CVE |
Vendors |
Products |
Updated |
CVSS v3.1 |
Use After Free (UAF) vulnerability in the underlying driver module.
Impact: Successful exploitation of this vulnerability will affect availability. |
Script injection vulnerability in the email module.Successful exploitation of this vulnerability may affect service confidentiality, integrity, and availability. |
Vulnerability of improper access control in the email module.Successful exploitation of this vulnerability may affect service confidentiality. |
Vulnerability of input data not being verified in the cellular data module.Successful exploitation of this vulnerability may cause out-of-bounds access. |
Information management vulnerability in the Gallery module.Successful exploitation of this vulnerability may affect service confidentiality. |
Permission control vulnerability in the package management module.Successful exploitation of this vulnerability may affect service confidentiality. |
Vulnerability of input parameter verification in the motor module.Successful exploitation of this vulnerability may affect availability. |
Input verification vulnerability in the account module.Successful exploitation of this vulnerability may cause features to perform abnormally. |
Vulnerability of improper access control in the media library module.Successful exploitation of this vulnerability may affect service availability and integrity. |
Out-of-bounds read vulnerability in the smart activity recognition module.Successful exploitation of this vulnerability may cause features to perform abnormally. |
Permission management vulnerability in the lock screen module.Successful exploitation of this vulnerability may affect availability. |
Vulnerability of configuration defects in some APIs of the audio module.Successful exploitation of this vulnerability may affect availability. |
Vulnerability of foreground service restrictions being bypassed in the NMS module.Successful exploitation of this vulnerability may affect service confidentiality. |
The control component has a spoofing vulnerability. Successful exploitation of this vulnerability may affect confidentiality and availability. |
The MediaProvider module has a vulnerability of unauthorized data read. Successful exploitation of this vulnerability may affect confidentiality and integrity. |
The secure OS module has configuration defects. Successful exploitation of this vulnerability may affect availability. |
The HUAWEI Messaging app has a vulnerability of unauthorized file access. Successful exploitation of this vulnerability may affect confidentiality. |
Some smartphones have configuration issues. Successful exploitation of this vulnerability may cause kernel privilege escalation, which results in system service exceptions. |
Some smartphones have data initialization issues. Successful exploitation of this vulnerability may cause a system panic. |
The Bluetooth module has a heap out-of-bounds write vulnerability. Successful exploitation of this vulnerability can cause the Bluetooth process to crash. |