Emui
Sign in to watchby Huawei
CVEs (745)
| CVE | Sev | Risk | CVSS | EPSS | KEV | Published | Description |
|---|---|---|---|---|---|---|---|
| CVE-2026-34853 | Hig | 0.50 | 7.7 | 0.00 | Apr 13, 2026 | Permission bypass vulnerability in the LBS module. Impact: Successful exploitation of this vulnerability may affect availability. | |
| CVE-2026-28553 | Med | 0.45 | 6.9 | 0.00 | Apr 13, 2026 | Vulnerability of improper permission control in the theme setting module. Impact: Successful exploitation of this vulnerability may affect service confidentiality. | |
| CVE-2026-34859 | Med | 0.38 | 5.9 | 0.00 | Apr 13, 2026 | UAF vulnerability in the kernel module. Impact: Successful exploitation of this vulnerability will affect availability and confidentiality. | |
| CVE-2026-34855 | Med | 0.37 | 5.7 | 0.00 | Apr 13, 2026 | Out-of-bounds write vulnerability in the kernel module. Impact: Successful exploitation of this vulnerability will affect availability and confidentiality. | |
| CVE-2026-34854 | Med | 0.37 | 5.7 | 0.00 | Apr 13, 2026 | UAF vulnerability in the kernel module. Impact: Successful exploitation of this vulnerability will affect availability and confidentiality. | |
| CVE-2026-28542 | 0.00 | — | 0.00 | Mar 5, 2026 | Permission bypass vulnerability in the system service framework. Impact: Successful exploitation of this vulnerability may affect availability. | ||
| CVE-2026-28548 | 0.00 | — | 0.00 | Mar 5, 2026 | Vulnerability of improper verification in the email application. Impact: Successful exploitation of this vulnerability may affect service confidentiality. | ||
| CVE-2026-28552 | 0.00 | — | 0.00 | Mar 5, 2026 | Out-of-bounds write vulnerability in the IMS module. Impact: Successful exploitation of this vulnerability may affect availability. | ||
| CVE-2026-24928 | 0.00 | — | 0.00 | Feb 6, 2026 | Out-of-bounds write vulnerability in the file system module. Impact: Successful exploitation of this vulnerability may affect service confidentiality. | ||
| CVE-2026-24927 | 0.00 | — | 0.00 | Feb 6, 2026 | Out-of-bounds access vulnerability in the frequency modulation module. Impact: Successful exploitation of this vulnerability may affect availability. | ||
| CVE-2026-24920 | 0.00 | — | 0.00 | Feb 6, 2026 | Permission control vulnerability in the AMS module. Impact: Successful exploitation of this vulnerability may affect availability. | ||
| CVE-2026-24919 | 0.00 | — | 0.00 | Feb 6, 2026 | Out-of-bounds write vulnerability in the DFX module. Impact: Successful exploitation of this vulnerability may affect availability. | ||
| CVE-2026-24917 | 0.00 | — | 0.00 | Feb 6, 2026 | UAF vulnerability in the security module. Impact: Successful exploitation of this vulnerability may affect availability. | ||
| CVE-2026-24918 | 0.00 | — | 0.00 | Feb 6, 2026 | Address read vulnerability in the communication module. Impact: Successful exploitation of this vulnerability may affect availability. | ||
| CVE-2025-68959 | 0.00 | — | 0.00 | Jan 14, 2026 | Permission verification bypass vulnerability in the media library module. Impact: Successful exploitation of this vulnerability may affect service confidentiality. | ||
| CVE-2025-68970 | 0.00 | — | 0.00 | Jan 14, 2026 | Permission verification bypass vulnerability in the media library module. Impact: Successful exploitation of this vulnerability may affect service confidentiality. | ||
| CVE-2025-68963 | 0.00 | — | 0.00 | Jan 14, 2026 | Man-in-the-middle attack vulnerability in the Clone module. Impact: Successful exploitation of this vulnerability may affect service confidentiality. | ||
| CVE-2025-66329 | 0.00 | — | 0.00 | Dec 8, 2025 | Permission control vulnerability in the window management module. Impact: Successful exploitation of this vulnerability may affect availability. | ||
| CVE-2025-66325 | 0.00 | — | 0.00 | Dec 8, 2025 | Permission control vulnerability in the package management module. Impact: Successful exploitation of this vulnerability may affect service confidentiality. | ||
| CVE-2025-58311 | 0.00 | — | 0.00 | Nov 28, 2025 | UAF vulnerability in the USB driver module. Impact: Successful exploitation of this vulnerability will affect availability and confidentiality. |