Vulnerabilities > Huawei > Harmonyos > High
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2022-01-10 | CVE-2021-40004 | Incorrect Default Permissions vulnerability in Huawei Harmonyos The cellular module has a vulnerability in permission management. | 7.5 |
2022-01-10 | CVE-2021-40005 | Unspecified vulnerability in Huawei Harmonyos The distributed data service component has a vulnerability in data access control. | 7.5 |
2022-01-10 | CVE-2021-40011 | Resource Exhaustion vulnerability in Huawei Emui, Harmonyos and Magic UI There is an uncontrolled resource consumption vulnerability in the display module. | 7.5 |
2022-01-10 | CVE-2021-40014 | Out-of-bounds Write vulnerability in Huawei Harmonyos The bone voice ID trusted application (TA) has a heap overflow vulnerability. | 7.5 |
2022-01-10 | CVE-2021-40018 | NULL Pointer Dereference vulnerability in Huawei Harmonyos The eID module has a null pointer reference vulnerability. | 7.5 |
2022-01-10 | CVE-2021-40021 | Out-of-bounds Write vulnerability in Huawei Harmonyos The eID module has an out-of-bounds memory write vulnerability,Successful exploitation of this vulnerability may affect data confidentiality. | 7.5 |
2022-01-10 | CVE-2021-40022 | Unspecified vulnerability in Huawei Harmonyos The weaver module has a vulnerability in parameter type verification,Successful exploitation of this vulnerability may affect data confidentiality. | 7.5 |
2022-01-10 | CVE-2021-40025 | Improper Initialization vulnerability in Huawei Harmonyos The eID module has a vulnerability that causes the memory to be used without being initialized,Successful exploitation of this vulnerability may affect data confidentiality. | 7.5 |
2022-01-10 | CVE-2021-40026 | Out-of-bounds Write vulnerability in Huawei Emui, Harmonyos and Magic UI There is a Heap-based buffer overflow vulnerability in the AOD module in smartphones. | 7.5 |
2022-01-10 | CVE-2021-40027 | Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in Huawei Harmonyos The bone voice ID TA has a vulnerability in calculating the buffer length,Successful exploitation of this vulnerability may affect data confidentiality. | 7.5 |