Page 8 of 344 results (0.007 seconds)

CVSS: 7.8EPSS: 0%CPEs: 9EXPL: 0

11 May 2024 — Permission verification vulnerability in the system sharing pop-up module Impact: Successful exploitation of this vulnerability will affect availability. Vulnerabilidad de verificación de permisos en el módulo emergente de uso compartido del sistema Impacto: la explotación exitosa de esta vulnerabilidad afectará la disponibilidad. Permission verification vulnerability in the system sharing pop-up module Impact: Successful exploitation of this vulnerability will affect availability. • https://consumer.huawei.com/en/support/bulletin/2024/5 • CWE-20: Improper Input Validation •

CVSS: 7.8EPSS: 0%CPEs: 5EXPL: 0

11 May 2024 — Insufficient verification vulnerability in the system sharing pop-up module Impact: Successful exploitation of this vulnerability will affect availability. Vulnerabilidad de verificación insuficiente en el módulo emergente de uso compartido del sistema Impacto: la explotación exitosa de esta vulnerabilidad afectará la disponibilidad. Insufficient verification vulnerability in the system sharing pop-up module Impact: Successful exploitation of this vulnerability will affect availability. • https://consumer.huawei.com/en/support/bulletin/2024/5 • CWE-20: Improper Input Validation •

CVSS: 7.5EPSS: 0%CPEs: 6EXPL: 0

08 Apr 2024 — Input verification vulnerability in the call module. Impact: Successful exploitation of this vulnerability may affect service confidentiality. Vulnerabilidad de verificación de entrada en el módulo de llamada. Impacto: La explotación exitosa de esta vulnerabilidad puede afectar la confidencialidad del servicio. Input verification vulnerability in the call module. Impact: Successful exploitation of this vulnerability may affect service confidentiality. • https://consumer.huawei.com/en/support/bulletin/2024/3 • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •

CVSS: 7.5EPSS: 0%CPEs: 4EXPL: 0

08 Apr 2024 — Vulnerability of input parameters being not strictly verified in the RSMC module. Impact: Successful exploitation of this vulnerability may cause out-of-bounds write. La vulnerabilidad de los parámetros de entrada no se verifica estrictamente en el módulo RSMC. Impacto: La explotación exitosa de esta vulnerabilidad puede causar escritura fuera de límites. Vulnerability of input parameters being not strictly verified in the RSMC module. Impact: Successful exploitation of this vulnerability may cause out-of-b... • https://consumer.huawei.com/en/support/bulletin/2024/3 • CWE-120: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') •

CVSS: 7.8EPSS: 0%CPEs: 4EXPL: 0

08 Apr 2024 — Out-of-bounds write vulnerability in the RSMC module. Impact: Successful exploitation of this vulnerability will affect availability. Vulnerabilidad de escritura fuera de los límites en el módulo RSMC. Impacto: La explotación exitosa de esta vulnerabilidad afectará la disponibilidad. Out-of-bounds write vulnerability in the RSMC module. Impact: Successful exploitation of this vulnerability will affect availability. • https://consumer.huawei.com/en/support/bulletin/2024/3 • CWE-787: Out-of-bounds Write •

CVSS: 6.2EPSS: 0%CPEs: 4EXPL: 0

08 Apr 2024 — Out-of-bounds write vulnerability in the RSMC module. Impact: Successful exploitation of this vulnerability will affect availability. Vulnerabilidad de escritura fuera de los límites en el módulo RSMC. Impacto: La explotación exitosa de esta vulnerabilidad afectará la disponibilidad. Out-of-bounds write vulnerability in the RSMC module. Impact: Successful exploitation of this vulnerability will affect availability. • https://consumer.huawei.com/en/support/bulletin/2024/3 • CWE-20: Improper Input Validation •

CVSS: 6.5EPSS: 0%CPEs: 7EXPL: 0

08 Apr 2024 — Permission control vulnerability in the Bluetooth module. Impact: Successful exploitation of this vulnerability may affect service confidentiality. Vulnerabilidad de control de permisos en el módulo Bluetooth. Impacto: La explotación exitosa de esta vulnerabilidad puede afectar la confidencialidad del servicio. Permission control vulnerability in the Bluetooth module. Impact: Successful exploitation of this vulnerability may affect service confidentiality. • https://consumer.huawei.com/en/support/bulletin/2024/3 • CWE-732: Incorrect Permission Assignment for Critical Resource •

CVSS: 7.4EPSS: 0%CPEs: 7EXPL: 0

08 Apr 2024 — Race condition vulnerability in the Wi-Fi module. Impact: Successful exploitation of this vulnerability will affect availability. Vulnerabilidad de condición de ejecución en el módulo Wi-Fi. Impacto: La explotación exitosa de esta vulnerabilidad afectará la disponibilidad. Race condition vulnerability in the Wi-Fi module. Impact: Successful exploitation of this vulnerability will affect availability. • https://consumer.huawei.com/en/support/bulletin/2024/3 • CWE-362: Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition') •

CVSS: 7.5EPSS: 0%CPEs: 5EXPL: 0

08 Apr 2024 — Input verification vulnerability in the power module. Impact: Successful exploitation of this vulnerability will affect availability. Vulnerabilidad de verificación de entrada en el módulo de potencia. Impacto: La explotación exitosa de esta vulnerabilidad afectará la disponibilidad. Input verification vulnerability in the power module. Impact: Successful exploitation of this vulnerability will affect availability. • https://consumer.huawei.com/en/support/bulletin/2024/3 • CWE-20: Improper Input Validation •

CVSS: 5.3EPSS: 0%CPEs: 7EXPL: 0

08 Apr 2024 — Vulnerability of data verification errors in the kernel module. Impact: Successful exploitation of this vulnerability may affect service confidentiality. Vulnerabilidad de errores de verificación de datos en el módulo del kernel. Impacto: La explotación exitosa de esta vulnerabilidad puede afectar la confidencialidad del servicio. Vulnerability of data verification errors in the kernel module. Impact: Successful exploitation of this vulnerability may affect service confidentiality. • https://consumer.huawei.com/en/support/bulletin/2024/3 • CWE-120: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') •