| CVE |
Vendors |
Products |
Updated |
CVSS v3.1 |
| Permission verification vulnerability in the lock screen module.
Impact: Successful exploitation of this vulnerability will affect availability. |
| Use After Free (UAF) vulnerability in the underlying driver module.
Impact: Successful exploitation of this vulnerability will affect availability. |
| Script injection vulnerability in the email module.Successful exploitation of this vulnerability may affect service confidentiality, integrity, and availability. |
| Vulnerability of improper access control in the email module.Successful exploitation of this vulnerability may affect service confidentiality. |
| Vulnerability of input data not being verified in the cellular data module.Successful exploitation of this vulnerability may cause out-of-bounds access. |
| Information management vulnerability in the Gallery module.Successful exploitation of this vulnerability may affect service confidentiality. |
| Permission control vulnerability in the package management module.Successful exploitation of this vulnerability may affect service confidentiality. |
| Vulnerability of input parameter verification in the motor module.Successful exploitation of this vulnerability may affect availability. |
| Input verification vulnerability in the account module.Successful exploitation of this vulnerability may cause features to perform abnormally. |
| Vulnerability of improper access control in the media library module.Successful exploitation of this vulnerability may affect service availability and integrity. |
| Out-of-bounds read vulnerability in the smart activity recognition module.Successful exploitation of this vulnerability may cause features to perform abnormally. |
| Permission management vulnerability in the lock screen module.Successful exploitation of this vulnerability may affect availability. |
| Vulnerability of configuration defects in some APIs of the audio module.Successful exploitation of this vulnerability may affect availability. |
| Vulnerability of foreground service restrictions being bypassed in the NMS module.Successful exploitation of this vulnerability may affect service confidentiality. |
| The control component has a spoofing vulnerability. Successful exploitation of this vulnerability may affect confidentiality and availability. |
| The MediaProvider module has a vulnerability of unauthorized data read. Successful exploitation of this vulnerability may affect confidentiality and integrity. |
| The secure OS module has configuration defects. Successful exploitation of this vulnerability may affect availability. |
| The HUAWEI Messaging app has a vulnerability of unauthorized file access. Successful exploitation of this vulnerability may affect confidentiality. |
| Some smartphones have configuration issues. Successful exploitation of this vulnerability may cause kernel privilege escalation, which results in system service exceptions. |
| Some smartphones have data initialization issues. Successful exploitation of this vulnerability may cause a system panic. |