Skip to content
Threat Feed

Briefs

April 2026 (30)

high advisory

CVE-2026-32183: Windows Snipping Tool Command Injection Vulnerability

CVE-2026-32183 is a command injection vulnerability in the Windows Snipping Tool that allows a local attacker to execute arbitrary code.

command-injection windows vulnerability
2r 2t 1c
high advisory

Windows Win32K Untrusted Pointer Dereference Vulnerability (CVE-2026-32222)

CVE-2026-32222 is an untrusted pointer dereference vulnerability in the Windows Win32K ICOMP component, allowing a local attacker to escalate privileges.

privilege-escalation windows cve-2026-32222
2r 1t 1c
high advisory

CVE-2026-32156 Use-After-Free Vulnerability in Windows UPnP Device Host

CVE-2026-32156 is a use-after-free vulnerability in the Windows Universal Plug and Play (UPnP) Device Host service that allows an unauthorized attacker to execute code locally.

use-after-free windows upnp code-execution
2r 2t 1c
high advisory

CVE-2026-26183 Windows RPC API Local Privilege Escalation

CVE-2026-26183 allows a locally authenticated attacker to escalate privileges due to improper access control within the Windows RPC API.

privilege-escalation windows rpc
2r 1t 1c
high advisory

Windows Server Update Service (WSUS) Privilege Escalation via CVE-2026-26174

CVE-2026-26174 is a race condition vulnerability in Windows Server Update Service that allows an authorized attacker to elevate privileges locally.

cve-2026-26174 privilege-escalation windows wsus
2r 1t 1c
high advisory

Adobe Connect XSS Vulnerability Leading to Privilege Escalation

Adobe Connect versions 2025.3, 12.10, and earlier are susceptible to a Cross-Site Scripting (XSS) vulnerability (CVE-2026-34617) that can lead to privilege escalation if a user interacts with a malicious URL or compromised web page.

adobe-connect xss cve-2026-34617 privilege-escalation
2r 1t 1c
high advisory

CVE-2026-33100: Windows WinSock Use-After-Free Privilege Escalation

CVE-2026-33100 is a use-after-free vulnerability in the Windows Ancillary Function Driver for WinSock, allowing a locally authorized attacker to elevate privileges.

cve-2026-33100 use-after-free privilege-escalation windows
2r 1t 1c
high advisory

CVE-2026-32224 Use-After-Free in Windows Server Update Service

CVE-2026-32224 is a use-after-free vulnerability in the Windows Server Update Service that allows a locally authenticated attacker to elevate privileges.

cve-2026-32224 use-after-free privilege-escalation windows
2r 1t 1c
high advisory

Microsoft Graphics Component Heap-based Buffer Overflow Vulnerability (CVE-2026-32221)

CVE-2026-32221 is a heap-based buffer overflow vulnerability in the Microsoft Graphics Component, allowing a local attacker to execute arbitrary code.

cve-2026-32221 buffer-overflow local-privilege-escalation graphics-component
2r 2t 1c
high advisory

Microsoft Brokering File System Double Free Privilege Escalation (CVE-2026-32219)

CVE-2026-32219 is a double free vulnerability in the Microsoft Brokering File System, allowing an authorized attacker to escalate privileges locally on a vulnerable Windows system.

privilege-escalation windows
2r 1t 1c
high advisory

Microsoft PowerPoint Use-After-Free Vulnerability (CVE-2026-32200)

CVE-2026-32200 is a use-after-free vulnerability in Microsoft Office PowerPoint that allows an unauthorized attacker to achieve local code execution by enticing a user to open a specially crafted PowerPoint document.

cve-2026-32200 use-after-free powerpoint code-execution
2r 1t 1c
medium advisory

.NET Spoofing Vulnerability (CVE-2026-32178)

CVE-2026-32178 is a vulnerability in .NET that allows for network spoofing due to improper neutralization of special elements, potentially enabling attackers to impersonate legitimate entities.

dotnet spoofing cve-2026-32178
2r 1t 1c
high advisory

CVE-2026-32165 Use-After-Free in Windows User Interface Core

CVE-2026-32165 is a use-after-free vulnerability in Windows User Interface Core that allows a locally authenticated attacker to elevate privileges.

privilege-escalation use-after-free windows
2r 1t 1c
high advisory

Windows COM Privilege Escalation via CVE-2026-32162

CVE-2026-32162 allows an unauthorized attacker to achieve local privilege escalation in Windows COM by exploiting the acceptance of extraneous untrusted data with trusted data.

privilege-escalation windows CVE-2026-32162
2r 1t 1c 1i
high advisory

Windows Push Notifications Race Condition Privilege Escalation (CVE-2026-32159)

CVE-2026-32159 is a race condition vulnerability in Windows Push Notifications, allowing a local attacker with low privileges to elevate privileges by exploiting concurrent execution using a shared resource with improper synchronization.

privilege-escalation race-condition windows
2r 1t 1c
high advisory

Microsoft Brokering File System Race Condition Vulnerability (CVE-2026-32091)

CVE-2026-32091 is a race condition vulnerability in the Microsoft Brokering File System, allowing an unauthenticated local attacker to escalate privileges.

privilege-escalation race-condition windows
2r 1t 1c
high advisory

CVE-2026-32087 Function Discovery Service Privilege Escalation

CVE-2026-32087 is a heap-based buffer overflow vulnerability in the Function Discovery Service (fdwsd.dll) that allows an authorized local attacker to elevate privileges on a Windows system.

privilege-escalation heap-overflow cve windows
2r 1t 1c
high advisory

CVE-2026-32070: Windows CLFS Driver Use-After-Free Privilege Escalation

A use-after-free vulnerability, CVE-2026-32070, exists in the Windows Common Log File System (CLFS) driver, enabling a locally authenticated attacker to escalate privileges on a vulnerable system.

privilege-escalation use-after-free windows
2r 1t 1c
high advisory

Windows UPnP Device Host Untrusted Pointer Dereference Vulnerability (CVE-2026-27920)

CVE-2026-27920 is a local privilege escalation vulnerability in the Windows Universal Plug and Play (UPnP) Device Host due to an untrusted pointer dereference.

windows privilege-escalation cve
2r 1t 1c
high advisory

Windows Shell Race Condition Vulnerability (CVE-2026-27918)

CVE-2026-27918 is a race condition vulnerability in Windows Shell, allowing a local attacker to elevate privileges due to improper synchronization when accessing shared resources.

race-condition privilege-escalation windows
2r 1t 1c
high advisory

Adobe Connect Reflected XSS Vulnerability (CVE-2026-27245)

Adobe Connect versions 2025.3, 12.10, and earlier are vulnerable to a reflected Cross-Site Scripting (XSS) attack, enabling attackers to execute malicious JavaScript in a victim's browser by enticing them to visit a crafted URL.

xss adobe-connect cve-2026-27245 reflected-xss
2r 1t 1c 1i
high advisory

Windows Projected File System Buffer Over-Read Privilege Escalation (CVE-2026-26184)

CVE-2026-26184 is a buffer over-read vulnerability in the Windows Projected File System (ProjFS) that allows a local attacker to elevate privileges.

cve-2026-26184 privilege-escalation windows
2r 1t 1c
high advisory

CVE-2026-26176 Windows CSC Driver Privilege Escalation

CVE-2026-26176 is a heap-based buffer overflow vulnerability in the Windows Client Side Caching driver (csc.sys), which allows an authorized attacker to elevate privileges locally.

privilege-escalation buffer-overflow windows
2r 1t 1c
critical advisory

Windows WARP Integer Truncation Privilege Escalation (CVE-2026-26178)

CVE-2026-26178 is an integer size truncation vulnerability in the Windows Advanced Rasterization Platform (WARP) that allows an unauthorized attacker to elevate privileges locally.

privilege-escalation windows
2r 1t 1c
high advisory

Windows Remote Desktop Licensing Service Privilege Escalation via CVE-2026-26159

CVE-2026-26159 allows a local attacker to escalate privileges on Windows systems due to a missing authentication check in the Remote Desktop Licensing Service (RDLS).

cve-2026-26159 privilege-escalation windows
2r 1t 1c
critical advisory

Fortinet FortiSandbox Path Traversal Vulnerability (CVE-2026-39813)

A path traversal vulnerability (CVE-2026-39813) in Fortinet FortiSandbox versions 5.0.0 through 5.0.5 and 4.4.0 through 4.4.8 may allow an unauthenticated attacker to escalate privileges via '../filedir'.

path-traversal vulnerability privilege-escalation fortinet
2r 1t 1c
critical advisory

Webkul Krayin CRM BOLA Vulnerability (CVE-2026-38529)

CVE-2026-38529 is a Broken Object-Level Authorization (BOLA) vulnerability in Webkul Krayin CRM v2.2.x that allows authenticated attackers to reset user passwords and take over accounts.

bola cve-2026-38529 krayin-crm account-takeover
2r 1t 1c
high advisory

Fortinet FortiAnalyzer and FortiManager Cloud Heap-Based Buffer Overflow Vulnerability (CVE-2026-22828)

CVE-2026-22828 is a heap-based buffer overflow in Fortinet FortiAnalyzer and FortiManager Cloud versions 7.6.2 through 7.6.4, potentially allowing a remote unauthenticated attacker to execute arbitrary code with a significant preparation effort due to ASLR and network segmentation.

cve-2026-22828 fortinet heap-overflow cloud
2r 2t 1c
critical advisory

SQL Injection Vulnerability in anirudhkannan Grocery Store Management System 1.0 (CVE-2025-63939)

A critical SQL injection vulnerability (CVE-2025-63939) exists in the anirudhkannan Grocery Store Management System 1.0, allowing unauthenticated attackers to execute arbitrary SQL queries via the sitem_name POST parameter in /Grocery/search_products_itname.php.

sql-injection web-application cve-2025-63939
2r 1t 1c 1i
critical advisory

UniFi Play Path Traversal Vulnerability (CVE-2026-22562)

A path traversal vulnerability in UniFi Play devices allows an attacker with network access to write arbitrary files, leading to remote code execution.

path-traversal rce unifi
2r 2t 1c