Vulnerabilities > Huawei > Harmonyos > High
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2021-11-23 | CVE-2021-37024 | Improper Input Validation vulnerability in Huawei Harmonyos 2.0 There is a Improper Input Validation vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability will cause kernel crash. | 7.5 |
2021-11-23 | CVE-2021-37025 | Improper Input Validation vulnerability in Huawei Harmonyos 2.0 There is a Improper Input Validation vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability will cause kernel crash. | 7.5 |
2021-11-23 | CVE-2021-37026 | Improper Input Validation vulnerability in Huawei Harmonyos 2.0 There is a Improper Input Validation vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability will cause kernel crash. | 7.5 |
2021-10-28 | CVE-2021-22451 | Integer Overflow or Wraparound vulnerability in Huawei Harmonyos 2.0 A component of the HarmonyOS has a Integer Overflow or Wraparound vulnerability. | 7.8 |
2021-10-28 | CVE-2021-22458 | Out-of-bounds Read vulnerability in Huawei Harmonyos 2.0 A component of the HarmonyOS has a Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability. | 7.8 |
2021-10-28 | CVE-2021-22469 | Out-of-bounds Read vulnerability in Huawei Harmonyos 2.0 A component of the HarmonyOS has a Out-of-bounds Read vulnerability. | 7.1 |
2021-10-28 | CVE-2021-22470 | Unspecified vulnerability in Huawei Harmonyos 2.0 A component of the HarmonyOS has a Privileges Controls vulnerability. | 7.8 |
2021-08-03 | CVE-2021-22416 | Unspecified vulnerability in Huawei Harmonyos 2.0 A component of the HarmonyOS has a Data Processing Errors vulnerability. | 7.8 |
2021-08-03 | CVE-2021-22418 | Integer Overflow or Wraparound vulnerability in Huawei Harmonyos 2.0 A component of the HarmonyOS has a Integer Overflow or Wraparound vulnerability. | 7.8 |
2021-08-03 | CVE-2021-22420 | Exposure of Resource to Wrong Sphere vulnerability in Huawei Harmonyos 2.0 A component of the HarmonyOS has a External Control of System or Configuration Setting vulnerability. | 7.8 |