Product:

Harmonyos

(Huawei)
Repositories

Unknown:

This might be proprietary software.

#Vulnerabilities 741
Date Id Summary Products Score Patch Annotated
2023-05-20 CVE-2023-1693 The Settings module has the file privilege escalation vulnerability.Successful exploitation of this vulnerability may affect confidentiality. Emui, Harmonyos 7.5
2023-05-20 CVE-2023-1694 The Settings module has the file privilege escalation vulnerability.Successful exploitation of this vulnerability may affect confidentiality. Emui, Harmonyos 7.5
2023-05-20 CVE-2023-1696 The multimedia video module has a vulnerability in data processing.Successful exploitation of this vulnerability may affect availability. Emui, Harmonyos 7.5
2024-12-12 CVE-2024-54101 Denial of service (DoS) vulnerability in the installation module Impact: Successful exploitation of this vulnerability will affect availability. Emui, Harmonyos 5.5
2023-05-26 CVE-2022-48478 The facial recognition TA of some products lacks memory length verification. Successful exploitation of this vulnerability may cause exceptions of the facial recognition service. Harmonyos 9.8
2023-05-26 CVE-2022-48479 The facial recognition TA of some products has the out-of-bounds memory read vulnerability. Successful exploitation of this vulnerability may cause exceptions of the facial recognition service. Harmonyos 9.8
2024-12-12 CVE-2024-54100 Vulnerability of improper access control in the secure input module Impact: Successful exploitation of this vulnerability may cause features to perform abnormally. Emui, Harmonyos 7.5
2024-12-12 CVE-2024-54102 Race condition vulnerability in the DDR module Impact: Successful exploitation of this vulnerability may affect service confidentiality. Harmonyos 5.9
2024-12-12 CVE-2024-54119 Cross-process screen stack vulnerability in the UIExtension module Impact: Successful exploitation of this vulnerability may affect service confidentiality. Harmonyos 7.5
2024-12-12 CVE-2024-54122 Concurrent variable access vulnerability in the ability module Impact: Successful exploitation of this vulnerability may affect availability. Harmonyos 4.7