Page 4 of 60 results (0.006 seconds)

CVSS: 7.8EPSS: 0%CPEs: 1EXPL: 0

12 Dec 2024 — Process residence vulnerability in abnormal scenarios in the print module Impact: Successful exploitation of this vulnerability may affect power consumption. Process residence vulnerability in abnormal scenarios in the print module Impact: Successful exploitation of this vulnerability may affect power consumption. • https://consumer.huawei.com/en/support/bulletin/2024/12 • CWE CATEGORY •

CVSS: 7.8EPSS: 0%CPEs: 1EXPL: 0

12 Dec 2024 — Cross-process screen stack vulnerability in the UIExtension module Impact: Successful exploitation of this vulnerability may affect service confidentiality. Cross-process screen stack vulnerability in the UIExtension module Impact: Successful exploitation of this vulnerability may affect service confidentiality. • https://consumer.huawei.com/en/support/bulletin/2024/12 • CWE-264: Permissions, Privileges, and Access Controls •

CVSS: 7.8EPSS: 0%CPEs: 1EXPL: 0

12 Dec 2024 — Read/Write vulnerability in the image decoding module Impact: Successful exploitation of this vulnerability will affect availability. Read/Write vulnerability in the image decoding module Impact: Successful exploitation of this vulnerability will affect availability. • https://consumer.huawei.com/en/support/bulletin/2024/12 • CWE-345: Insufficient Verification of Data Authenticity •

CVSS: 7.8EPSS: 0%CPEs: 1EXPL: 0

12 Dec 2024 — Cross-process screen stack vulnerability in the UIExtension module Impact: Successful exploitation of this vulnerability may affect service confidentiality. Cross-process screen stack vulnerability in the UIExtension module Impact: Successful exploitation of this vulnerability may affect service confidentiality. • https://consumer.huawei.com/en/support/bulletin/2024/12 • CWE-269: Improper Privilege Management •

CVSS: 7.8EPSS: 0%CPEs: 1EXPL: 0

12 Dec 2024 — Read/Write vulnerability in the image decoding module Impact: Successful exploitation of this vulnerability will affect availability. Read/Write vulnerability in the image decoding module Impact: Successful exploitation of this vulnerability will affect availability. • https://consumer.huawei.com/en/support/bulletin/2024/12 • CWE-20: Improper Input Validation •

CVSS: 7.8EPSS: 0%CPEs: 1EXPL: 0

12 Dec 2024 — Read/Write vulnerability in the image decoding module Impact: Successful exploitation of this vulnerability will affect availability. Read/Write vulnerability in the image decoding module Impact: Successful exploitation of this vulnerability will affect availability. • https://consumer.huawei.com/en/support/bulletin/2024/12 • CWE-20: Improper Input Validation •

CVSS: 7.8EPSS: 0%CPEs: 1EXPL: 0

12 Dec 2024 — Read/Write vulnerability in the image decoding module Impact: Successful exploitation of this vulnerability will affect availability. Read/Write vulnerability in the image decoding module Impact: Successful exploitation of this vulnerability will affect availability. • https://consumer.huawei.com/en/support/bulletin/2024/12 • CWE-20: Improper Input Validation •

CVSS: 7.8EPSS: 0%CPEs: 1EXPL: 0

12 Dec 2024 — Null pointer dereference vulnerability in the image decoding module Impact: Successful exploitation of this vulnerability will affect availability. Null pointer dereference vulnerability in the image decoding module Impact: Successful exploitation of this vulnerability will affect availability. • https://consumer.huawei.com/en/support/bulletin/2024/12 • CWE-248: Uncaught Exception CWE-476: NULL Pointer Dereference •

CVSS: 7.8EPSS: 0%CPEs: 1EXPL: 0

12 Dec 2024 — Read/Write vulnerability in the image decoding module Impact: Successful exploitation of this vulnerability will affect availability. Read/Write vulnerability in the image decoding module Impact: Successful exploitation of this vulnerability will affect availability. • https://consumer.huawei.com/en/support/bulletin/2024/12 • CWE-120: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') •

CVSS: 7.8EPSS: 0%CPEs: 1EXPL: 0

12 Dec 2024 — Cross-process screen stack vulnerability in the UIExtension module Impact: Successful exploitation of this vulnerability may affect service confidentiality. Cross-process screen stack vulnerability in the UIExtension module Impact: Successful exploitation of this vulnerability may affect service confidentiality. • https://consumer.huawei.com/en/support/bulletin/2024/12 • CWE-264: Permissions, Privileges, and Access Controls •