Page 19 of 270 results (0.007 seconds)

CVSS: 7.5EPSS: 0%CPEs: 7EXPL: 0

Some products have the double fetch vulnerability. Successful exploitation of this vulnerability may cause denial of service (DoS) attacks to the kernel. • https://consumer.huawei.com/en/support/bulletin/2023/3 https://device.harmonyos.com/en/docs/security/update/security-bulletins-202303-0000001529824505 •

CVSS: 7.8EPSS: 0%CPEs: 9EXPL: 0

The InputMethod module has a vulnerability of serialization/deserialization mismatch. Successful exploitation of this vulnerability may cause privilege escalation. • https://consumer.huawei.com/en/support/bulletin/2023/3 https://device.harmonyos.com/en/docs/security/update/security-bulletins-202303-0000001529824505 • CWE-502: Deserialization of Untrusted Data •

CVSS: 7.5EPSS: 0%CPEs: 9EXPL: 0

The pgmng module has a vulnerability in serialization/deserialization. Successful exploitation of this vulnerability may affect availability. • https://consumer.huawei.com/en/support/bulletin/2023/3 https://device.harmonyos.com/en/docs/security/update/security-bulletins-202303-0000001529824505 • CWE-502: Deserialization of Untrusted Data •

CVSS: 7.5EPSS: 0%CPEs: 9EXPL: 0

The HwContacts module has a logic bypass vulnerability. Successful exploitation of this vulnerability may affect confidentiality. • https://consumer.huawei.com/en/support/bulletin/2023/3 https://device.harmonyos.com/en/docs/security/update/security-bulletins-202303-0000001529824505 •

CVSS: 7.5EPSS: 0%CPEs: 9EXPL: 0

The recovery mode for updates has a vulnerability that causes arbitrary disk modification. Successful exploitation of this vulnerability may affect confidentiality. • https://consumer.huawei.com/en/support/bulletin/2023/3 https://device.harmonyos.com/en/docs/security/update/security-bulletins-202303-0000001529824505 •