Vulnerabilities > Medium
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2025-01-08 | CVE-2024-56453 | Unspecified vulnerability in Huawei Harmonyos 5.0.0 Vulnerability of input parameters not being verified during glTF model loading in the 3D engine module Impact: Successful exploitation of this vulnerability may affect availability. | 5.5 |
2025-01-08 | CVE-2024-56454 | Unspecified vulnerability in Huawei Harmonyos 5.0.0 Vulnerability of input parameters not being verified during glTF model loading in the 3D engine module Impact: Successful exploitation of this vulnerability may affect availability. | 5.5 |
2025-01-08 | CVE-2024-56455 | Unspecified vulnerability in Huawei Harmonyos 5.0.0 Vulnerability of input parameters not being verified during glTF model loading in the 3D engine module Impact: Successful exploitation of this vulnerability may affect availability. | 5.5 |
2025-01-08 | CVE-2024-56456 | Unspecified vulnerability in Huawei Harmonyos 5.0.0 Vulnerability of input parameters not being verified during glTF model loading in the 3D engine module Impact: Successful exploitation of this vulnerability may affect availability. | 5.5 |
2025-01-08 | CVE-2024-47239 | Unspecified vulnerability in Dell Powerscale Onefs Dell PowerScale OneFS versions 8.2.2.x through 9.9.0.0 contain an uncontrolled resource consumption vulnerability. | 6.5 |
2025-01-08 | CVE-2024-54120 | Race Condition vulnerability in Huawei Harmonyos 5.0.0 Race condition vulnerability in the distributed notification module Impact: Successful exploitation of this vulnerability may cause features to perform abnormally. | 5.9 |
2025-01-08 | CVE-2024-56441 | Race Condition vulnerability in Huawei Emui and Harmonyos Race condition vulnerability in the Bastet module Impact: Successful exploitation of this vulnerability may affect service confidentiality. | 5.9 |
2025-01-08 | CVE-2024-56445 | Improper Authentication vulnerability in Huawei Harmonyos 5.0.0 Instruction authentication bypass vulnerability in the Findnetwork module Impact: Successful exploitation of this vulnerability may cause features to perform abnormally. | 5.3 |
2025-01-08 | CVE-2024-40679 | Information Exposure Through Log Files vulnerability in IBM DB2 11.5 IBM Db2 for Linux, UNIX and Windows (includes Db2 Connect Server) 11.5 is vulnerable to an information disclosure vulnerability as sensitive information may be included in a log file under specific conditions. | 5.5 |
2025-01-07 | CVE-2025-22132 | Unrestricted Upload of File with Dangerous Type vulnerability in Wegia WeGIA is a web manager for charitable institutions. | 4.8 |