Search Results (Refine Search)
- Keyword (text search): cpe:2.3:o:huawei:emui:10.1.1:*:*:*:*:*:*:*
- CPE Name Search: true
Vuln ID | Summary | CVSS Severity |
---|---|---|
CVE-2022-48480 |
Integer overflow vulnerability in some phones. Successful exploitation of this vulnerability may affect service confidentiality. Published: May 26, 2023; 1:15:13 PM -0400 |
V4.0:(not available) V3.1: 7.5 HIGH V2.0:(not available) |
CVE-2021-46887 |
Lack of length check vulnerability in the HW_KEYMASTER module. Successful exploitation of this vulnerability may cause out-of-bounds read. Published: May 26, 2023; 1:15:13 PM -0400 |
V4.0:(not available) V3.1: 9.8 CRITICAL V2.0:(not available) |
CVE-2021-46886 |
The video framework has memory overwriting caused by addition overflow. Successful exploitation of this vulnerability may affect availability. Published: May 26, 2023; 1:15:13 PM -0400 |
V4.0:(not available) V3.1: 7.5 HIGH V2.0:(not available) |
CVE-2021-46885 |
The video framework has memory overwriting caused by addition overflow. Successful exploitation of this vulnerability may affect availability. Published: May 26, 2023; 1:15:12 PM -0400 |
V4.0:(not available) V3.1: 7.5 HIGH V2.0:(not available) |
CVE-2021-46884 |
The video framework has memory overwriting caused by addition overflow. Successful exploitation of this vulnerability may affect availability. Published: May 26, 2023; 1:15:12 PM -0400 |
V4.0:(not available) V3.1: 7.5 HIGH V2.0:(not available) |
CVE-2021-46883 |
The video framework has memory overwriting caused by addition overflow. Successful exploitation of this vulnerability may affect availability. Published: May 26, 2023; 1:15:12 PM -0400 |
V4.0:(not available) V3.1: 7.5 HIGH V2.0:(not available) |
CVE-2021-46882 |
The video framework has memory overwriting caused by addition overflow. Successful exploitation of this vulnerability may affect availability. Published: May 26, 2023; 1:15:12 PM -0400 |
V4.0:(not available) V3.1: 7.5 HIGH V2.0:(not available) |
CVE-2021-46881 |
The video framework has memory overwriting caused by addition overflow. Successful exploitation of this vulnerability may affect availability. Published: May 26, 2023; 1:15:11 PM -0400 |
V4.0:(not available) V3.1: 7.5 HIGH V2.0:(not available) |
CVE-2022-38997 |
The secure OS module has configuration defects. Successful exploitation of this vulnerability may affect data confidentiality. Published: September 16, 2022; 2:15:17 PM -0400 |
V4.0:(not available) V3.1: 7.5 HIGH V2.0:(not available) |
CVE-2022-38993 |
The secure OS module has configuration defects. Successful exploitation of this vulnerability may affect system availability. Published: September 16, 2022; 2:15:17 PM -0400 |
V4.0:(not available) V3.1: 7.5 HIGH V2.0:(not available) |
CVE-2022-38992 |
The secure OS module has configuration defects. Successful exploitation of this vulnerability may affect data confidentiality. Published: September 16, 2022; 2:15:17 PM -0400 |
V4.0:(not available) V3.1: 7.5 HIGH V2.0:(not available) |
CVE-2022-38991 |
The secure OS module has configuration defects. Successful exploitation of this vulnerability may affect data confidentiality. Published: September 16, 2022; 2:15:17 PM -0400 |
V4.0:(not available) V3.1: 7.5 HIGH V2.0:(not available) |
CVE-2022-38990 |
The secure OS module has configuration defects. Successful exploitation of this vulnerability may affect system availability. Published: September 16, 2022; 2:15:17 PM -0400 |
V4.0:(not available) V3.1: 7.5 HIGH V2.0:(not available) |
CVE-2022-38989 |
The secure OS module has configuration defects. Successful exploitation of this vulnerability may affect system availability. Published: September 16, 2022; 2:15:17 PM -0400 |
V4.0:(not available) V3.1: 7.5 HIGH V2.0:(not available) |
CVE-2022-38988 |
The secure OS module has configuration defects. Successful exploitation of this vulnerability may affect data confidentiality. Published: September 16, 2022; 2:15:17 PM -0400 |
V4.0:(not available) V3.1: 7.5 HIGH V2.0:(not available) |
CVE-2022-38987 |
The secure OS module has configuration defects. Successful exploitation of this vulnerability may affect system availability. Published: September 16, 2022; 2:15:17 PM -0400 |
V4.0:(not available) V3.1: 7.5 HIGH V2.0:(not available) |
CVE-2022-38979 |
The secure OS module has configuration defects. Successful exploitation of this vulnerability may affect data confidentiality. Published: September 16, 2022; 2:15:17 PM -0400 |
V4.0:(not available) V3.1: 7.5 HIGH V2.0:(not available) |
CVE-2022-38978 |
The secure OS module has configuration defects. Successful exploitation of this vulnerability may affect data confidentiality. Published: September 16, 2022; 2:15:17 PM -0400 |
V4.0:(not available) V3.1: 7.5 HIGH V2.0:(not available) |
CVE-2021-40019 |
Out-of-bounds heap read vulnerability in the HW_KEYMASTER module. Successful exploitation of this vulnerability may cause out-of-bounds access. Published: September 16, 2022; 2:15:11 PM -0400 |
V4.0:(not available) V3.1: 9.1 CRITICAL V2.0:(not available) |
CVE-2020-36600 |
Out-of-bounds write vulnerability in the power consumption module. Successful exploitation of this vulnerability may cause the system to restart. Published: September 16, 2022; 2:15:11 PM -0400 |
V4.0:(not available) V3.1: 7.5 HIGH V2.0:(not available) |