Page 8 of 345 results (0.003 seconds)

CVSS: 7.8EPSS: 0%CPEs: 4EXPL: 0

08 Apr 2024 — Out-of-bounds write vulnerability in the RSMC module. Impact: Successful exploitation of this vulnerability will affect availability. Vulnerabilidad de escritura fuera de los límites en el módulo RSMC. Impacto: La explotación exitosa de esta vulnerabilidad afectará la disponibilidad. Out-of-bounds write vulnerability in the RSMC module. Impact: Successful exploitation of this vulnerability will affect availability. • https://consumer.huawei.com/en/support/bulletin/2024/3 • CWE-787: Out-of-bounds Write •

CVSS: 6.2EPSS: 0%CPEs: 4EXPL: 0

08 Apr 2024 — Out-of-bounds write vulnerability in the RSMC module. Impact: Successful exploitation of this vulnerability will affect availability. Vulnerabilidad de escritura fuera de los límites en el módulo RSMC. Impacto: La explotación exitosa de esta vulnerabilidad afectará la disponibilidad. Out-of-bounds write vulnerability in the RSMC module. Impact: Successful exploitation of this vulnerability will affect availability. • https://consumer.huawei.com/en/support/bulletin/2024/3 • CWE-20: Improper Input Validation •

CVSS: 6.5EPSS: 0%CPEs: 7EXPL: 0

08 Apr 2024 — Permission control vulnerability in the Bluetooth module. Impact: Successful exploitation of this vulnerability may affect service confidentiality. Vulnerabilidad de control de permisos en el módulo Bluetooth. Impacto: La explotación exitosa de esta vulnerabilidad puede afectar la confidencialidad del servicio. Permission control vulnerability in the Bluetooth module. Impact: Successful exploitation of this vulnerability may affect service confidentiality. • https://consumer.huawei.com/en/support/bulletin/2024/3 • CWE-732: Incorrect Permission Assignment for Critical Resource •

CVSS: 7.4EPSS: 0%CPEs: 7EXPL: 0

08 Apr 2024 — Race condition vulnerability in the Wi-Fi module. Impact: Successful exploitation of this vulnerability will affect availability. Vulnerabilidad de condición de ejecución en el módulo Wi-Fi. Impacto: La explotación exitosa de esta vulnerabilidad afectará la disponibilidad. Race condition vulnerability in the Wi-Fi module. Impact: Successful exploitation of this vulnerability will affect availability. • https://consumer.huawei.com/en/support/bulletin/2024/3 • CWE-362: Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition') •

CVSS: 7.5EPSS: 0%CPEs: 5EXPL: 0

08 Apr 2024 — Input verification vulnerability in the power module. Impact: Successful exploitation of this vulnerability will affect availability. Vulnerabilidad de verificación de entrada en el módulo de potencia. Impacto: La explotación exitosa de esta vulnerabilidad afectará la disponibilidad. Input verification vulnerability in the power module. Impact: Successful exploitation of this vulnerability will affect availability. • https://consumer.huawei.com/en/support/bulletin/2024/3 • CWE-20: Improper Input Validation •

CVSS: 5.3EPSS: 0%CPEs: 7EXPL: 0

08 Apr 2024 — Vulnerability of data verification errors in the kernel module. Impact: Successful exploitation of this vulnerability may affect service confidentiality. Vulnerabilidad de errores de verificación de datos en el módulo del kernel. Impacto: La explotación exitosa de esta vulnerabilidad puede afectar la confidencialidad del servicio. Vulnerability of data verification errors in the kernel module. Impact: Successful exploitation of this vulnerability may affect service confidentiality. • https://consumer.huawei.com/en/support/bulletin/2024/3 • CWE-120: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') •

CVSS: 7.5EPSS: 0%CPEs: 7EXPL: 0

08 Apr 2024 — Vulnerability of data verification errors in the kernel module. Impact: Successful exploitation of this vulnerability may affect service confidentiality. Vulnerabilidad de errores de verificación de datos en el módulo del kernel. Impacto: La explotación exitosa de esta vulnerabilidad puede afectar la confidencialidad del servicio. Vulnerability of data verification errors in the kernel module. Impact: Successful exploitation of this vulnerability may affect service confidentiality. • https://consumer.huawei.com/en/support/bulletin/2024/3 • CWE-120: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') •

CVSS: 7.5EPSS: 0%CPEs: 7EXPL: 0

08 Apr 2024 — Vulnerability of data verification errors in the kernel module. Impact: Successful exploitation of this vulnerability may affect service confidentiality. Vulnerabilidad de errores de verificación de datos en el módulo del kernel. Impacto: La explotación exitosa de esta vulnerabilidad puede afectar la confidencialidad del servicio. Vulnerability of data verification errors in the kernel module. Impact: Successful exploitation of this vulnerability may affect service confidentiality. • https://consumer.huawei.com/en/support/bulletin/2024/3 • CWE-120: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') •

CVSS: 7.5EPSS: 0%CPEs: 4EXPL: 0

08 Apr 2024 — Vulnerability of undefined permissions in the Calendar app. Impact: Successful exploitation of this vulnerability will affect availability. Vulnerabilidad de permisos indefinidos en la aplicación Calendario. Impacto: La explotación exitosa de esta vulnerabilidad afectará la disponibilidad. Vulnerability of undefined permissions in the Calendar app. Impact: Successful exploitation of this vulnerability will affect availability. • https://consumer.huawei.com/en/support/bulletin/2024/3 • CWE-276: Incorrect Default Permissions •

CVSS: 5.0EPSS: 0%CPEs: 7EXPL: 0

08 Apr 2024 — Vulnerability of file path verification being bypassed in the email module. Impact: Successful exploitation of this vulnerability may affect service confidentiality. Vulnerabilidad de omitir la verificación de la ruta del archivo en el módulo de correo electrónico. Impacto: La explotación exitosa de esta vulnerabilidad puede afectar la confidencialidad del servicio. Vulnerability of file path verification being bypassed in the email module. Impact: Successful exploitation of this vulnerability may affect se... • https://consumer.huawei.com/en/support/bulletin/2024/3 • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •