Page 5 of 286 results (0.002 seconds)

CVSS: 7.3EPSS: 0%CPEs: 8EXPL: 0

14 Jun 2024 — Memory management vulnerability in the Gralloc module Impact: Successful exploitation of this vulnerability will affect availability. Vulnerabilidad de gestión de memoria en el módulo Gralloc Impacto: la explotación exitosa de esta vulnerabilidad afectará la disponibilidad. Memory management vulnerability in the Gralloc module Impact: Successful exploitation of this vulnerability will affect availability. • https://consumer.huawei.com/en/support/bulletin/2024/6 • CWE-908: Use of Uninitialized Resource •

CVSS: 7.9EPSS: 0%CPEs: 8EXPL: 0

14 Jun 2024 — Out-of-bounds read vulnerability in the audio module Impact: Successful exploitation of this vulnerability will affect availability. Vulnerabilidad de lectura fuera de los límites en el módulo de audio Impacto: la explotación exitosa de esta vulnerabilidad afectará la disponibilidad. Out-of-bounds read vulnerability in the audio module Impact: Successful exploitation of this vulnerability will affect availability. • https://consumer.huawei.com/en/support/bulletin/2024/6 • CWE-125: Out-of-bounds Read •

CVSS: 5.6EPSS: 0%CPEs: 9EXPL: 0

14 Jun 2024 — Memory management vulnerability in the boottime module Impact: Successful exploitation of this vulnerability can affect integrity. Vulnerabilidad de administración de memoria en el módulo de tiempo de arranque Impacto: la explotación exitosa de esta vulnerabilidad puede afectar la integridad. Memory management vulnerability in the boottime module Impact: Successful exploitation of this vulnerability can affect integrity. • https://consumer.huawei.com/en/support/bulletin/2024/6 • CWE-787: Out-of-bounds Write •

CVSS: 6.8EPSS: 0%CPEs: 9EXPL: 0

14 Jun 2024 — Vulnerability of unauthorized screenshot capturing in the WMS module Impact: Successful exploitation of this vulnerability may affect service confidentiality. Vulnerabilidad de captura de pantalla no autorizada en el módulo WMS Impacto: la explotación exitosa de esta vulnerabilidad puede afectar la confidencialidad del servicio. Vulnerability of unauthorized screenshot capturing in the WMS module Impact: Successful exploitation of this vulnerability may affect service confidentiality. • https://consumer.huawei.com/en/support/bulletin/2024/6 • CWE-269: Improper Privilege Management •

CVSS: 6.8EPSS: 0%CPEs: 8EXPL: 0

11 May 2024 — Cracking vulnerability in the OS security module Impact: Successful exploitation of this vulnerability will affect availability. Vulnerabilidad de craqueo en el módulo de seguridad del sistema operativo Impacto: la explotación exitosa de esta vulnerabilidad afectará la disponibilidad. Cracking vulnerability in the OS security module Impact: Successful exploitation of this vulnerability will affect availability. • https://consumer.huawei.com/en/support/bulletin/2024/5 • CWE-840: Business Logic Errors •

CVSS: 5.9EPSS: 0%CPEs: 8EXPL: 0

11 May 2024 — NULL pointer access vulnerability in the clock module Impact: Successful exploitation of this vulnerability will affect availability. Vulnerabilidad de acceso al puntero NULL en el módulo de reloj Impacto: la explotación exitosa de esta vulnerabilidad afectará la disponibilidad. NULL pointer access vulnerability in the clock module Impact: Successful exploitation of this vulnerability will affect availability. • https://consumer.huawei.com/en/support/bulletin/2024/5 • CWE-824: Access of Uninitialized Pointer •

CVSS: 8.4EPSS: 0%CPEs: 8EXPL: 0

11 May 2024 — Race condition vulnerability in the binder driver module Impact: Successful exploitation of this vulnerability will affect availability. Vulnerabilidad de condición de ejecución en el módulo del controlador de carpeta Impacto: la explotación exitosa de esta vulnerabilidad afectará la disponibilidad. Race condition vulnerability in the binder driver module Impact: Successful exploitation of this vulnerability will affect availability. • https://consumer.huawei.com/en/support/bulletin/2024/5 • CWE-362: Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition') •

CVSS: 6.4EPSS: 0%CPEs: 9EXPL: 0

11 May 2024 — Privilege escalation vulnerability in the account module Impact: Successful exploitation of this vulnerability will affect availability. Vulnerabilidad de escalada de privilegios en el módulo de cuenta Impacto: la explotación exitosa de esta vulnerabilidad afectará la disponibilidad. Privilege escalation vulnerability in the account module Impact: Successful exploitation of this vulnerability will affect availability. • https://consumer.huawei.com/en/support/bulletin/2024/5 • CWE-264: Permissions, Privileges, and Access Controls •

CVSS: 6.2EPSS: 0%CPEs: 9EXPL: 0

11 May 2024 — Denial of service (DoS) vulnerability in the AMS module Impact: Successful exploitation of this vulnerability will affect availability. Vulnerabilidad de denegación de servicio (DoS) en el módulo AMS Impacto: la explotación exitosa de esta vulnerabilidad afectará la disponibilidad. Denial of service (DoS) vulnerability in the AMS module Impact: Successful exploitation of this vulnerability will affect availability. • https://consumer.huawei.com/en/support/bulletin/2024/5 • CWE-248: Uncaught Exception •

CVSS: 7.1EPSS: 0%CPEs: 7EXPL: 0

11 May 2024 — Privilege escalation vulnerability in the PMS module Impact: Successful exploitation of this vulnerability may affect service confidentiality. Vulnerabilidad de escalada de privilegios en el módulo PMS Impacto: la explotación exitosa de esta vulnerabilidad puede afectar la confidencialidad del servicio. Privilege escalation vulnerability in the PMS module Impact: Successful exploitation of this vulnerability may affect service confidentiality. • https://consumer.huawei.com/en/support/bulletin/2024/5 • CWE-16: Configuration •