A vulnerability was found in e107 CMS 3.2.1. It has been rated as critical. The affected element is an unknown function of the component PHP File Handler. The manipulation leads to unrestricted upload.
This vulnerability is uniquely identified as CVE-2022-50907. The attack is possible to be carried out remotely. Moreover, an exploit is present.
A vulnerability was found in e107 CMS 3.2.1. It has been classified as critical. The impacted element is an unknown function of the file top.php of the component Media Manager Import. The manipulation of the argument URL leads to unrestricted upload.
This vulnerability is traded as CVE-2022-50916. It is possible to initiate the attack remotely. Furthermore, there is an exploit available.
A vulnerability has been found in Huawei HarmonyOS 5.0.1/5.1.0/6.0.0 and classified as problematic. Affected by this issue is some unknown functionality of the component Camera Framework Module. Performing a manipulation results in race condition.
This vulnerability is identified as CVE-2025-68961. The attack is only possible with local access. There is not any exploit available.
A vulnerability was found in Huawei HarmonyOS 5.0.1/5.1.0 and classified as problematic. This affects an unknown part of the component Camera Framework Module. Executing a manipulation can lead to race condition.
This vulnerability is tracked as CVE-2025-68962. The attack is restricted to local execution. No exploit exists.
A vulnerability was found in Huawei HarmonyOS and EMUI. It has been classified as critical. This vulnerability affects unknown code of the component Clone Module. The manipulation leads to weak password requirements.
This vulnerability is listed as CVE-2025-68963. The attack must be carried out from within the local network. There is no available exploit.
A vulnerability, which was classified as problematic, has been found in e107 CMS 3.2.1. This affects an unknown part of the component SVG File Handler. Performing a manipulation results in cross site scripting.
This vulnerability was named CVE-2022-50906. The attack may be initiated remotely. In addition, an exploit is available.
A vulnerability labeled as problematic has been found in Huawei HarmonyOS 6.0.0. Impacted is an unknown function of the component Card Framework Module. Such manipulation leads to race condition.
This vulnerability is traded as CVE-2025-68955. An attack has to be approached locally. There is no exploit available.
A vulnerability marked as problematic has been reported in Huawei HarmonyOS 6.0.0. The affected element is an unknown function of the component Card Framework Module. Performing a manipulation results in race condition.
This vulnerability is known as CVE-2025-68956. Attacking locally is a requirement. No exploit is available.
A vulnerability classified as critical has been found in Huawei HarmonyOS 6.0.0. This affects an unknown function of the component Card Framework Module. The manipulation leads to race condition.
This vulnerability is uniquely identified as CVE-2025-68957. Local access is required to approach this attack. No exploit exists.
A vulnerability classified as problematic was found in Huawei HarmonyOS 6.0.0. This impacts an unknown function of the component Card Framework Module. The manipulation results in race condition.
This vulnerability was named CVE-2025-68958. The attack needs to be approached locally. There is no available exploit.
A vulnerability, which was classified as problematic, has been found in Huawei HarmonyOS and EMUI. Affected is an unknown function of the component Media Library Module. This manipulation causes information disclosure.
The identification of this vulnerability is CVE-2025-68959. The attack can only be executed locally. There is no exploit available.
A vulnerability, which was classified as critical, was found in Huawei HarmonyOS 5.0.1/5.1.0. Affected by this vulnerability is an unknown functionality of the component Video Framework Module. Such manipulation leads to race condition.
This vulnerability is referenced as CVE-2025-68960. The attack can only be performed from a local environment. No exploit is available.
A vulnerability categorized as critical has been discovered in Microsoft Windows 11 23H2/11 24H2/11 25H2. Affected by this vulnerability is an unknown functionality of the component Virtualization-Based Security. The manipulation results in untrusted pointer dereference.
This vulnerability is cataloged as CVE-2026-20938. The attack must be initiated from a local position. There is no exploit available.
Applying a patch is advised to resolve this issue.
A vulnerability labeled as critical has been found in Microsoft Windows. This affects an unknown part of the component Cloud Files Mini Filter Driver. Such manipulation leads to untrusted pointer dereference.
This vulnerability is documented as CVE-2026-20940. The attack needs to be performed locally. There is not any exploit available.
A patch should be applied to remediate this issue.
A vulnerability described as critical has been identified in Microsoft Office. This issue affects some unknown processing. Executing a manipulation can lead to untrusted search path.
This vulnerability appears as CVE-2026-20943. The attack requires local access. There is no available exploit.
It is advisable to implement a patch to correct this issue.
A vulnerability classified as critical has been found in Microsoft Word. Impacted is an unknown function. The manipulation leads to out-of-bounds read.
This vulnerability is traded as CVE-2026-20944. It is possible to initiate the attack remotely. There is no exploit available.
Applying a patch is the recommended action to fix this issue.
A vulnerability, which was classified as critical, has been found in Microsoft Windows Admin Center in Azure Portal. Affected is an unknown function. Performing a manipulation results in improper verification of cryptographic signature.
This vulnerability is known as CVE-2026-20965. Attacking locally is a requirement. No exploit is available.
Applying a patch is the recommended action to fix this issue.
A vulnerability has been found in Microsoft Windows 11 24H2/11 25H2/Server 2025 and classified as critical. Affected by this issue is some unknown functionality of the component Capability Access Management Service. The manipulation leads to race condition.
This vulnerability is uniquely identified as CVE-2026-21221. Local access is required to approach this attack. No exploit exists.
It is recommended to apply a patch to fix this issue.
A vulnerability, which was classified as critical, has been found in Microsoft SharePoint Server. The impacted element is an unknown function. This manipulation causes sql injection.
This vulnerability is handled as CVE-2026-20947. The attack can be initiated remotely. There is not any exploit available.
It is recommended to apply a patch to fix this issue.