Vulnerabilities > Huawei > High
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2021-08-03 | CVE-2021-22416 | Unspecified vulnerability in Huawei Harmonyos 2.0 A component of the HarmonyOS has a Data Processing Errors vulnerability. | 7.8 |
2021-08-03 | CVE-2021-22418 | Integer Overflow or Wraparound vulnerability in Huawei Harmonyos 2.0 A component of the HarmonyOS has a Integer Overflow or Wraparound vulnerability. | 7.8 |
2021-08-03 | CVE-2021-22420 | Exposure of Resource to Wrong Sphere vulnerability in Huawei Harmonyos 2.0 A component of the HarmonyOS has a External Control of System or Configuration Setting vulnerability. | 7.8 |
2021-08-03 | CVE-2021-22421 | Improper Privilege Management vulnerability in Huawei Harmonyos 2.0 A component of the HarmonyOS has a Improper Privilege Management vulnerability. | 7.8 |
2021-08-03 | CVE-2021-22422 | Integer Overflow or Wraparound vulnerability in Huawei Harmonyos 2.0 A component of the HarmonyOS has a Integer Overflow or Wraparound vulnerability. | 7.8 |
2021-08-03 | CVE-2021-22423 | Out-of-bounds Write vulnerability in Huawei Harmonyos A component of the HarmonyOS has a Out-of-bounds Write Vulnerability. | 7.8 |
2021-08-03 | CVE-2021-22425 | Double Free vulnerability in Huawei Harmonyos A component of the HarmonyOS has a Double Free vulnerability. | 7.8 |
2021-08-02 | CVE-2021-22445 | Improper Input Validation vulnerability in Huawei Emui and Magic UI There is an Input Verification Vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may cause the system to reset. | 7.5 |
2021-08-02 | CVE-2021-22446 | Unspecified vulnerability in Huawei Emui and Magic UI There is an Information Disclosure Vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may cause the system to reset. | 7.5 |
2021-08-02 | CVE-2021-22447 | Improper Check for Unusual or Exceptional Conditions vulnerability in Huawei Emui and Magic UI There is an Improper Check for Unusual or Exceptional Conditions Vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may cause the system to reset. | 7.5 |