A vulnerability marked as critical has been reported in Netgear JWNR2000v2, XWN5001 and XAVN2001v2. The impacted element is the function check_auth. Performing a manipulation of the argument http_passwd/http_username results in buffer overflow.
This vulnerability is identified as CVE-2023-39550. The attack can only be performed from the local network. There is not any exploit available.
A vulnerability has been found in Mitel MiVoice Office 400 SMB Controller up to 1.2.5.23 and classified as critical. This affects an unknown part. The manipulation leads to command injection.
This vulnerability is uniquely identified as CVE-2023-39293. The attack can only be initiated within the local network. No exploit exists.
A vulnerability was found in Mitel MiVoice Office 400 SMB Controller up to 1.2.5.23. It has been classified as critical. This issue affects some unknown processing. This manipulation causes sql injection.
The identification of this vulnerability is CVE-2023-39292. The attack needs to be done within the local network. There is no exploit available.
A vulnerability was found in Mitel MiVoice Connect up to R19.3 SP3. It has been classified as problematic. Impacted is an unknown function of the component Edge Gateway. Performing a manipulation results in information disclosure.
This vulnerability is cataloged as CVE-2023-39290. The attack must originate from the local network. There is no exploit available.
A vulnerability classified as problematic has been found in Mitel MiVoice Connect up to 9.6.2304.102. This affects an unknown part of the component Connect Mobility Router. The manipulation leads to information disclosure.
This vulnerability is uniquely identified as CVE-2023-39291. The attack can only be initiated within the local network. No exploit exists.
A vulnerability labeled as critical has been found in Mitel MiVoice Connect up to 19.3 SP3. Affected is an unknown function of the component Edge Gateway. Such manipulation leads to argument injection.
This vulnerability is traded as CVE-2023-39287. Access to the local network is required for this attack to succeed. There is no exploit available.
A vulnerability marked as critical has been reported in Mitel MiVoice Connect up to 9.6.2304.102. Affected by this vulnerability is an unknown functionality of the component Connect Mobility Router. Performing a manipulation results in argument injection.
This vulnerability is known as CVE-2023-39288. Access to the local network is required for this attack. No exploit is available.
A vulnerability described as problematic has been identified in Mitel MiVoice Connect up to 9.6.2208.101. Affected by this issue is some unknown functionality of the component Connect Mobility Router. Executing a manipulation can lead to information disclosure.
This vulnerability is handled as CVE-2023-39289. The attack can only be done within the local network. There is not any exploit available.
A vulnerability was found in Microsoft Windows 11 23H2/11 24H2/11 25H2. It has been classified as problematic. This affects an unknown function of the component Virtualization-Based Security. Performing a manipulation results in untrusted pointer dereference.
This vulnerability is identified as CVE-2026-20935. The attack is only possible with local access. There is not any exploit available.
Applying a patch is the recommended action to fix this issue.
A vulnerability was found in Microsoft Windows. It has been declared as problematic. This impacts an unknown function of the component NDIS. Executing a manipulation can lead to out-of-bounds read.
This vulnerability is tracked as CVE-2026-20936. The physical device can be targeted for the attack. No exploit exists.
It is best practice to apply a patch to resolve this issue.
A vulnerability was found in Microsoft Windows. It has been rated as problematic. Affected is an unknown function of the component File Explorer. The manipulation leads to information disclosure.
This vulnerability is listed as CVE-2026-20937. The attack must be carried out locally. There is no available exploit.
It is recommended to apply a patch to fix this issue.
A vulnerability was found in Microsoft Excel and classified as critical. Affected is an unknown function. Executing a manipulation can lead to use after free.
The identification of this vulnerability is CVE-2026-20950. The attack may be launched remotely. There is no exploit available.
A patch should be applied to remediate this issue.
A vulnerability identified as problematic has been detected in Microsoft Windows. Affected by this issue is some unknown functionality of the component File Explorer. This manipulation causes information disclosure.
This vulnerability is registered as CVE-2026-20939. The attack needs to be launched locally. No exploit is available.
It is suggested to install a patch to address this issue.
A vulnerability, which was classified as critical, was found in Microsoft Word. This affects an unknown function. Such manipulation leads to untrusted pointer dereference.
This vulnerability is uniquely identified as CVE-2026-20948. The attack can be launched remotely. No exploit exists.
Applying a patch is advised to resolve this issue.
A vulnerability has been found in Microsoft Excel and classified as critical. This impacts an unknown function. Performing a manipulation results in improper access controls.
This vulnerability was named CVE-2026-20949. The attack may be initiated remotely. There is no available exploit.
It is suggested to install a patch to address this issue.
A vulnerability labeled as critical has been found in Microsoft Excel. Impacted is an unknown function. Executing a manipulation can lead to integer underflow.
This vulnerability is registered as CVE-2026-20957. It is possible to launch the attack remotely. No exploit is available.
Applying a patch is advised to resolve this issue.
A vulnerability marked as problematic has been reported in Microsoft SharePoint. The affected element is an unknown function. The manipulation leads to server-side request forgery.
This vulnerability is documented as CVE-2026-20958. The attack can be initiated remotely. There is not any exploit available.
It is suggested to install a patch to address this issue.
A vulnerability categorized as critical has been discovered in Microsoft Copilot Studio. Affected by this vulnerability is an unknown functionality. Such manipulation leads to command injection.
This vulnerability is listed as CVE-2026-21520. The attack may be performed from remote. There is no available exploit.
This product is a managed service, so users are unable to manage vulnerability countermeasures on their own.
A vulnerability marked as critical has been reported in Microsoft Windows 11 24H2/11 25H2/Server 2025. This vulnerability affects unknown code of the component Host Process for Windows Tasks. Performing a manipulation results in link following.
This vulnerability is reported as CVE-2026-20941. The attack requires a local approach. No exploit exists.
To fix this issue, it is recommended to deploy a patch.