Vulnerabilities > Huawei > High
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2021-10-28 | CVE-2021-22469 | Out-of-bounds Read vulnerability in Huawei Harmonyos 2.0 A component of the HarmonyOS has a Out-of-bounds Read vulnerability. | 7.1 |
2021-10-28 | CVE-2021-22470 | Unspecified vulnerability in Huawei Harmonyos 2.0 A component of the HarmonyOS has a Privileges Controls vulnerability. | 7.8 |
2021-10-28 | CVE-2021-22472 | Unspecified vulnerability in Huawei Emui and Magic UI There is an Improper verification vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may affect service confidentiality. | 7.5 |
2021-10-28 | CVE-2021-22473 | Improper Authentication vulnerability in Huawei Emui and Magic UI There is an Authentication vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may affect service confidentiality. | 7.5 |
2021-10-28 | CVE-2021-22481 | Unspecified vulnerability in Huawei Emui and Magic UI There is a Verification errors vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may affect service confidentiality. | 7.5 |
2021-10-28 | CVE-2021-22483 | Unspecified vulnerability in Huawei Emui and Magic UI There is a issue of IP address spoofing in Huawei Smartphone. | 7.5 |
2021-10-28 | CVE-2021-22485 | Unspecified vulnerability in Huawei Emui and Magic UI There is a SSID vulnerability with Wi-Fi network connections in Huawei devices.Successful exploitation of this vulnerability may affect service confidentiality. | 7.5 |
2021-10-28 | CVE-2021-22486 | Unspecified vulnerability in Huawei Emui and Magic UI There is a issue of Unstandardized field names in Huawei Smartphone. | 7.5 |
2021-10-28 | CVE-2021-22487 | Out-of-bounds Read vulnerability in Huawei Emui and Magic UI There is an Out-of-bounds read vulnerability in Huawei Smartphone. | 7.5 |
2021-10-28 | CVE-2021-22488 | Link Following vulnerability in Huawei Emui and Magic UI There is an Unauthorized file access vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability by modifying soft links may tamper with the files restored from backups. | 7.5 |