Search Results (Refine Search)
- Results Type: Overview
- Keyword (text search): cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*
- CPE Name Search: true
Vuln ID | Summary | CVSS Severity |
---|---|---|
CVE-2022-48480 |
Integer overflow vulnerability in some phones. Successful exploitation of this vulnerability may affect service confidentiality. Published: May 26, 2023; 1:15:13 PM -0400 |
V4.0:(not available) V3.1: 7.5 HIGH V2.0:(not available) |
CVE-2021-46887 |
Lack of length check vulnerability in the HW_KEYMASTER module. Successful exploitation of this vulnerability may cause out-of-bounds read. Published: May 26, 2023; 1:15:13 PM -0400 |
V4.0:(not available) V3.1: 9.8 CRITICAL V2.0:(not available) |
CVE-2021-46886 |
The video framework has memory overwriting caused by addition overflow. Successful exploitation of this vulnerability may affect availability. Published: May 26, 2023; 1:15:13 PM -0400 |
V4.0:(not available) V3.1: 7.5 HIGH V2.0:(not available) |
CVE-2021-46885 |
The video framework has memory overwriting caused by addition overflow. Successful exploitation of this vulnerability may affect availability. Published: May 26, 2023; 1:15:12 PM -0400 |
V4.0:(not available) V3.1: 7.5 HIGH V2.0:(not available) |
CVE-2021-46884 |
The video framework has memory overwriting caused by addition overflow. Successful exploitation of this vulnerability may affect availability. Published: May 26, 2023; 1:15:12 PM -0400 |
V4.0:(not available) V3.1: 7.5 HIGH V2.0:(not available) |
CVE-2021-46883 |
The video framework has memory overwriting caused by addition overflow. Successful exploitation of this vulnerability may affect availability. Published: May 26, 2023; 1:15:12 PM -0400 |
V4.0:(not available) V3.1: 7.5 HIGH V2.0:(not available) |
CVE-2021-46882 |
The video framework has memory overwriting caused by addition overflow. Successful exploitation of this vulnerability may affect availability. Published: May 26, 2023; 1:15:12 PM -0400 |
V4.0:(not available) V3.1: 7.5 HIGH V2.0:(not available) |
CVE-2021-46881 |
The video framework has memory overwriting caused by addition overflow. Successful exploitation of this vulnerability may affect availability. Published: May 26, 2023; 1:15:11 PM -0400 |
V4.0:(not available) V3.1: 7.5 HIGH V2.0:(not available) |
CVE-2022-39006 |
The MPTCP module has the race condition vulnerability. Successful exploitation of this vulnerability may cause the device to restart. Published: September 16, 2022; 2:15:18 PM -0400 |
V4.0:(not available) V3.1: 5.9 MEDIUM V2.0:(not available) |
CVE-2022-39005 |
The MPTCP module has the memory leak vulnerability. Successful exploitation of this vulnerability can cause memory leaks. Published: September 16, 2022; 2:15:18 PM -0400 |
V4.0:(not available) V3.1: 7.5 HIGH V2.0:(not available) |
CVE-2022-39004 |
The MPTCP module has the memory leak vulnerability. Successful exploitation of this vulnerability can cause memory leaks. Published: September 16, 2022; 2:15:18 PM -0400 |
V4.0:(not available) V3.1: 7.5 HIGH V2.0:(not available) |
CVE-2022-39003 |
Buffer overflow vulnerability in the video framework. Successful exploitation of this vulnerability will affect the confidentiality and integrity of trusted components. Published: September 16, 2022; 2:15:18 PM -0400 |
V4.0:(not available) V3.1: 9.1 CRITICAL V2.0:(not available) |
CVE-2022-39002 |
Double free vulnerability in the storage module. Successful exploitation of this vulnerability will cause the memory to be freed twice. Published: September 16, 2022; 2:15:17 PM -0400 |
V4.0:(not available) V3.1: 9.8 CRITICAL V2.0:(not available) |
CVE-2022-39001 |
The number identification module has a path traversal vulnerability. Successful exploitation of this vulnerability may cause data disclosure. Published: September 16, 2022; 2:15:17 PM -0400 |
V4.0:(not available) V3.1: 7.5 HIGH V2.0:(not available) |
CVE-2022-39000 |
The iAware module has a vulnerability in managing malicious apps.Successful exploitation of this vulnerability will cause malicious apps to automatically start upon system startup. Published: September 16, 2022; 2:15:17 PM -0400 |
V4.0:(not available) V3.1: 9.8 CRITICAL V2.0:(not available) |
CVE-2022-38997 |
The secure OS module has configuration defects. Successful exploitation of this vulnerability may affect data confidentiality. Published: September 16, 2022; 2:15:17 PM -0400 |
V4.0:(not available) V3.1: 7.5 HIGH V2.0:(not available) |
CVE-2022-38979 |
The secure OS module has configuration defects. Successful exploitation of this vulnerability may affect data confidentiality. Published: September 16, 2022; 2:15:17 PM -0400 |
V4.0:(not available) V3.1: 7.5 HIGH V2.0:(not available) |
CVE-2022-38978 |
The secure OS module has configuration defects. Successful exploitation of this vulnerability may affect data confidentiality. Published: September 16, 2022; 2:15:17 PM -0400 |
V4.0:(not available) V3.1: 7.5 HIGH V2.0:(not available) |
CVE-2020-36600 |
Out-of-bounds write vulnerability in the power consumption module. Successful exploitation of this vulnerability may cause the system to restart. Published: September 16, 2022; 2:15:11 PM -0400 |
V4.0:(not available) V3.1: 7.5 HIGH V2.0:(not available) |
CVE-2022-37008 |
The recovery module has a vulnerability of bypassing the verification of an update package before use. Successful exploitation of this vulnerability may affect system stability. Published: August 10, 2022; 4:16:04 PM -0400 |
V4.0:(not available) V3.1: 7.5 HIGH V2.0:(not available) |