Filtered by vendor Huawei Subscriptions
Filtered by product Emui Subscriptions
Total 676 CVE
CVE Vendors Products Updated CVSS v3.1
CVE-2022-48491 1 Huawei 1 Emui 2024-11-21 5.3 Medium
Vulnerability of missing authentication on certain HUAWEI phones.Successful exploitation of this vulnerability can lead to ads and other windows to display at any time.
CVE-2022-48490 1 Huawei 1 Emui 2024-11-21 7.5 High
Configuration defects in the secure OS module.Successful exploitation of this vulnerability will affect availability.
CVE-2022-48489 1 Huawei 1 Emui 2024-11-21 7.5 High
Configuration defects in the secure OS module.Successful exploitation of this vulnerability will affect availability.
CVE-2022-48488 1 Huawei 1 Emui 2024-11-21 5.3 Medium
Vulnerability of bypassing the default desktop security controls.Successful exploitation of this vulnerability may cause unauthorized modifications to the desktop.
CVE-2022-48487 1 Huawei 1 Emui 2024-11-21 7.5 High
Configuration defects in the secure OS module.Successful exploitation of this vulnerability will affect availability.
CVE-2022-48486 1 Huawei 1 Emui 2024-11-21 7.5 High
Configuration defects in the secure OS module.Successful exploitation of this vulnerability will affect availability.
CVE-2022-48480 1 Huawei 1 Emui 2024-11-21 7.5 High
Integer overflow vulnerability in some phones. Successful exploitation of this vulnerability may affect service confidentiality.
CVE-2022-48361 1 Huawei 2 Emui, Harmonyos 2024-11-21 5.3 Medium
The Always On Display (AOD) has a path traversal vulnerability in theme files. Successful exploitation of this vulnerability may cause a failure in reading AOD theme resources.
CVE-2022-48360 1 Huawei 2 Emui, Harmonyos 2024-11-21 7.5 High
The facial recognition module has a vulnerability in file permission control. Successful exploitation of this vulnerability may affect confidentiality.
CVE-2022-48359 1 Huawei 2 Emui, Harmonyos 2024-11-21 7.5 High
The recovery mode for updates has a vulnerability that causes arbitrary disk modification. Successful exploitation of this vulnerability may affect confidentiality.
CVE-2022-48358 1 Huawei 2 Emui, Harmonyos 2024-11-21 7.4 High
The BatteryHealthActivity has a redirection vulnerability. Successful exploitation of this vulnerability by a malicious app can cause service exceptions.
CVE-2022-48357 1 Huawei 2 Emui, Harmonyos 2024-11-21 7.5 High
Some products have the double fetch vulnerability. Successful exploitation of this vulnerability may cause denial of service (DoS) attacks to the kernel.
CVE-2022-48356 1 Huawei 2 Emui, Harmonyos 2024-11-21 7.5 High
The facial recognition module has a vulnerability in input parameter verification. Successful exploitation of this vulnerability may cause failed facial recognition.
CVE-2022-48355 1 Huawei 2 Emui, Harmonyos 2024-11-21 6.5 Medium
The Bluetooth module has a heap out-of-bounds read vulnerability. Successful exploitation of this vulnerability can cause the Bluetooth process to crash.
CVE-2022-48354 1 Huawei 2 Emui, Harmonyos 2024-11-21 6.5 Medium
The Bluetooth module has a heap out-of-bounds write vulnerability. Successful exploitation of this vulnerability can cause the Bluetooth process to crash.
CVE-2022-48353 1 Huawei 2 Emui, Harmonyos 2024-11-21 9.8 Critical
Some smartphones have configuration issues. Successful exploitation of this vulnerability may cause kernel privilege escalation, which results in system service exceptions.
CVE-2022-48352 1 Huawei 2 Emui, Harmonyos 2024-11-21 7.5 High
Some smartphones have data initialization issues. Successful exploitation of this vulnerability may cause a system panic.
CVE-2022-48351 1 Huawei 2 Emui, Harmonyos 2024-11-21 7.5 High
The secure OS module has configuration defects. Successful exploitation of this vulnerability may affect availability.
CVE-2022-48350 1 Huawei 2 Emui, Harmonyos 2024-11-21 7.5 High
The HUAWEI Messaging app has a vulnerability of unauthorized file access. Successful exploitation of this vulnerability may affect confidentiality.
CVE-2022-48349 1 Huawei 2 Emui, Harmonyos 2024-11-21 9.1 Critical
The control component has a spoofing vulnerability. Successful exploitation of this vulnerability may affect confidentiality and availability.