Huawei | Teknoloji dünyasından en güncel haberleri ve güvenlikle ilgili gelişmeleri takip edin.

Kategori: Huawei - CVE listesi
VENDOR 276 kayıt
Medium CVSS: 4.0

CVE-2025-53171

Stack overflow risk when vector images are parsed during file preview Impact: Successful exploitation of this vulnerability may affect the file preview function.
Medium CVSS: 4.0

CVE-2025-53170

Null pointer dereference vulnerability in the application exit cause module Impact: Successful exploitation of this vulnerability may affect function stability.
High CVSS: 7.6

CVE-2025-53169

Vulnerability of bypassing the process to start SA and use related functions on distributed cameras Impact: Successful exploitation of this vulnerability may allow the peer device to use the camera without user awareness.
Medium CVSS: 5.7

CVE-2025-53168

Vulnerability of bypassing the process to start SA and use related functions on distributed cameras Impact: Successful exploitation of this vulnerability may allow the peer device to use the camera without user awareness.
Medium CVSS: 6.9

CVE-2025-53167

Authentication vulnerability in the distributed collaboration framework module Impact: Successful exploitation of this vulnerability may affect service confidentiality.
Medium CVSS: 4.0

CVE-2024-58117

Stack overflow risk when vector images are parsed during file preview Impact: Successful exploitation of this vulnerability may affect the file preview function.
High CVSS: 8.2

CVE-2025-48911

Vulnerability of improper permission assignment in the note sharing module Impact: Successful exploitation of this vulnerability may affect availability.
Medium CVSS: 5.5

CVE-2025-48910

Buffer overflow vulnerability in the DFile module Impact: Successful exploitation of this vulnerability may affect availability.
High CVSS: 7.1

CVE-2025-48909

Bypass vulnerability in the device management channel Impact: Successful exploitation of this vulnerability may affect service confidentiality.
Medium CVSS: 6.7

CVE-2025-48908

Ability Auto Startup service vulnerability in the foundation process Impact: Successful exploitation of this vulnerability may affect availability.
Medium CVSS: 6.2

CVE-2025-48907

Deserialization vulnerability in the IPC module Impact: Successful exploitation of this vulnerability may affect availability.
High CVSS: 8.8

CVE-2025-48906

Authentication bypass vulnerability in the DSoftBus module Impact: Successful exploitation of this vulnerability may affect availability.
High CVSS: 8.1

CVE-2025-48905

Wasm exception capture vulnerability in the arkweb v8 module Impact: Successful exploitation of this vulnerability may cause the failure to capture specific Wasm exception types.
Medium CVSS: 4.4

CVE-2025-48904

Vulnerability that cards can call unauthorized APIs in the FRS process Impact: Successful exploitation of this vulnerability may affect availability.
High CVSS: 7.8

CVE-2025-48903

Permission bypass vulnerability in the media library module Impact: Successful exploitation of this vulnerability may affect availability.
Medium CVSS: 6.6

CVE-2025-48902

Vulnerability of uncontrolled system resource applications in the setting module Impact: Successful exploitation of this vulnerability may affect availability.
Medium CVSS: 4.0

CVE-2024-58114

Resource allocation control failure vulnerability in the ArkUI framework Impact: Successful exploitation of this vulnerability may affect availability.
Medium CVSS: 5.1

CVE-2025-46593

Process residence vulnerability in abnormal scenarios in the print module Impact: Successful exploitation of this vulnerability may affect availability.
Medium CVSS: 4.4

CVE-2025-46592

Null pointer dereference vulnerability in the USB HDI driver module Impact: Successful exploitation of this vulnerability may affect availability.
Medium CVSS: 6.2

CVE-2025-46591

Out-of-bounds data read vulnerability in the authorization module Impact: Successful exploitation of this vulnerability may affect service confidentiality.