Page 6 of 344 results (0.004 seconds)

CVSS: 7.1EPSS: 0%CPEs: 9EXPL: 0

25 Jul 2024 — Vulnerability of serialisation/deserialisation mismatch in the iAware module. Impact: Successful exploitation of this vulnerability may affect service confidentiality. • https://consumer.huawei.com/en/support/bulletin/2024/7 • CWE-26: Path Traversal: '/dir/../filename' •

CVSS: 7.3EPSS: 0%CPEs: 8EXPL: 0

14 Jun 2024 — Memory management vulnerability in the Gralloc module Impact: Successful exploitation of this vulnerability will affect availability. Vulnerabilidad de gestión de memoria en el módulo Gralloc Impacto: la explotación exitosa de esta vulnerabilidad afectará la disponibilidad. Memory management vulnerability in the Gralloc module Impact: Successful exploitation of this vulnerability will affect availability. • https://consumer.huawei.com/en/support/bulletin/2024/6 • CWE-908: Use of Uninitialized Resource •

CVSS: 7.9EPSS: 0%CPEs: 8EXPL: 0

14 Jun 2024 — Out-of-bounds read vulnerability in the audio module Impact: Successful exploitation of this vulnerability will affect availability. Vulnerabilidad de lectura fuera de los límites en el módulo de audio Impacto: la explotación exitosa de esta vulnerabilidad afectará la disponibilidad. Out-of-bounds read vulnerability in the audio module Impact: Successful exploitation of this vulnerability will affect availability. • https://consumer.huawei.com/en/support/bulletin/2024/6 • CWE-125: Out-of-bounds Read •

CVSS: 5.6EPSS: 0%CPEs: 9EXPL: 0

14 Jun 2024 — Memory management vulnerability in the boottime module Impact: Successful exploitation of this vulnerability can affect integrity. Vulnerabilidad de administración de memoria en el módulo de tiempo de arranque Impacto: la explotación exitosa de esta vulnerabilidad puede afectar la integridad. Memory management vulnerability in the boottime module Impact: Successful exploitation of this vulnerability can affect integrity. • https://consumer.huawei.com/en/support/bulletin/2024/6 • CWE-787: Out-of-bounds Write •

CVSS: 7.8EPSS: 0%CPEs: 6EXPL: 0

14 Jun 2024 — Privilege escalation vulnerability in the AMS module Impact: Successful exploitation of this vulnerability may affect service confidentiality. Vulnerabilidad de escalada de privilegios en el módulo AMS Impacto: la explotación exitosa de esta vulnerabilidad puede afectar la confidencialidad del servicio. Privilege escalation vulnerability in the AMS module Impact: Successful exploitation of this vulnerability may affect service confidentiality. • https://consumer.huawei.com/en/support/bulletin/2024/6 • CWE-269: Improper Privilege Management •

CVSS: 6.8EPSS: 0%CPEs: 9EXPL: 0

14 Jun 2024 — Vulnerability of unauthorized screenshot capturing in the WMS module Impact: Successful exploitation of this vulnerability may affect service confidentiality. Vulnerabilidad de captura de pantalla no autorizada en el módulo WMS Impacto: la explotación exitosa de esta vulnerabilidad puede afectar la confidencialidad del servicio. Vulnerability of unauthorized screenshot capturing in the WMS module Impact: Successful exploitation of this vulnerability may affect service confidentiality. • https://consumer.huawei.com/en/support/bulletin/2024/6 • CWE-269: Improper Privilege Management •

CVSS: 6.2EPSS: 0%CPEs: 5EXPL: 0

11 May 2024 — The WindowManager module has a vulnerability in permission control. Impact: Successful exploitation of this vulnerability may affect confidentiality. El módulo WindowManager tiene una vulnerabilidad en el control de permisos. Impacto: La explotación exitosa de esta vulnerabilidad puede afectar la confidencialidad. The WindowManager module has a vulnerability in permission control. Impact: Successful exploitation of this vulnerability may affect confidentiality. • https://consumer.huawei.com/en/support/bulletin/2024/5 • CWE-264: Permissions, Privileges, and Access Controls •

CVSS: 6.4EPSS: 0%CPEs: 5EXPL: 0

11 May 2024 — Cracking vulnerability in the OS security module Impact: Successful exploitation of this vulnerability will affect availability. Vulnerabilidad de craqueo en el módulo de seguridad del sistema operativo Impacto: la explotación exitosa de esta vulnerabilidad afectará la disponibilidad. Cracking vulnerability in the OS security module Impact: Successful exploitation of this vulnerability will affect availability. • https://consumer.huawei.com/en/support/bulletin/2024/5 • CWE-840: Business Logic Errors •

CVSS: 6.8EPSS: 0%CPEs: 8EXPL: 0

11 May 2024 — Cracking vulnerability in the OS security module Impact: Successful exploitation of this vulnerability will affect availability. Vulnerabilidad de craqueo en el módulo de seguridad del sistema operativo Impacto: la explotación exitosa de esta vulnerabilidad afectará la disponibilidad. Cracking vulnerability in the OS security module Impact: Successful exploitation of this vulnerability will affect availability. • https://consumer.huawei.com/en/support/bulletin/2024/5 • CWE-840: Business Logic Errors •

CVSS: 5.9EPSS: 0%CPEs: 8EXPL: 0

11 May 2024 — NULL pointer access vulnerability in the clock module Impact: Successful exploitation of this vulnerability will affect availability. Vulnerabilidad de acceso al puntero NULL en el módulo de reloj Impacto: la explotación exitosa de esta vulnerabilidad afectará la disponibilidad. NULL pointer access vulnerability in the clock module Impact: Successful exploitation of this vulnerability will affect availability. • https://consumer.huawei.com/en/support/bulletin/2024/5 • CWE-824: Access of Uninitialized Pointer •