The voice wakeup module has a vulnerability of using externally-controlled format strings. Successful exploitation of this vulnerability may affect system availability.Read More ...
Continue ReadingJune 13, 2022
Logical defects in code implementation in some products. Successful exploitation of this vulnerability may affect the availability of some features.Read More ...
Continue ReadingJune 13, 2022
kCTF is a Kubernetes-based infrastructure for capture the flag (CTF) competitions. Prior to version 1.6.0, the kctf cluster set-src-ip-ranges was broken and allowed traffic from any IP. The problem ha ...
Continue ReadingJune 13, 2022
Missing authorization vulnerability in the system components. Successful exploitation of this vulnerability will affect confidentiality.Read More ...
Continue ReadingJune 13, 2022
Dialog boxes can still be displayed even if the screen is locked in carrier-customized USSD services. Successful exploitation of this vulnerability may affect data integrity and confidentiality.Read M ...
Continue ReadingJune 13, 2022
Configuration defects in the secure OS module. Successful exploitation of this vulnerability can affect availability.Read More ...
Continue ReadingJune 13, 2022
Vulnerability of residual files not being deleted after an update in the ChinaDRM module. Successful exploitation of this vulnerability may affect availability.Read More ...
Continue ReadingJune 13, 2022
The Device Manager has a vulnerability in multi-device interaction. Successful exploitation of this vulnerability may affect data integrity.Read More ...
Continue ReadingJune 13, 2022
Back to Main