Lucene search

K

Emui Security Vulnerabilities - CVSS Score 3 - 4

cve
cve

CVE-2021-22308

There is a Business Logic Errors vulnerability in Huawei Smartphone. The malicious apps installed on the device can keep taking screenshots in the background. This issue does not cause system errors, but may cause personal information leakage.

3.3CVSS

4AI Score

0.0004EPSS

2021-06-03 04:15 PM
36
2
cve
cve

CVE-2021-36994

There is a issue that trustlist strings being repeatedly inserted into the linked list in Huawei Smartphone due to race conditions. Successful exploitation of this vulnerability can cause exceptions when managing the system trustlist.

3.7CVSS

4.2AI Score

0.001EPSS

2021-10-28 01:15 PM
26
cve
cve

CVE-2022-41592

The phones have the heap overflow, out-of-bounds read, and null pointer vulnerabilities in the fingerprint trusted application (TA).Successful exploitation of this vulnerability may affect the fingerprint service.

3.4CVSS

4.5AI Score

0.0004EPSS

2022-10-14 04:15 PM
22
2
cve
cve

CVE-2022-41593

The phones have the heap overflow, out-of-bounds read, and null pointer vulnerabilities in the fingerprint trusted application (TA).Successful exploitation of this vulnerability may affect the fingerprint service.

3.4CVSS

4.5AI Score

0.0004EPSS

2022-10-14 04:15 PM
24
6
cve
cve

CVE-2022-41594

The phones have the heap overflow, out-of-bounds read, and null pointer vulnerabilities in the fingerprint trusted application (TA).Successful exploitation of this vulnerability may affect the fingerprint service.

3.4CVSS

4.5AI Score

0.0004EPSS

2022-10-14 04:15 PM
26
4
cve
cve

CVE-2022-41595

The phones have the heap overflow, out-of-bounds read, and null pointer vulnerabilities in the fingerprint trusted application (TA).Successful exploitation of this vulnerability may affect the fingerprint service.

3.4CVSS

4.5AI Score

0.0004EPSS

2022-10-14 04:15 PM
32
4
cve
cve

CVE-2022-41597

The phones have the heap overflow, out-of-bounds read, and null pointer vulnerabilities in the fingerprint trusted application (TA).Successful exploitation of this vulnerability may affect the fingerprint service.

3.4CVSS

4.5AI Score

0.0004EPSS

2022-10-14 04:15 PM
22
4
cve
cve

CVE-2022-41598

The phones have the heap overflow, out-of-bounds read, and null pointer vulnerabilities in the fingerprint trusted application (TA).Successful exploitation of this vulnerability may affect the fingerprint service.

3.4CVSS

4.5AI Score

0.0004EPSS

2022-10-14 04:15 PM
19
4
cve
cve

CVE-2022-41600

The phones have the heap overflow, out-of-bounds read, and null pointer vulnerabilities in the fingerprint trusted application (TA).Successful exploitation of this vulnerability may affect the fingerprint service.

3.4CVSS

4.5AI Score

0.0004EPSS

2022-10-14 04:15 PM
26
6
cve
cve

CVE-2022-41601

The phones have the heap overflow, out-of-bounds read, and null pointer vulnerabilities in the fingerprint trusted application (TA).Successful exploitation of this vulnerability may affect the fingerprint service.

3.4CVSS

4.5AI Score

0.0004EPSS

2022-10-14 04:15 PM
23
4
cve
cve

CVE-2022-41602

The phones have the heap overflow, out-of-bounds read, and null pointer vulnerabilities in the fingerprint trusted application (TA).Successful exploitation of this vulnerability may affect the fingerprint service.

3.4CVSS

4.5AI Score

0.0004EPSS

2022-10-14 04:15 PM
25
6
cve
cve

CVE-2022-41603

The phones have the heap overflow, out-of-bounds read, and null pointer vulnerabilities in the fingerprint trusted application (TA).Successful exploitation of this vulnerability may affect the fingerprint service.

3.4CVSS

4.5AI Score

0.0004EPSS

2022-10-14 04:15 PM
26
4
cve
cve

CVE-2023-31225

The Gallery app has the risk of hijacking attacks. Successful exploitation of this vulnerability may cause download failures and affect product availability.

3.3CVSS

4.3AI Score

0.0004EPSS

2023-05-26 05:15 PM
20
cve
cve

CVE-2023-41306

Vulnerability of mutex management in the bone voice ID trusted application (TA) module. Successful exploitation of this vulnerability may cause the bone voice ID feature to be unavailable.

3.7CVSS

4.3AI Score

0.001EPSS

2023-09-27 03:19 PM
20
cve
cve

CVE-2023-41310

Keep-alive vulnerability in the sticky broadcast mechanism. Successful exploitation of this vulnerability may cause malicious apps to run continuously in the background.

3.3CVSS

4.2AI Score

0.0004EPSS

2023-09-27 03:19 PM
15
cve
cve

CVE-2024-32989

Insufficient verification vulnerability in the system sharing pop-up moduleImpact: Successful exploitation of this vulnerability will affect availability.

3.3CVSS

6.8AI Score

0.0004EPSS

2024-05-14 03:37 PM
19