Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
huawei magic ui 3.1.1 vulnerabilities and exploits
(subscribe to this query)
668
VMScore
CVE-2020-9144
There is a heap overflow vulnerability in some Huawei smartphone, attackers can exploit this vulnerability to cause heap overflows due to improper restriction of operations within the bounds of a memory buffer.
Huawei Emui 9.1.0
Huawei Emui 9.1.1
Huawei Emui 10.0.0
Huawei Emui 10.1.0
Huawei Emui 10.1.1
Huawei Emui 11.0.0
Huawei Magic Ui 2.1.1
Huawei Magic Ui 3.0.0
Huawei Magic Ui 3.1.0
Huawei Magic Ui 3.1.1
Huawei Magic Ui 4.0.0
641
VMScore
CVE-2021-22385
A component of the Huawei smartphone has a External Control of System or Configuration Setting vulnerability. Local attackers may exploit this vulnerability to cause Kernel Code Execution.
Huawei Magic Ui 3.1.1
Huawei Magic Ui 3.1.0
Huawei Emui 10.1.0
Huawei Emui 10.1.1
Huawei Magic Ui 4.0.0
Huawei Emui 11.0.0
632
VMScore
CVE-2021-40055
There is a man-in-the-middle attack vulnerability during system update download in recovery mode. Successful exploitation of this vulnerability may affect integrity.
Huawei Emui 10.0.0
Huawei Emui 10.1.0
Huawei Emui 10.1.1
Huawei Emui 11.0.0
Huawei Emui 11.0.1
Huawei Emui 12.0.0
Huawei Harmonyos 2.0
Huawei Magic Ui 3.0.0
Huawei Magic Ui 3.1.0
Huawei Magic Ui 3.1.1
Huawei Magic Ui 4.0.0
632
VMScore
CVE-2021-36987
There is a issue that nodes in the linked list being freed for multiple times in Huawei Smartphone due to race conditions. Successful exploitation of this vulnerability can cause the system to restart.
Huawei Emui 10.1.1
Huawei Emui 11.0.0
Huawei Magic Ui 3.1.1
Huawei Magic Ui 4.0.0
614
VMScore
CVE-2021-22437
There is a software integer overflow leading to a TOCTOU condition in smartphones. Successful exploitation of this vulnerability may cause random address access.
Huawei Magic Ui 3.1.1
Huawei Magic Ui 3.1.0
Huawei Emui 10.1.0
Huawei Emui 10.1.1
605
VMScore
CVE-2021-36999
There is a Buffer overflow vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability by sending malicious images and inducing users to open the images may cause remote code execution.
Huawei Emui 10.1.1
Huawei Emui 11.0.0
Huawei Magic Ui 3.1.1
Huawei Magic Ui 4.0.0
605
VMScore
CVE-2021-22352
There is a Configuration Defect Vulnerability in Huawei Smartphone. Successful exploitation of this vulnerability may allow malicious users to hijack the device and forge UIs to induce users to execute malicious commands.
Huawei Emui 10.1.1
Huawei Emui 11.0.0
Huawei Emui 11.0.1
Huawei Magic Ui 3.1.1
Huawei Magic Ui 4.0.0
571
VMScore
CVE-2021-22448
There is an improper verification vulnerability in smartphones. Successful exploitation of this vulnerability may cause unauthorized read and write of some files.
Huawei Magic Ui 3.1.1
Huawei Magic Ui 3.1.0
Huawei Magic Ui 3.0.0
Huawei Magic Ui 2.1.1
Huawei Emui 10.1.0
Huawei Emui 10.0.0
Huawei Emui 9.1.1
Huawei Emui 9.1.0
Huawei Emui 10.1.1
Huawei Emui 11.0.0
Huawei Magic Ui 4.0.0
3 Github repositories
570
VMScore
CVE-2022-34737
The application security module has a vulnerability in permission assignment. Successful exploitation of this vulnerability may affect data integrity and confidentiality.
Huawei Magic Ui 3.1.1
Huawei Magic Ui 3.1.0
Huawei Emui 10.1.0
Huawei Emui 10.1.1
Huawei Magic Ui 4.0.0
Huawei Emui 11.0.0
Huawei Harmonyos 2.0
Huawei Emui 11.0.1
Huawei Emui 12.0.0
570
VMScore
CVE-2022-31760
Dialog boxes can still be displayed even if the screen is locked in carrier-customized USSD services. Successful exploitation of this vulnerability may affect data integrity and confidentiality.
Huawei Magic Ui 3.1.1
Huawei Magic Ui 3.1.0
Huawei Emui 10.1.0
Huawei Emui 10.1.1
Huawei Magic Ui 4.0.0
Huawei Emui 11.0.0
Huawei Harmonyos 2.0
Huawei Emui 12.0.0
VMScore
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-23316
SQL injection
type confusion
CVE-2024-20697
CVE-2024-4344
local
CVE-2024-30043
CVE-2024-3821
CVE-2024-5041
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
8
9
10
NEXT »