Vulnerabilities > Huawei > Harmonyos > Critical
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2022-09-16 | CVE-2022-38999 | Unspecified vulnerability in Huawei Emui and Harmonyos The AOD module has the improper update of reference count vulnerability. | 9.8 |
2022-09-16 | CVE-2021-40017 | Improper Input Validation vulnerability in Huawei Emui and Harmonyos The HW_KEYMASTER module lacks the validity check of the key format. | 9.8 |
2022-08-10 | CVE-2022-37003 | Incorrect Default Permissions vulnerability in Huawei Emui, Harmonyos and Magic UI The AOD module has a vulnerability in permission assignment. | 9.8 |
2022-08-10 | CVE-2022-37002 | Unspecified vulnerability in Huawei Emui, Harmonyos and Magic UI The SystemUI module has a privilege escalation vulnerability. | 9.8 |
2022-07-12 | CVE-2022-34737 | Incorrect Default Permissions vulnerability in Huawei Emui, Harmonyos and Magic UI The application security module has a vulnerability in permission assignment. | 9.1 |
2022-06-13 | CVE-2021-40036 | Out-of-bounds Write vulnerability in Huawei Harmonyos The bone voice ID TA has a memory overwrite vulnerability. | 9.8 |
2022-06-13 | CVE-2022-31760 | Unspecified vulnerability in Huawei Emui, Harmonyos and Magic UI Dialog boxes can still be displayed even if the screen is locked in carrier-customized USSD services. | 9.1 |
2022-05-13 | CVE-2022-29794 | Use After Free vulnerability in Huawei Emui and Harmonyos The frame scheduling module has a Use After Free (UAF) vulnerability.Successful exploitation of this vulnerability will affect data integrity, availability, and confidentiality. | 9.8 |
2022-05-13 | CVE-2022-22260 | Use After Free vulnerability in Huawei Emui and Harmonyos The kernel module has a UAF vulnerability.Successful exploitation of this vulnerability will affect data integrity and availability. | 9.1 |
2022-05-13 | CVE-2021-46786 | Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in Huawei Emui, Harmonyos and Magic UI The audio module has a vulnerability in verifying the parameters passed by the application space.Successful exploitation of this vulnerability may cause out-of-bounds memory access. | 9.8 |