Fortinet FortiDDoS-F SQL Injection Vulnerability (CVE-2026-39815)

An SQL injection vulnerability (CVE-2026-39815) in Fortinet FortiDDoS-F versions 7.2.1 through 7.2.2 may allow a low-privilege attacker to execute unauthorized code or commands.

sqli fortinet cve-2026-39815
2r 3t 1c
critical advisory

Fortinet FortiSandbox OS Command Injection Vulnerability (CVE-2026-39808)

Fortinet FortiSandbox versions 4.4.0 through 4.4.8 are vulnerable to OS Command Injection (CVE-2026-39808), potentially allowing unauthenticated attackers to execute arbitrary code or commands.

cve command-injection fortinet
2r 1t 1c 1i
high advisory

Go Markdown Library Out-of-Bounds Read Vulnerability

A vulnerability in the go-markdown library exists where processing a malformed input containing a '<' character that is not followed by a '>' character with a SmartypantsRenderer can lead to an out-of-bounds read or a panic, causing a denial of service.

markdown denial-of-service go out-of-bounds read
2r 1t
high advisory

Jetty HTTP Request Smuggling via Chunked Extension Quoted-String Parsing

Jetty is vulnerable to HTTP request smuggling due to improper parsing of quoted strings in HTTP/1.1 chunked transfer encoding extension values, potentially allowing attackers to inject arbitrary HTTP requests, poison caches, and bypass security controls.

request-smuggling jetty CVE-2026-2332 webserver
2r 1t 1c 2i
high advisory

Krayin CRM v2.2.x SQL Injection Vulnerability

Krayin CRM v2.2.x is vulnerable to SQL injection via the rotten_lead parameter in /Lead/LeadDataGrid.php, potentially allowing attackers to read sensitive data.

sql-injection cve-2026-38528 krayin-crm
2r 1t 1c
high advisory

Libsixel Use-After-Free Vulnerability (CVE-2026-33018)

A use-after-free vulnerability exists in libsixel versions 1.8.7 and prior when processing animated GIFs due to improper frame buffer management, potentially leading to code execution.

libsixel use-after-free CVE-2026-33018 gif
2r 1t 1c
critical advisory

manikandan580 School-management-system SQL Injection Vulnerability

A time-based blind SQL injection vulnerability in manikandan580 School-management-system 1.0 allows unauthenticated attackers to potentially execute arbitrary SQL queries and gain unauthorized access to sensitive information.

sqli cve-2025-65135 school-management-system web-application
2r 1t 1c
high advisory

Microsoft Defender Privilege Escalation Vulnerability (CVE-2026-33825)

CVE-2026-33825 allows a locally authenticated attacker to escalate privileges in Microsoft Defender due to insufficient access control granularity.

privilege-escalation microsoft-defender cve-2026-33825
2r 1t 1c 1i
medium advisory

Microsoft Excel Out-of-Bounds Read Vulnerability (CVE-2026-32188)

An out-of-bounds read vulnerability in Microsoft Office Excel (CVE-2026-32188) allows a local attacker to potentially disclose sensitive information through a maliciously crafted Excel file.

excel out-of-bounds read cve-2026-32188 information disclosure vulnerability
2r 1t 1c
high advisory

Microsoft Excel Use-After-Free Vulnerability (CVE-2026-32189)

CVE-2026-32189 is a use-after-free vulnerability in Microsoft Excel that allows a local attacker to execute arbitrary code by exploiting memory corruption.

use-after-free code-execution excel cve-2026-32189
2r 1t 1c 1i
high advisory

Microsoft Management Console Improper Access Control Vulnerability (CVE-2026-27914)

CVE-2026-27914 is an improper access control vulnerability in Microsoft Management Console that allows a locally authorized attacker to elevate privileges.

privilege-escalation windows cve-2026-27914
2r 1t 1c 1i
high advisory

Microsoft Office Excel Use-After-Free Vulnerability (CVE-2026-32198)

CVE-2026-32198 is a use-after-free vulnerability in Microsoft Office Excel that allows an attacker to execute code locally on a vulnerable system.

use-after-free excel code-execution
3r 1t 1c
high threat

Microsoft Office Word Use-After-Free Vulnerability (CVE-2026-33095)

A use-after-free vulnerability in Microsoft Office Word (CVE-2026-33095) could allow a local attacker to execute arbitrary code by opening a specially crafted document.

exploited cve-2026-33095 use-after-free microsoft-office word code-execution
2r 1t 1c 1i
high advisory

Microsoft PowerShell Improper Input Validation Vulnerability (CVE-2026-26143)

An improper input validation vulnerability (CVE-2026-26143) in Microsoft PowerShell allows an unauthorized local attacker to bypass security features.

cve-2026-26143 powershell input-validation bypass-uac windows
2r 1t 1c 2i
high advisory

Microsoft Word Use-After-Free Vulnerability CVE-2026-23657

CVE-2026-23657 is a use-after-free vulnerability in Microsoft Office Word allowing a local attacker to execute arbitrary code with user privileges.

