Vulnerabilities > Huawei > Medium
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2022-06-13 | CVE-2022-31763 | NULL Pointer Dereference vulnerability in Huawei Emui and Harmonyos The kernel module has the null pointer and out-of-bounds array vulnerabilities. | 5.5 |
2022-05-13 | CVE-2021-46785 | Unspecified vulnerability in Huawei Emui and Harmonyos The Property module has a vulnerability in permission control.This vulnerability can be exploited to obtain the unique device identifier. | 5.3 |
2022-03-10 | CVE-2021-40055 | Unspecified vulnerability in Huawei Emui, Harmonyos and Magic UI There is a man-in-the-middle attack vulnerability during system update download in recovery mode. | 5.9 |
2022-03-10 | CVE-2021-40059 | Incorrect Default Permissions vulnerability in Huawei Emui and Magic UI There is a permission control vulnerability in the Wi-Fi module. | 6.5 |
2022-02-25 | CVE-2021-22441 | Integer Overflow or Wraparound vulnerability in Huawei Harmonyos Some Huawei products have an integer overflow vulnerability. | 5.5 |
2022-02-25 | CVE-2021-22478 | Use After Free vulnerability in Huawei Harmonyos The interface of a certain HarmonyOS module has a UAF vulnerability. | 5.5 |
2022-02-25 | CVE-2021-22479 | Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in Huawei Harmonyos The interface of a certain HarmonyOS module has an invalid address access vulnerability. | 5.5 |
2022-02-25 | CVE-2021-37103 | Incorrect Default Permissions vulnerability in Huawei Emui and Magic UI There is an improper permission management vulnerability in the Wallet apps. | 5.5 |
2022-02-09 | CVE-2021-37107 | Out-of-bounds Write vulnerability in Huawei Emui 12.0.0 There is an improper memory access permission configuration on ACPU.Successful exploitation of this vulnerability may cause out-of-bounds access. | 5.5 |
2022-02-09 | CVE-2021-37115 | Unspecified vulnerability in Huawei Emui 12.0.0 There is an unauthorized rewriting vulnerability with the memory access management module on ACPU.Successful exploitation of this vulnerability may affect service confidentiality. | 5.5 |