Huawei

Harmonyos

929 vulnerabilities found.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.04%
  • Published 16.06.2023 07:15:08
  • Last modified 17.12.2024 17:15:07

Vulnerability of HwWatchHealth being hijacked.Successful exploitation of this vulnerability may cause repeated pop-up windows of the app.

  • EPSS 0.05%
  • Published 16.06.2023 07:15:08
  • Last modified 21.11.2024 08:06:41

Unauthorized access vulnerability in the Save for later feature provided by AI Touch.Successful exploitation of this vulnerability may cause third-party apps to forge a URI for unauthorized access with zero permissions.

  • EPSS 0.13%
  • Published 26.05.2023 17:15:13
  • Last modified 15.01.2025 17:15:10

The facial recognition TA of some products lacks memory length verification. Successful exploitation of this vulnerability may cause exceptions of the facial recognition service.

  • EPSS 0.13%
  • Published 26.05.2023 17:15:13
  • Last modified 15.01.2025 17:15:10

The facial recognition TA of some products has the out-of-bounds memory read vulnerability. Successful exploitation of this vulnerability may cause exceptions of the facial recognition service.

  • EPSS 0.09%
  • Published 20.05.2023 15:15:08
  • Last modified 21.01.2025 18:15:13

The window management module lacks permission verification.Successful exploitation of this vulnerability may affect confidentiality.

  • EPSS 0.09%
  • Published 20.05.2023 15:15:08
  • Last modified 21.01.2025 17:15:12

The Settings module has the file privilege escalation vulnerability.Successful exploitation of this vulnerability may affect confidentiality.

  • EPSS 0.09%
  • Published 20.05.2023 15:15:08
  • Last modified 21.01.2025 17:15:13

The Settings module has the file privilege escalation vulnerability.Successful exploitation of this vulnerability may affect confidentiality.

  • EPSS 0.09%
  • Published 20.05.2023 15:15:08
  • Last modified 21.01.2025 17:15:13

The multimedia video module has a vulnerability in data processing.Successful exploitation of this vulnerability may affect availability.

  • EPSS 0.01%
  • Published 16.04.2023 08:15:07
  • Last modified 06.02.2025 17:15:14

The Bluetooth module has a vulnerability of bypassing the user confirmation in the pairing process. Successful exploitation of this vulnerability may affect confidentiality.

  • EPSS 0.01%
  • Published 16.04.2023 08:15:07
  • Last modified 06.02.2025 17:15:14

The Bluetooth module has a vulnerability of bypassing the user confirmation in the pairing process. Successful exploitation of this vulnerability may affect confidentiality.