CVE-2023-34158
https://notcve.org/view.php?id=CVE-2023-34158
Vulnerability of spoofing trustlists of Huawei desktop.Successful exploitation of this vulnerability can cause third-party apps to hide app icons on the desktop to prevent them from being uninstalled. • https://consumer.huawei.com/en/support/bulletin/2023/6 • CWE-290: Authentication Bypass by Spoofing •
CVE-2023-34167
https://notcve.org/view.php?id=CVE-2023-34167
Vulnerability of spoofing trustlists of Huawei desktop.Successful exploitation of this vulnerability can cause third-party apps to hide app icons on the desktop to prevent them from being uninstalled. • https://consumer.huawei.com/en/support/bulletin/2023/6 • CWE-290: Authentication Bypass by Spoofing •
CVE-2023-34160
https://notcve.org/view.php?id=CVE-2023-34160
Vulnerability of spoofing trustlists of Huawei desktop.Successful exploitation of this vulnerability can cause third-party apps to hide app icons on the desktop to prevent them from being uninstalled. • https://consumer.huawei.com/en/support/bulletin/2023/6 • CWE-290: Authentication Bypass by Spoofing •
CVE-2023-34166
https://notcve.org/view.php?id=CVE-2023-34166
Vulnerability of system restart triggered by abnormal callbacks passed to APIs.Successful exploitation of this vulnerability may cause the system to restart. • https://consumer.huawei.com/en/support/bulletin/2023/6 • CWE-400: Uncontrolled Resource Consumption •
CVE-2022-48486
https://notcve.org/view.php?id=CVE-2022-48486
Configuration defects in the secure OS module.Successful exploitation of this vulnerability will affect availability. • https://consumer.huawei.com/en/support/bulletin/2023/6 •