Vulnerabilities > Huawei
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2022-01-10 | CVE-2021-40006 | Use of a Broken or Risky Cryptographic Algorithm vulnerability in Huawei Harmonyos 2.0 Vulnerability of design defects in the security algorithm component. | 4.6 |
2022-01-10 | CVE-2021-40009 | Out-of-bounds Write vulnerability in Huawei Emui, Harmonyos and Magic UI There is an Out-of-bounds write vulnerability in the AOD module in smartphones. | 5.3 |
2022-01-10 | CVE-2021-40010 | Out-of-bounds Write vulnerability in Huawei Emui, Harmonyos and Magic UI The bone voice ID TA has a heap overflow vulnerability.Successful exploitation of this vulnerability may result in malicious code execution. | 9.8 |
2022-01-10 | CVE-2021-40011 | Resource Exhaustion vulnerability in Huawei Emui, Harmonyos and Magic UI There is an uncontrolled resource consumption vulnerability in the display module. | 7.5 |
2022-01-10 | CVE-2021-40014 | Out-of-bounds Write vulnerability in Huawei Harmonyos The bone voice ID trusted application (TA) has a heap overflow vulnerability. | 7.5 |
2022-01-10 | CVE-2021-40018 | NULL Pointer Dereference vulnerability in Huawei Harmonyos The eID module has a null pointer reference vulnerability. | 7.5 |
2022-01-10 | CVE-2021-40020 | Out-of-bounds Read vulnerability in Huawei Emui and Magic UI There is an Out-of-bounds array read vulnerability in the security storage module in smartphones. | 7.5 |
2022-01-10 | CVE-2021-40021 | Out-of-bounds Write vulnerability in Huawei Harmonyos The eID module has an out-of-bounds memory write vulnerability,Successful exploitation of this vulnerability may affect data confidentiality. | 7.5 |
2022-01-10 | CVE-2021-40022 | Unspecified vulnerability in Huawei Harmonyos The weaver module has a vulnerability in parameter type verification,Successful exploitation of this vulnerability may affect data confidentiality. | 7.5 |
2022-01-10 | CVE-2021-40025 | Improper Initialization vulnerability in Huawei Harmonyos The eID module has a vulnerability that causes the memory to be used without being initialized,Successful exploitation of this vulnerability may affect data confidentiality. | 7.5 |