CVE |
Vendors |
Products |
Updated |
CVSS v3.1 |
Keep-alive vulnerability in the sticky broadcast mechanism. Successful exploitation of this vulnerability may cause malicious apps to run continuously in the background. |
Permission control vulnerability in the MediaPlaybackController module. Successful exploitation of this vulnerability may affect availability. |
Screenshot vulnerability in the input module. Successful exploitation of this vulnerability may affect confidentiality. |
Memory overwriting vulnerability in the security module. Successful exploitation of this vulnerability may affect availability. |
Vulnerability of mutex management in the bone voice ID trusted application (TA) module. Successful exploitation of this vulnerability may cause the bone voice ID feature to be unavailable. |
Vulnerability of 5G messages being sent without being encrypted in a VPN environment in the SMS message module. Successful exploitation of this vulnerability may affect confidentiality. |
Parameter verification vulnerability in the window module.Successful exploitation of this vulnerability may cause the size of an app window to be adjusted to that of a floating window. |
Command injection vulnerability in the distributed file system module. Successful exploitation of this vulnerability may cause variables in the sock structure to be modified. |
Redirection permission verification vulnerability in the home screen module. Successful exploitation of this vulnerability may cause features to perform abnormally. |
Vulnerability of unauthorized API access in the PMS module. Successful exploitation of this vulnerability may cause features to perform abnormally. |
Vulnerability of parameters not being strictly verified in the PMS module. Successful exploitation of this vulnerability may cause the system to restart. |
DoS vulnerability in the PMS module. Successful exploitation of this vulnerability may cause the system to restart. |
Vulnerability of permission control in the window module. Successful exploitation of this vulnerability may affect confidentiality. |
Vulnerability of defects introduced in the design process in the HiviewTunner module. Successful exploitation of this vulnerability may cause service hijacking. |
Vulnerability of missing authorization in the kernel module. Successful exploitation of this vulnerability may affect integrity and confidentiality. |
Vulnerability of improper permission management in the displayengine module. Successful exploitation of this vulnerability may cause the screen to turn dim. |
The DP module has a service hijacking vulnerability.Successful exploitation of this vulnerability may affect some Super Device services. |
Data security classification vulnerability in the DDMP module. Successful exploitation of this vulnerability may affect confidentiality. |
Key management vulnerability on system. Successful exploitation of this vulnerability may affect service availability and integrity. |
DoS vulnerability in the PMS module. Successful exploitation of this vulnerability may cause the system to restart. |