Low
CVSS: 3.3
Denial of service (DoS) vulnerability in the office service. Successful exploitation of this vulnerability may affect availability.
Medium
CVSS: 5.3
Permission control vulnerability in the media module. Successful exploitation of this vulnerability may affect service confidentiality.
Medium
CVSS: 5.9
Permission control vulnerability in the network module. Successful exploitation of this vulnerability may affect service confidentiality.
Medium
CVSS: 5.5
Permission control vulnerability in the Wi-Fi module. Successful exploitation of this vulnerability may affect service confidentiality.
Low
CVSS: 2.8
Permission control vulnerability in the camera module. Successful exploitation of this vulnerability may affect service confidentiality.
Medium
CVSS: 6.2
Identity authentication bypass vulnerability in the Gallery app. Successful exploitation of this vulnerability may affect service confidentiality.
Medium
CVSS: 4.0
Permission verification bypass vulnerability in the Camera app. Successful exploitation of this vulnerability may affect service confidentiality.
Medium
CVSS: 6.2
Permission control vulnerability in the Gallery module. Successful exploitation of this vulnerability may affect service confidentiality
Medium
CVSS: 5.1
Race condition vulnerability in the device standby module.
Impact: Successful exploitation of this vulnerability may cause feature exceptions of the device standby module.
High
CVSS: 7.5
Race condition vulnerability in the audio module.
Impact: Successful exploitation of this vulnerability may affect function stability.
High
CVSS: 8.4
Out-of-bounds read vulnerability in the runtime interpreter module.
Impact: Successful exploitation of this vulnerability may affect availability.
High
CVSS: 8.4
Vulnerability of exposing object heap addresses in the Ark eTS module.
Impact: Successful exploitation of this vulnerability may affect availability.
Medium
CVSS: 6.8
Permission verification vulnerability in the home screen module
Impact: Successful exploitation of this vulnerability may affect availability.
Medium
CVSS: 5.7
EnzoH has an OS command injection vulnerability. Successful exploitation of this vulnerability may lead to arbitrary command execution.
Medium
CVSS: 4.5
EnzoH has an OS command injection vulnerability. Successful exploitation of this vulnerability may lead to arbitrary command execution.
Medium
CVSS: 5.0
EnzoH has an OS command injection vulnerability. Successful exploitation of this vulnerability may lead to arbitrary command execution.
Medium
CVSS: 4.8
Race condition vulnerability in the kernel hufs module.
Impact: Successful exploitation of this vulnerability may affect service confidentiality.
Medium
CVSS: 4.2
Improper array index verification vulnerability in the audio codec module.
Impact: Successful exploitation of this vulnerability may affect the audio decoding function.
Medium
CVSS: 4.5
Vulnerability of using incompatible types to access resources in the location service.
Impact: Successful exploitation of this vulnerability may cause some location information attributes to be incorrect.
Medium
CVSS: 5.4
Out-of-bounds read vulnerability in the SSAP module of the NearLink protocol stack.
Impact: Successful exploitation of this vulnerability may affect availability.