12 matches found
CVE-2021-40044
There is a permission verification vulnerability in the Bluetooth module.Successful exploitation of this vulnerability may cause unauthorized operations.
CVE-2025-31175
Deserialization mismatch vulnerability in the DSoftBus moduleImpact: Successful exploitation of this vulnerability may affect service integrity.
CVE-2021-22351
There is a Credentials Management Errors Vulnerability in Huawei Smartphone. Successful exploitation of this vulnerability may induce users to grant permissions on modifying items in the configuration table,causing system exceptions.
CVE-2024-42038
Vulnerability of PIN enhancement failures in the screen lock moduleImpact: Successful exploitation of this vulnerability may affect service confidentiality, integrity, and availability.
CVE-2024-39672
Memory request logic vulnerability in the memory module.Impact: Successful exploitation of this vulnerability will affect integrity and availability.
CVE-2024-42035
Permission control vulnerability in the App Multiplier moduleImpact:Successful exploitation of this vulnerability may affect functionality and confidentiality.
CVE-2021-22427
There is a Heap-based Buffer Overflow Vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to authentication bypass.
CVE-2024-54098
Service logic error vulnerability in the system service moduleImpact: Successful exploitation of this vulnerability may affect service integrity.
CVE-2021-22384
There is an Information Disclosure Vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to authentication bypass.
CVE-2024-32997
Race condition vulnerability in the binder driver moduleImpact: Successful exploitation of this vulnerability will affect availability.
CVE-2021-22428
There is an Incomplete Cleanup Vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to authentication bypass.
CVE-2024-58044
Permission verification bypass vulnerability in the notification moduleImpact: Successful exploitation of this vulnerability may affect availability.