Vulnerabilities > Huawei > Emui > High
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2023-11-08 | CVE-2023-44115 | Unspecified vulnerability in Huawei Emui and Harmonyos Vulnerability of improper permission control in the Booster module. | 7.5 |
2023-11-08 | CVE-2023-46768 | Use After Free vulnerability in Huawei Emui and Harmonyos Multi-thread vulnerability in the idmap module. | 7.5 |
2023-11-08 | CVE-2023-46769 | Use After Free vulnerability in Huawei Emui and Harmonyos Use-After-Free (UAF) vulnerability in the dubai module. | 7.5 |
2023-11-08 | CVE-2023-46770 | Out-of-bounds Write vulnerability in Huawei Emui and Harmonyos Out-of-bounds vulnerability in the sensor module. | 7.5 |
2023-10-11 | CVE-2023-44108 | Type Confusion vulnerability in Huawei Emui and Harmonyos Type confusion vulnerability in the distributed file module.Successful exploitation of this vulnerability may cause the device to restart. | 7.5 |
2023-10-11 | CVE-2023-44114 | Out-of-bounds Read vulnerability in Huawei Emui and Harmonyos Out-of-bounds array vulnerability in the dataipa module.Successful exploitation of this vulnerability may affect service confidentiality. | 7.5 |
2023-10-11 | CVE-2023-44119 | Improper Locking vulnerability in Huawei Emui and Harmonyos Vulnerability of mutual exclusion management in the kernel module.Successful exploitation of this vulnerability will affect availability. | 7.5 |
2023-10-11 | CVE-2023-44095 | Use After Free vulnerability in Huawei Emui and Harmonyos Use-After-Free (UAF) vulnerability in the surfaceflinger module.Successful exploitation of this vulnerability can cause system crash. | 7.5 |
2023-10-11 | CVE-2023-44097 | Information Exposure vulnerability in Huawei Emui and Harmonyos Vulnerability of the permission to access device SNs being improperly managed.Successful exploitation of this vulnerability may affect service confidentiality. | 7.5 |
2023-10-11 | CVE-2023-44100 | Incorrect Resource Transfer Between Spheres vulnerability in Huawei Emui and Harmonyos Broadcast permission control vulnerability in the Bluetooth module.Successful exploitation of this vulnerability may affect service confidentiality. | 7.5 |