Huawei

Harmonyos

922 vulnerabilities found.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.28%
  • Published 25.02.2022 19:15:09
  • Last modified 21.11.2024 05:50:02

There is a code injection vulnerability in smartphones. Successful exploitation of this vulnerability may affect service confidentiality.

  • EPSS 0.25%
  • Published 25.02.2022 19:15:09
  • Last modified 21.11.2024 05:50:06

There is a memory address out of bounds in smartphones. Successful exploitation of this vulnerability may cause malicious code to be executed.

  • EPSS 0.18%
  • Published 25.02.2022 19:15:09
  • Last modified 21.11.2024 05:50:06

There is a memory address out of bounds in smartphones. Successful exploitation of this vulnerability may cause malicious code to be executed.

  • EPSS 0.25%
  • Published 25.02.2022 19:15:09
  • Last modified 21.11.2024 05:50:06

There is a logic bypass vulnerability in smartphones. Successful exploitation of this vulnerability may cause code injection.

  • EPSS 0.25%
  • Published 25.02.2022 19:15:09
  • Last modified 21.11.2024 05:50:06

There is a vulnerability when configuring permission isolation in smartphones. Successful exploitation of this vulnerability may cause out-of-bounds access.

  • EPSS 0.22%
  • Published 25.02.2022 19:15:08
  • Last modified 21.11.2024 05:49:54

There is an improper verification vulnerability in smartphones. Successful exploitation of this vulnerability may cause integer overflows.

  • EPSS 0.27%
  • Published 25.02.2022 19:15:08
  • Last modified 21.11.2024 05:50:02

There is a buffer overflow vulnerability in smartphones. Successful exploitation of this vulnerability may cause DoS of the apps during Multi-Screen Collaboration.

  • EPSS 0.02%
  • Published 09.02.2022 23:15:16
  • Last modified 21.11.2024 06:23:23

There is a race condition vulnerability in the binder driver subsystem in the kernel.Successful exploitation of this vulnerability may affect kernel stability.

  • EPSS 0.07%
  • Published 09.02.2022 23:15:16
  • Last modified 21.11.2024 06:23:27

There is a vulnerability of signature verification mechanism failure in system upgrade through recovery mode.Successful exploitation of this vulnerability may affect service confidentiality.

  • EPSS 0.22%
  • Published 10.01.2022 14:10:22
  • Last modified 21.11.2024 06:23:25

The bone voice ID TA has a vulnerability in information management,Successful exploitation of this vulnerability may affect data confidentiality.