use-after-free code-execution office cve-2026-23657
2r 1t 1c
critical advisory

OAuth2 Proxy Authentication Bypass via User-Agent Header

A critical authentication bypass vulnerability (CVE-2026-34457) exists in OAuth2 Proxy when used with `auth_request`-style integration and either `--ping-user-agent` is set or `--gcp-healthchecks` is enabled, allowing unauthenticated access to protected resources.

oauth2-proxy authentication-bypass web-application
2r 1t
critical advisory

SQL Server Untrusted Pointer Dereference Vulnerability (CVE-2026-33120)

CVE-2026-33120 is an untrusted pointer dereference vulnerability in Microsoft SQL Server that allows an authenticated attacker to achieve remote code execution over a network.

sql-server rce vulnerability
2r 1t 1c 2i
high advisory

Webkul Krayin CRM SSRF Vulnerability (CVE-2026-38527)

A Server-Side Request Forgery (SSRF) vulnerability in Webkul Krayin CRM v2.2.x allows attackers to scan internal resources by sending a crafted POST request to the /settings/webhooks/create endpoint.

cve-2026-38527 ssrf webkul krayin-crm
2r 1t 1c
high advisory

Windows BitLocker Security Feature Bypass Vulnerability (CVE-2026-27913)

CVE-2026-27913 describes an improper input validation vulnerability in Windows BitLocker that allows a local attacker to bypass security features.

bitlocker security-bypass windows cve-2026-27913
2r 1t 1c 1i
high advisory

Windows Hyper-V Improper Input Validation Vulnerability (CVE-2026-32149)

CVE-2026-32149 is a vulnerability in Windows Hyper-V due to improper input validation, which allows an authorized, local attacker to execute arbitrary code.

hyper-v code-execution vulnerability windows
2r 2t 1c 1i
high advisory

Windows Kerberos Improper Authorization Privilege Escalation (CVE-2026-27912)

CVE-2026-27912 describes an improper authorization vulnerability in Windows Kerberos, enabling an attacker on an adjacent network with valid credentials to elevate privileges.

privilege-escalation kerberos windows cve-2026-27912
2r 1t 1c 2i
high advisory

Windows LUAFV TOCTOU Vulnerability Allows Local Privilege Escalation (CVE-2026-27929)

CVE-2026-27929 is a time-of-check time-of-use (TOCTOU) race condition in Windows LUAFV that allows an authorized local attacker to elevate privileges.

privilege-escalation toctou windows
2r 1t 1c 1i
high advisory

Windows Projected File System Race Condition Privilege Escalation (CVE-2026-27927)

CVE-2026-27927 is a race condition vulnerability in the Windows Projected File System that allows an authorized attacker to escalate privileges locally.

privilege-escalation race-condition windows
2r 1t 1c
high advisory

Windows Push Notifications Race Condition Privilege Escalation (CVE-2026-26172)

CVE-2026-26172 is a race condition vulnerability in Windows Push Notifications, allowing a locally authenticated attacker to elevate privileges.

cve-2026-26172 privilege-escalation race-condition windows
2r 1t 1c 1i
high advisory

Windows Push Notifications Race Condition Privilege Escalation (CVE-2026-32158)

CVE-2026-32158 is a race condition vulnerability in Windows Push Notifications that allows an authorized attacker to elevate privileges locally due to improper synchronization when using shared resources.

privilege escalation race condition windows
2r 1t 1c 1i
high advisory

Windows Push Notifications Race Condition Privilege Escalation (CVE-2026-32160)

CVE-2026-32160 describes a race condition vulnerability in Windows Push Notifications that allows a locally authorized attacker to elevate privileges.

privilege-escalation race-condition windows
2r 1t 1c
medium advisory

Windows Remote Desktop Spoofing Vulnerability (CVE-2026-26151)

CVE-2026-26151 is a spoofing vulnerability in Windows Remote Desktop due to an insufficient UI warning for dangerous operations, allowing an unauthorized attacker to perform spoofing over a network.

cve-2026-26151 rdp spoofing windows
2r 2t 1c
high threat

Windows SSDP Service Race Condition Privilege Escalation (CVE-2026-32068)

CVE-2026-32068 is a race condition vulnerability in the Windows SSDP Service that allows an authorized attacker to elevate privileges locally.

exploited cve-2026-32068 privilege-escalation windows
2r 1t 1c
high advisory

Windows Storage Spaces Controller Out-of-Bounds Read Privilege Escalation (CVE-2026-32076)

CVE-2026-32076 is an out-of-bounds read vulnerability in the Windows Storage Spaces Controller that allows an authorized local attacker to elevate privileges.

privilege-escalation windows cve-2026-32076
2r 1t 1c
high advisory

Windows TCP/IP Race Condition Vulnerability (CVE-2026-33827)

CVE-2026-33827 is a race condition vulnerability in Windows TCP/IP that allows an attacker to execute arbitrary code over the network by exploiting improper synchronization during concurrent execution using shared resources.

cve-2026-33827 race-condition windows tcp/ip code-execution
2r 2t 1c