Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
huawei emui 10.1.0 vulnerabilities and exploits
(subscribe to this query)
7.2
CVSSv2
CVE-2021-22385
A component of the Huawei smartphone has a External Control of System or Configuration Setting vulnerability. Local attackers may exploit this vulnerability to cause Kernel Code Execution.
Huawei Magic Ui 3.1.1
Huawei Magic Ui 3.1.0
Huawei Emui 10.1.0
Huawei Emui 10.1.1
Huawei Magic Ui 4.0.0
Huawei Emui 11.0.0
7.1
CVSSv2
CVE-2021-40055
There is a man-in-the-middle attack vulnerability during system update download in recovery mode. Successful exploitation of this vulnerability may affect integrity.
Huawei Emui 10.0.0
Huawei Emui 10.1.0
Huawei Emui 10.1.1
Huawei Emui 11.0.0
Huawei Emui 11.0.1
Huawei Emui 12.0.0
Huawei Harmonyos 2.0
Huawei Magic Ui 3.0.0
Huawei Magic Ui 3.1.0
Huawei Magic Ui 3.1.1
Huawei Magic Ui 4.0.0
6.9
CVSSv2
CVE-2021-22437
There is a software integer overflow leading to a TOCTOU condition in smartphones. Successful exploitation of this vulnerability may cause random address access.
Huawei Magic Ui 3.1.1
Huawei Magic Ui 3.1.0
Huawei Emui 10.1.0
Huawei Emui 10.1.1
6.4
CVSSv2
CVE-2022-34737
The application security module has a vulnerability in permission assignment. Successful exploitation of this vulnerability may affect data integrity and confidentiality.
Huawei Magic Ui 3.1.1
Huawei Magic Ui 3.1.0
Huawei Emui 10.1.0
Huawei Emui 10.1.1
Huawei Magic Ui 4.0.0
Huawei Emui 11.0.0
Huawei Harmonyos 2.0
Huawei Emui 11.0.1
Huawei Emui 12.0.0
6.4
CVSSv2
CVE-2022-31760
Dialog boxes can still be displayed even if the screen is locked in carrier-customized USSD services. Successful exploitation of this vulnerability may affect data integrity and confidentiality.
Huawei Magic Ui 3.1.1
Huawei Magic Ui 3.1.0
Huawei Emui 10.1.0
Huawei Emui 10.1.1
Huawei Magic Ui 4.0.0
Huawei Emui 11.0.0
Huawei Harmonyos 2.0
Huawei Emui 12.0.0
6.4
CVSSv2
CVE-2021-46742
The multi-window module has a vulnerability of unauthorized insertion and tampering of Settings.Secure data.Successful exploitation of this vulnerability may affect the availability.
Huawei Magic Ui 3.1.1
Huawei Magic Ui 3.1.0
Huawei Emui 10.1.0
Huawei Emui 10.1.1
Huawei Magic Ui 4.0.0
Huawei Emui 11.0.0
Huawei Harmonyos 2.0
Huawei Emui 11.0.1
Huawei Emui 12.0.0
6.4
CVSSv2
CVE-2021-40053
There is a permission control vulnerability in the Nearby module.Successful exploitation of this vulnerability will affect availability and integrity.
Huawei Magic Ui 3.1.1
Huawei Magic Ui 3.1.0
Huawei Magic Ui 3.0.0
Huawei Emui 10.1.0
Huawei Emui 10.0.0
Huawei Emui 10.1.1
Huawei Magic Ui 4.0.0
Huawei Emui 11.0.0
Huawei Harmonyos 2.0
Huawei Harmonyos 2.1
6.4
CVSSv2
CVE-2021-22394
There is a buffer overflow vulnerability in smartphones. Successful exploitation of this vulnerability may cause DoS of the apps during Multi-Screen Collaboration.
Huawei Emui 10.1.0
Huawei Emui 10.1.1
Huawei Emui 11.0.0
Huawei Harmonyos 2.0
Huawei Magic Ui 3.1.0
Huawei Magic Ui 3.1.1
Huawei Magic Ui 4.0.0
6.4
CVSSv2
CVE-2021-22448
There is an improper verification vulnerability in smartphones. Successful exploitation of this vulnerability may cause unauthorized read and write of some files.
Huawei Magic Ui 3.1.1
Huawei Magic Ui 3.1.0
Huawei Magic Ui 3.0.0
Huawei Magic Ui 2.1.1
Huawei Emui 10.1.0
Huawei Emui 10.0.0
Huawei Emui 9.1.1
Huawei Emui 9.1.0
Huawei Emui 10.1.1
Huawei Emui 11.0.0
Huawei Magic Ui 4.0.0
3 Github repositories
6.4
CVSSv2
CVE-2021-37051
There is an Out-of-bounds read vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may cause out-of-bounds memory access.
Huawei Harmonyos
Huawei Emui 9.1.0
Huawei Emui 9.1.1
Huawei Emui 10.0.0
Huawei Emui 10.1.0
Huawei Emui 11.0.1
Huawei Magic Ui 2.1.1
Huawei Magic Ui 3.0.0
Huawei Magic Ui 3.1.0
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-33572
CVE-2024-24919
CVE-2024-0230
CVE-2024-32714
HTML injection
local file inclusion
CVE-2024-31098
CVE-2024-31244
privilege
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
8
9
NEXT »