Vulnerability of improper access control in the secure input module
Impact: Successful exploitation of this vulnerability may cause features to perform abnormally.
Access permission verification vulnerability in the input method framework module
Impact: Successful exploitation of this vulnerability may affect availability.