Page 8 of 299 results (0.010 seconds)

CVSS: 7.8EPSS: 0%CPEs: 4EXPL: 0

08 Apr 2024 — Out-of-bounds write vulnerability in the RSMC module. Impact: Successful exploitation of this vulnerability will affect availability. Vulnerabilidad de escritura fuera de los límites en el módulo RSMC. Impacto: La explotación exitosa de esta vulnerabilidad afectará la disponibilidad. Out-of-bounds write vulnerability in the RSMC module. Impact: Successful exploitation of this vulnerability will affect availability. • https://consumer.huawei.com/en/support/bulletin/2024/3 •

CVSS: 9.8EPSS: 0%CPEs: 4EXPL: 0

08 Apr 2024 — Out-of-bounds write vulnerability in the RSMC module. Impact: Successful exploitation of this vulnerability will affect availability. Vulnerabilidad de escritura fuera de los límites en el módulo RSMC. Impacto: La explotación exitosa de esta vulnerabilidad afectará la disponibilidad. Out-of-bounds write vulnerability in the RSMC module. Impact: Successful exploitation of this vulnerability will affect availability. • https://consumer.huawei.com/en/support/bulletin/2024/3 • CWE-20: Improper Input Validation •

CVSS: 7.5EPSS: 0%CPEs: 7EXPL: 0

08 Apr 2024 — Permission control vulnerability in the Bluetooth module. Impact: Successful exploitation of this vulnerability may affect service confidentiality. Vulnerabilidad de control de permisos en el módulo Bluetooth. Impacto: La explotación exitosa de esta vulnerabilidad puede afectar la confidencialidad del servicio. Permission control vulnerability in the Bluetooth module. Impact: Successful exploitation of this vulnerability may affect service confidentiality. • https://consumer.huawei.com/en/support/bulletin/2024/3 • CWE-732: Incorrect Permission Assignment for Critical Resource •

CVSS: 7.4EPSS: 0%CPEs: 7EXPL: 0

08 Apr 2024 — Race condition vulnerability in the Wi-Fi module. Impact: Successful exploitation of this vulnerability will affect availability. Vulnerabilidad de condición de ejecución en el módulo Wi-Fi. Impacto: La explotación exitosa de esta vulnerabilidad afectará la disponibilidad. Race condition vulnerability in the Wi-Fi module. Impact: Successful exploitation of this vulnerability will affect availability. • https://consumer.huawei.com/en/support/bulletin/2024/3 • CWE-362: Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition') •

CVSS: 7.5EPSS: 0%CPEs: 5EXPL: 0

08 Apr 2024 — Input verification vulnerability in the power module. Impact: Successful exploitation of this vulnerability will affect availability. Vulnerabilidad de verificación de entrada en el módulo de potencia. Impacto: La explotación exitosa de esta vulnerabilidad afectará la disponibilidad. Input verification vulnerability in the power module. Impact: Successful exploitation of this vulnerability will affect availability. • https://consumer.huawei.com/en/support/bulletin/2024/3 • CWE-20: Improper Input Validation •

CVSS: 7.5EPSS: 0%CPEs: 7EXPL: 0

08 Apr 2024 — Vulnerability of data verification errors in the kernel module. Impact: Successful exploitation of this vulnerability may affect service confidentiality. Vulnerabilidad de errores de verificación de datos en el módulo del kernel. Impacto: La explotación exitosa de esta vulnerabilidad puede afectar la confidencialidad del servicio. Vulnerability of data verification errors in the kernel module. Impact: Successful exploitation of this vulnerability may affect service confidentiality. • https://consumer.huawei.com/en/support/bulletin/2024/3 • CWE-120: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') •

CVSS: 7.5EPSS: 0%CPEs: 7EXPL: 0

08 Apr 2024 — Vulnerability of data verification errors in the kernel module. Impact: Successful exploitation of this vulnerability may affect service confidentiality. Vulnerabilidad de errores de verificación de datos en el módulo del kernel. Impacto: La explotación exitosa de esta vulnerabilidad puede afectar la confidencialidad del servicio. Vulnerability of data verification errors in the kernel module. Impact: Successful exploitation of this vulnerability may affect service confidentiality. • https://consumer.huawei.com/en/support/bulletin/2024/3 • CWE-120: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') •

CVSS: 7.5EPSS: 0%CPEs: 7EXPL: 0

08 Apr 2024 — Vulnerability of data verification errors in the kernel module. Impact: Successful exploitation of this vulnerability may affect service confidentiality. Vulnerabilidad de errores de verificación de datos en el módulo del kernel. Impacto: La explotación exitosa de esta vulnerabilidad puede afectar la confidencialidad del servicio. Vulnerability of data verification errors in the kernel module. Impact: Successful exploitation of this vulnerability may affect service confidentiality. • https://consumer.huawei.com/en/support/bulletin/2024/3 • CWE-120: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') •

CVSS: 7.8EPSS: 0%CPEs: 3EXPL: 0

08 Apr 2024 — Vulnerability of package name verification being bypassed in the Calendar app. Impact: Successful exploitation of this vulnerability may affect service confidentiality. Vulnerabilidad de omitir la verificación del nombre del paquete en la aplicación Calendario. Impacto: La explotación exitosa de esta vulnerabilidad puede afectar la confidencialidad del servicio. Vulnerability of package name verification being bypassed in the Calendar app. Impact: Successful exploitation of this vulnerability may affect ser... • https://https://consumer.huawei.com/en/support/bulletin/2024/3 •

CVSS: 7.5EPSS: 0%CPEs: 4EXPL: 0

08 Apr 2024 — Vulnerability of undefined permissions in the Calendar app. Impact: Successful exploitation of this vulnerability will affect availability. Vulnerabilidad de permisos indefinidos en la aplicación Calendario. Impacto: La explotación exitosa de esta vulnerabilidad afectará la disponibilidad. Vulnerability of undefined permissions in the Calendar app. Impact: Successful exploitation of this vulnerability will affect availability. • https://consumer.huawei.com/en/support/bulletin/2024/3 • CWE-276: Incorrect Default Permissions •