Vulnerabilities > Huawei > Low
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2022-01-10 | CVE-2021-40041 | Cross-site Scripting vulnerability in Huawei Ws318N-21 Firmware 10.0.2.2/10.0.2.5/10.0.2.6 There is a Cross-Site Scripting(XSS) vulnerability in HUAWEI WS318n product when processing network settings. | 1.9 |
2021-12-08 | CVE-2021-37039 | Improper Input Validation vulnerability in Huawei Emui, Harmonyos and Magic UI There is an Input verification vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may cause Bluetooth DoS. | 3.3 |
2021-11-23 | CVE-2021-37036 | Information Exposure vulnerability in Huawei Ecns280 TD Firmware and Fusioncompute There is an information leakage vulnerability in FusionCompute 6.5.1, eCNS280_TD V100R005C00 and V100R005C10. | 2.1 |
2021-11-23 | CVE-2021-22410 | Cross-site Scripting vulnerability in Huawei Imaster Nce-Fabric Firmware V100R019C10 There is a XSS injection vulnerability in iMaster NCE-Fabric V100R019C10. | 3.5 |
2021-10-28 | CVE-2021-22471 | NULL Pointer Dereference vulnerability in Huawei Harmonyos 2.0 A component of the HarmonyOS has a NULL Pointer Dereference vulnerability. | 2.1 |
2021-10-28 | CVE-2021-22469 | Out-of-bounds Read vulnerability in Huawei Harmonyos 2.0 A component of the HarmonyOS has a Out-of-bounds Read vulnerability. | 3.6 |
2021-10-28 | CVE-2021-22468 | Exposure of Resource to Wrong Sphere vulnerability in Huawei Harmonyos 2.0 A component of the HarmonyOS has a Exposure of Sensitive Information to an Unauthorized Actor vulnerability. | 2.1 |
2021-10-28 | CVE-2021-22467 | Improper Input Validation vulnerability in Huawei Harmonyos 2.0 A component of the HarmonyOS has a Improper Input Validation vulnerability. | 2.1 |
2021-10-28 | CVE-2021-22466 | Use After Free vulnerability in Huawei Harmonyos 2.0 A component of the HarmonyOS has a Use After Free vulnerability. | 2.1 |
2021-10-28 | CVE-2021-22465 | Out-of-bounds Write vulnerability in Huawei Harmonyos 2.0 A component of the HarmonyOS has a Heap-based Buffer Overflow vulnerability. | 2.1 |