Page 46 of 325 results (0.004 seconds)

CVSS: 7.5EPSS: 0%CPEs: 3EXPL: 0

Input verification vulnerability in the WMS API. Successful exploitation of this vulnerability may cause the device to restart. • https://consumer.huawei.com/en/support/bulletin/2023/7 https://device.harmonyos.com/en/docs/security/update/security-bulletins-202307-0000001587168858 • CWE-20: Improper Input Validation •

CVSS: 9.1EPSS: 0%CPEs: 5EXPL: 0

Vulnerability of missing input length verification in the distributed file system. Successful exploitation of this vulnerability may cause out-of-bounds read. • https://consumer.huawei.com/en/support/bulletin/2023/7 https://device.harmonyos.com/en/docs/security/update/security-bulletins-202307-0000001587168858 • CWE-125: Out-of-bounds Read •

CVSS: 7.5EPSS: 0%CPEs: 5EXPL: 0

Format string vulnerability in the distributed file system. Attackers who bypass the selinux permission can exploit this vulnerability to crash the program. • https://consumer.huawei.com/en/support/bulletin/2023/7 https://device.harmonyos.com/en/docs/security/update/security-bulletins-202307-0000001587168858 • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •

CVSS: 5.3EPSS: 0%CPEs: 3EXPL: 0

Vulnerability of apps' permission to access a certain API being incompletely verified in the wireless projection module. Successful exploitation of this vulnerability may affect some wireless projection features. • https://consumer.huawei.com/en/support/bulletin/2023/7 https://device.harmonyos.com/en/docs/security/update/security-bulletins-202307-0000001587168858 • CWE-275: Permission Issues •

CVSS: 9.1EPSS: 0%CPEs: 3EXPL: 0

Key management vulnerability on system. Successful exploitation of this vulnerability may affect service availability and integrity. • https://consumer.huawei.com/en/support/bulletin/2023/7 https://device.harmonyos.com/en/docs/security/update/security-bulletins-202307-0000001587168858 • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor CWE-668: Exposure of Resource to Wrong Sphere •