CVE |
Vendors |
Products |
Updated |
CVSS v3.1 |
Vulnerability of the permission to access device SNs being improperly managed.Successful exploitation of this vulnerability may affect service confidentiality. |
Vulnerability of brute-force attacks on the device authentication module.Successful exploitation of this vulnerability may affect service confidentiality. |
Use-After-Free (UAF) vulnerability in the surfaceflinger module.Successful exploitation of this vulnerability can cause system crash. |
Type confusion vulnerability in the distributed file module.Successful exploitation of this vulnerability may cause the device to restart. |
Vulnerability of package names' public keys not being verified in the security module.Successful exploitation of this vulnerability may affect service confidentiality. |
Permission control vulnerability in the audio module. Successful exploitation of this vulnerability may cause several apps to be activated automatically. |
Permission control vulnerability in the audio module. Successful exploitation of this vulnerability may cause an app to be activated automatically. |
Keep-alive vulnerability in the sticky broadcast mechanism. Successful exploitation of this vulnerability may cause malicious apps to run continuously in the background. |
Permission control vulnerability in the MediaPlaybackController module. Successful exploitation of this vulnerability may affect availability. |
Screenshot vulnerability in the input module. Successful exploitation of this vulnerability may affect confidentiality. |
Memory overwriting vulnerability in the security module. Successful exploitation of this vulnerability may affect availability. |
Vulnerability of mutex management in the bone voice ID trusted application (TA) module. Successful exploitation of this vulnerability may cause the bone voice ID feature to be unavailable. |
Vulnerability of 5G messages being sent without being encrypted in a VPN environment in the SMS message module. Successful exploitation of this vulnerability may affect confidentiality. |
Parameter verification vulnerability in the window module.Successful exploitation of this vulnerability may cause the size of an app window to be adjusted to that of a floating window. |
Command injection vulnerability in the distributed file system module. Successful exploitation of this vulnerability may cause variables in the sock structure to be modified. |
Redirection permission verification vulnerability in the home screen module. Successful exploitation of this vulnerability may cause features to perform abnormally. |
Vulnerability of unauthorized API access in the PMS module. Successful exploitation of this vulnerability may cause features to perform abnormally. |
Vulnerability of parameters not being strictly verified in the PMS module. Successful exploitation of this vulnerability may cause the system to restart. |
DoS vulnerability in the PMS module. Successful exploitation of this vulnerability may cause the system to restart. |
Vulnerability of permission control in the window module. Successful exploitation of this vulnerability may affect confidentiality. |