CVE |
Vendors |
Products |
Updated |
CVSS v3.1 |
The AMS module has a vulnerability in input validation. Successful exploitation of this vulnerability may cause privilege escalation. |
Configuration defects in the secure OS module. Successful exploitation of this vulnerability will affect confidentiality. |
Dialog boxes can still be displayed even if the screen is locked in carrier-customized USSD services. Successful exploitation of this vulnerability may affect data integrity and confidentiality. |
AppLink has a vulnerability of accessing uninitialized pointers. Successful exploitation of this vulnerability may affect system availability. |
The kernel module has the race condition vulnerability. Successful exploitation of this vulnerability may affect data confidentiality. |
The setting module has a vulnerability of improper use of APIs. Successful exploitation of this vulnerability may affect data confidentiality. |
The fingerprint sensor module has design defects. Successful exploitation of this vulnerability may affect data confidentiality. |
The communication module has a vulnerability of improper permission preservation. Successful exploitation of this vulnerability may affect system availability. |
Logical defects in code implementation in some products. Successful exploitation of this vulnerability may affect the availability of some features. |
The voice wakeup module has a vulnerability of using externally-controlled format strings. Successful exploitation of this vulnerability may affect system availability. |
Missing authorization vulnerability in the system components. Successful exploitation of this vulnerability will affect confidentiality. |
The kernel emcom module has multi-thread contention. Successful exploitation of this vulnerability may affect system availability. |
The HiAIserver has a vulnerability in verifying the validity of the weight used in the model.Successful exploitation of this vulnerability will affect AI services. |
The frame scheduling module has a null pointer dereference vulnerability. Successful exploitation of this vulnerability will affect the kernel availability. |
The frame scheduling module has a Use After Free (UAF) vulnerability.Successful exploitation of this vulnerability will affect data integrity, availability, and confidentiality. |
There is a configuration defect in the activation lock of mobile phones.Successful exploitation of this vulnerability may affect application availability. |
The chip component has a vulnerability of disclosing CPU SNs.Successful exploitation of this vulnerability may affect data confidentiality. |
The HiAIserver has a vulnerability in verifying the validity of the weight used in the model.Successful exploitation of this vulnerability will affect AI services. |
The graphics acceleration service has a vulnerability in multi-thread access to the database.Successful exploitation of this vulnerability may cause service exceptions. |
The HiAIserver has a vulnerability in verifying the validity of the properties used in the model.Successful exploitation of this vulnerability will affect AI services. |