Vulnerabilities > Huawei > Emui > High
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2023-07-06 | CVE-2023-37241 | Improper Input Validation vulnerability in Huawei Emui and Harmonyos Input verification vulnerability in the WMS API. | 7.5 |
2023-07-05 | CVE-2021-46893 | Unspecified vulnerability in Huawei Emui and Harmonyos Vulnerability of unstrict data verification and parameter check. | 7.5 |
2023-06-19 | CVE-2022-48486 | Unspecified vulnerability in Huawei Emui 12.0.0 Configuration defects in the secure OS module.Successful exploitation of this vulnerability will affect availability. | 7.5 |
2023-06-19 | CVE-2022-48487 | Unspecified vulnerability in Huawei Emui 12.0.0 Configuration defects in the secure OS module.Successful exploitation of this vulnerability will affect availability. | 7.5 |
2023-06-19 | CVE-2022-48489 | Unspecified vulnerability in Huawei Emui 12.0.0 Configuration defects in the secure OS module.Successful exploitation of this vulnerability will affect availability. | 7.5 |
2023-06-19 | CVE-2022-48490 | Unspecified vulnerability in Huawei Emui 12.0.0 Configuration defects in the secure OS module.Successful exploitation of this vulnerability will affect availability. | 7.5 |
2023-06-19 | CVE-2022-48492 | Unspecified vulnerability in Huawei Emui 12.0.0 Configuration defects in the secure OS module.Successful exploitation of this vulnerability will affect availability. | 7.5 |
2023-06-19 | CVE-2022-48493 | Unspecified vulnerability in Huawei Emui 12.0.0 Configuration defects in the secure OS module.Successful exploitation of this vulnerability will affect availability. | 7.5 |
2023-06-19 | CVE-2022-48494 | Improper Authentication vulnerability in Huawei Emui Vulnerability of lax app identity verification in the pre-authorization function.Successful exploitation of this vulnerability will cause malicious apps to become pre-authorized. | 7.5 |
2023-06-19 | CVE-2022-48496 | Improper Authentication vulnerability in Huawei Emui Vulnerability of lax app identity verification in the pre-authorization function.Successful exploitation of this vulnerability will cause malicious apps to become pre-authorized. | 7.5 |