CVE-2026-6161
A vulnerability was determined in code-projects Simple ChatBox up to 1.0. This affects an unknown part of the file /chatbox/insert.php of the component Endpoint. Executing a manipulation of the argument msg can lead to...
A vulnerability was determined in code-projects Simple ChatBox up to 1.0. This affects an unknown part of the file /chatbox/insert.php of the component Endpoint. Executing a manipulation of the argument msg can lead to...
A vulnerability has been found in PHPGurukul Company Visitor Management System 2.0. This impacts an unknown function of the file /bwdates-reports-details.php. The manipulation of the argument fromdate leads to cross site scripting. The attack...
Race condition vulnerability in the power consumption statistics module. Impact: Successful exploitation of this vulnerability may affect availability. More information : https://consumer.huawei.com/en/support/bulletin/2026/4/
Out-of-bounds write vulnerability in the file system. Impact: Successful exploitation of this vulnerability may affect availability. More information : https://consumer.huawei.com/en/support/bulletin/2026/4/
Boundary-unlimited vulnerability in the application read module. Impact: Successful exploitation of this vulnerability may affect availability. More information : https://consumer.huawei.com/en/support/bulletin/2026/4/
Bluetooth ACPI Drivers provided by Dynabook Inc. contain a stack-based buffer overflow vulnerability. An attacker may execute arbitrary code by modifying certain registry values. More information : https://corporate.jp.sharp/info/product-security/advisory-list/2026-001/
Access of resource using incompatible type (‘type confusion’) vulnerability in Samsung Open Source Escargot allows Pointer Manipulation.This issue affects Escargot: 97e8115ab1110bc502b4b5e4a0c689a71520d335. More information : https://github.com/Samsung/escargot/pull/1554
UAF vulnerability in the communication module. Impact: Successful exploitation of this vulnerability may affect availability. More information : https://consumer.huawei.com/en/support/bulletin/2026/4/
UAF vulnerability in the kernel module. Impact: Successful exploitation of this vulnerability will affect availability and confidentiality. More information : https://consumer.huawei.com/en/support/bulletin/2026/4/
Race condition vulnerability in the thermal management module. Impact: Successful exploitation of this vulnerability may affect availability. More information : https://consumer.huawei.com/en/support/bulletin/2026/4/
UAF vulnerability in the screen management module. Impact: Successful exploitation of this vulnerability may affect availability. More information : https://consumer.huawei.com/en/support/bulletin/2026/4/
UAF vulnerability in the kernel module. Impact: Successful exploitation of this vulnerability will affect availability and confidentiality. More information : https://consumer.huawei.com/en/support/bulletin/2026/4/
Out-of-bounds write vulnerability in the kernel module. Impact: Successful exploitation of this vulnerability will affect availability and confidentiality. More information : https://consumer.huawei.com/en/support/bulletin/2026/4/
UAF vulnerability in the communication module. Impact: Successful exploitation of this vulnerability may affect availability. More information : https://consumer.huawei.com/en/support/bulletin/2026/4/