Page 7 of 75 results (0.012 seconds)

CVSS: 6.4EPSS: 0%CPEs: 5EXPL: 0

11 May 2024 — Cracking vulnerability in the OS security module Impact: Successful exploitation of this vulnerability will affect availability. Vulnerabilidad de craqueo en el módulo de seguridad del sistema operativo Impacto: la explotación exitosa de esta vulnerabilidad afectará la disponibilidad. Cracking vulnerability in the OS security module Impact: Successful exploitation of this vulnerability will affect availability. • https://consumer.huawei.com/en/support/bulletin/2024/5 • CWE-840: Business Logic Errors •

CVSS: 6.8EPSS: 0%CPEs: 8EXPL: 0

11 May 2024 — Cracking vulnerability in the OS security module Impact: Successful exploitation of this vulnerability will affect availability. Vulnerabilidad de craqueo en el módulo de seguridad del sistema operativo Impacto: la explotación exitosa de esta vulnerabilidad afectará la disponibilidad. Cracking vulnerability in the OS security module Impact: Successful exploitation of this vulnerability will affect availability. • https://consumer.huawei.com/en/support/bulletin/2024/5 • CWE-840: Business Logic Errors •

CVSS: 5.9EPSS: 0%CPEs: 8EXPL: 0

11 May 2024 — NULL pointer access vulnerability in the clock module Impact: Successful exploitation of this vulnerability will affect availability. Vulnerabilidad de acceso al puntero NULL en el módulo de reloj Impacto: la explotación exitosa de esta vulnerabilidad afectará la disponibilidad. NULL pointer access vulnerability in the clock module Impact: Successful exploitation of this vulnerability will affect availability. • https://consumer.huawei.com/en/support/bulletin/2024/5 • CWE-824: Access of Uninitialized Pointer •

CVSS: 4.1EPSS: 0%CPEs: 4EXPL: 0

11 May 2024 — Race condition vulnerability in the soundtrigger module Impact: Successful exploitation of this vulnerability will affect availability. Vulnerabilidad de condición de ejecución en el módulo de activación de sonido Impacto: la explotación exitosa de esta vulnerabilidad afectará la disponibilidad. Race condition vulnerability in the soundtrigger module Impact: Successful exploitation of this vulnerability will affect availability. • https://consumer.huawei.com/en/support/bulletin/2024/5 • CWE-362: Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition') •

CVSS: 8.4EPSS: 0%CPEs: 8EXPL: 0

11 May 2024 — Race condition vulnerability in the binder driver module Impact: Successful exploitation of this vulnerability will affect availability. Vulnerabilidad de condición de ejecución en el módulo del controlador de carpeta Impacto: la explotación exitosa de esta vulnerabilidad afectará la disponibilidad. Race condition vulnerability in the binder driver module Impact: Successful exploitation of this vulnerability will affect availability. • https://consumer.huawei.com/en/support/bulletin/2024/5 • CWE-362: Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition') •

CVSS: 6.4EPSS: 0%CPEs: 9EXPL: 0

11 May 2024 — Privilege escalation vulnerability in the account module Impact: Successful exploitation of this vulnerability will affect availability. Vulnerabilidad de escalada de privilegios en el módulo de cuenta Impacto: la explotación exitosa de esta vulnerabilidad afectará la disponibilidad. Privilege escalation vulnerability in the account module Impact: Successful exploitation of this vulnerability will affect availability. • https://consumer.huawei.com/en/support/bulletin/2024/5 • CWE-264: Permissions, Privileges, and Access Controls •

CVSS: 6.2EPSS: 0%CPEs: 9EXPL: 0

11 May 2024 — Denial of service (DoS) vulnerability in the AMS module Impact: Successful exploitation of this vulnerability will affect availability. Vulnerabilidad de denegación de servicio (DoS) en el módulo AMS Impacto: la explotación exitosa de esta vulnerabilidad afectará la disponibilidad. Denial of service (DoS) vulnerability in the AMS module Impact: Successful exploitation of this vulnerability will affect availability. • https://consumer.huawei.com/en/support/bulletin/2024/5 • CWE-248: Uncaught Exception •

CVSS: 7.1EPSS: 0%CPEs: 7EXPL: 0

11 May 2024 — Privilege escalation vulnerability in the PMS module Impact: Successful exploitation of this vulnerability may affect service confidentiality. Vulnerabilidad de escalada de privilegios en el módulo PMS Impacto: la explotación exitosa de esta vulnerabilidad puede afectar la confidencialidad del servicio. Privilege escalation vulnerability in the PMS module Impact: Successful exploitation of this vulnerability may affect service confidentiality. • https://consumer.huawei.com/en/support/bulletin/2024/5 • CWE-16: Configuration •

CVSS: 5.6EPSS: 0%CPEs: 9EXPL: 0

11 May 2024 — Out-of-bounds access vulnerability in the memory module Impact: Successful exploitation of this vulnerability will affect availability. Vulnerabilidad de acceso fuera de los límites en el módulo de memoria Impacto: la explotación exitosa de esta vulnerabilidad afectará la disponibilidad. Out-of-bounds access vulnerability in the memory module Impact: Successful exploitation of this vulnerability will affect availability. • https://consumer.huawei.com/en/support/bulletin/2024/5 • CWE-362: Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition') •

CVSS: 5.5EPSS: 0%CPEs: 5EXPL: 0

11 May 2024 — Double-free vulnerability in the RSMC module Impact: Successful exploitation of this vulnerability will affect availability. Vulnerabilidad de doble liberación en el módulo RSMC Impacto: la explotación exitosa de esta vulnerabilidad afectará la disponibilidad. Double-free vulnerability in the RSMC module Impact: Successful exploitation of this vulnerability will affect availability. • https://consumer.huawei.com/en/support/bulletin/2024/5 • CWE-415: Double Free •