Vulnerabilities > Huawei > Critical
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2022-12-20 | CVE-2022-46327 | Unspecified vulnerability in Huawei Emui and Harmonyos Some smartphones have configuration issues. | 9.8 |
2022-12-19 | CVE-2021-33640 | Use After Free vulnerability in multiple products After tar_close(), libtar.c releases the memory pointed to by pointer t. | 9.8 |
2022-11-09 | CVE-2021-46851 | Unspecified vulnerability in Huawei Emui and Harmonyos The DRM module has a vulnerability in verifying the secure memory attributes. | 9.8 |
2022-11-09 | CVE-2022-44551 | Unspecified vulnerability in Huawei Emui and Harmonyos The iaware module has a vulnerability in thread security. | 9.8 |
2022-11-09 | CVE-2022-44558 | Deserialization of Untrusted Data vulnerability in Huawei Emui and Harmonyos The AMS module has a vulnerability of serialization/deserialization mismatch. | 9.8 |
2022-11-09 | CVE-2022-44559 | Deserialization of Untrusted Data vulnerability in Huawei Emui and Harmonyos The AMS module has a vulnerability of serialization/deserialization mismatch. | 9.8 |
2022-11-09 | CVE-2022-44562 | Unspecified vulnerability in Huawei Emui and Harmonyos The system framework layer has a vulnerability of serialization/deserialization mismatch. | 9.8 |
2022-10-14 | CVE-2021-46839 | Out-of-bounds Read vulnerability in Huawei Emui and Harmonyos The HW_KEYMASTER module has a vulnerability of missing bounds check on length.Successful exploitation of this vulnerability may cause malicious construction of data, which results in out-of-bounds access. | 9.1 |
2022-10-14 | CVE-2021-46840 | Out-of-bounds Read vulnerability in Huawei Emui and Harmonyos The HW_KEYMASTER module has an out-of-bounds access vulnerability in parameter set verification.Successful exploitation of this vulnerability may cause malicious construction of data, which results in out-of-bounds access. | 9.1 |
2022-10-14 | CVE-2022-38980 | Out-of-bounds Write vulnerability in Huawei Harmonyos 2.0/2.1 The HwAirlink module has a heap overflow vulnerability in processing data packets of the proprietary protocol.Successful exploitation of this vulnerability may allow attackers to obtain process control permissions. | 9.8 |