Vulnerabilities > Huawei > Magic UI > High
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2022-08-10 | CVE-2021-40040 | Unspecified vulnerability in Huawei Emui, Harmonyos and Magic UI Vulnerability of writing data to an arbitrary address in the HW_KEYMASTER module. | 7.5 |
2022-07-12 | CVE-2021-40012 | Unspecified vulnerability in Huawei Emui, Harmonyos and Magic UI Vulnerability of pointers being incorrectly used during data transmission in the video framework. | 7.5 |
2022-07-12 | CVE-2021-46741 | Unspecified vulnerability in Huawei Emui, Harmonyos and Magic UI The basic framework and setting module have defects, which were introduced during the design. | 7.5 |
2022-07-12 | CVE-2022-34742 | Out-of-bounds Write vulnerability in Huawei Emui, Harmonyos and Magic UI The system module has a read/write vulnerability. | 7.5 |
2022-06-13 | CVE-2021-46814 | Out-of-bounds Write vulnerability in Huawei Emui, Harmonyos and Magic UI The video framework has an out-of-bounds memory read/write vulnerability. | 7.5 |
2022-06-13 | CVE-2022-31762 | Improper Input Validation vulnerability in Huawei Emui, Harmonyos and Magic UI The AMS module has a vulnerability in input validation. | 7.8 |
2022-05-13 | CVE-2022-22252 | Use After Free vulnerability in Huawei Emui, Harmonyos and Magic UI The DFX module has a UAF vulnerability.Successful exploitation of this vulnerability may affect system stability. | 7.8 |
2022-05-13 | CVE-2021-46786 | Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in Huawei Emui, Harmonyos and Magic UI The audio module has a vulnerability in verifying the parameters passed by the application space.Successful exploitation of this vulnerability may cause out-of-bounds memory access. | 7.5 |
2022-05-13 | CVE-2021-46789 | Unspecified vulnerability in Huawei Emui and Magic UI Configuration defects in the secure OS module. | 7.5 |
2022-05-13 | CVE-2022-29793 | Unspecified vulnerability in Huawei Emui, Harmonyos and Magic UI There is a configuration defect in the activation lock of mobile phones.Successful exploitation of this vulnerability may affect application availability. | 7.5 |