Vulnerabilities > Huawei > Emui > 11.0.1
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2022-06-13 | CVE-2022-31752 | Missing Authorization vulnerability in Huawei Emui and Magic UI Missing authorization vulnerability in the system components. | 5.5 |
2022-06-13 | CVE-2022-31753 | Use of Externally-Controlled Format String vulnerability in Huawei Emui, Harmonyos and Magic UI The voice wakeup module has a vulnerability of using externally-controlled format strings. | 7.5 |
2022-06-13 | CVE-2022-31757 | Unspecified vulnerability in Huawei Emui, Harmonyos and Magic UI The setting module has a vulnerability of improper use of APIs. | 7.5 |
2022-06-13 | CVE-2022-31751 | Unspecified vulnerability in Huawei Emui, Harmonyos and Magic UI The kernel emcom module has multi-thread contention. | 5.5 |
2022-06-13 | CVE-2022-31755 | Improper Preservation of Permissions vulnerability in Huawei Emui, Harmonyos and Magic UI The communication module has a vulnerability of improper permission preservation. | 5.5 |
2022-06-13 | CVE-2022-31756 | Unspecified vulnerability in Huawei Emui, Harmonyos and Magic UI The fingerprint sensor module has design defects. | 5.5 |
2022-06-13 | CVE-2022-31762 | Improper Input Validation vulnerability in Huawei Emui, Harmonyos and Magic UI The AMS module has a vulnerability in input validation. | 7.8 |
2022-05-13 | CVE-2022-22252 | Use After Free vulnerability in Huawei Emui, Harmonyos and Magic UI The DFX module has a UAF vulnerability.Successful exploitation of this vulnerability may affect system stability. | 7.5 |
2022-05-13 | CVE-2021-46786 | Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in Huawei Emui, Harmonyos and Magic UI The audio module has a vulnerability in verifying the parameters passed by the application space.Successful exploitation of this vulnerability may cause out-of-bounds memory access. | 9.8 |
2022-05-13 | CVE-2021-46787 | Unspecified vulnerability in Huawei Emui, Harmonyos and Magic UI The AMS module has a vulnerability of improper permission control.Successful exploitation of this vulnerability may cause non-system application processes to crash. | 7.5 |