Latest CVE Feed
-
7.7
HIGHCVE-2020-9199
B2368-22 V100R001C00;B2368-57 V100R001C00;B2368-66 V100R001C00 have a command injection vulnerability. An attacker with high privileges may exploit this vulnerability through some operations on the LAN. Due to insufficient input validation of some paramet... Read more
Affected Products : b2368-22_firmware b2368-57_firmware b2368-66_firmware b2368-22 b2368-57 b2368-66- Published: Sep. 03, 2020
- Modified: Nov. 21, 2024
-
7.5
HIGHCVE-2020-9158
There is a Missing Cryptographic Step vulnerability in Huawei Smartphone. Successful exploitation of this vulnerability may cause DoS of Samgr.... Read more
- Published: Jul. 01, 2021
- Modified: Nov. 21, 2024
-
5.5
MEDIUMCVE-2020-9149
An application error verification vulnerability exists in a component interface of Huawei Smartphone. Local attackers can exploit this vulnerability to modify and delete user SMS messages.... Read more
- Published: Apr. 01, 2021
- Modified: Nov. 21, 2024
-
5.5
MEDIUMCVE-2020-9148
An application bypass mechanism vulnerability exists in a component interface of Huawei Smartphone. Local attackers can exploit this vulnerability to delete user SMS messages.... Read more
- Published: Apr. 01, 2021
- Modified: Nov. 21, 2024
-
7.8
HIGHCVE-2020-9147
A memory buffer error vulnerability exists in a component interface of Huawei Smartphone. Local attackers may exploit this vulnerability by carefully constructing attack scenarios to cause out-of-bounds read.... Read more
- Published: Apr. 01, 2021
- Modified: Nov. 21, 2024
-
5.5
MEDIUMCVE-2020-9146
A memory buffer error vulnerability exists in a component interface of Huawei Smartphone. Local attackers can exploit this vulnerability to cause memory leakage and doS attacks by carefully constructing attack scenarios.... Read more
- Published: Apr. 01, 2021
- Modified: Nov. 21, 2024
-
9.1
CRITICALCVE-2020-9145
There is an Out-of-bounds Write vulnerability in some Huawei smartphone. Successful exploitation of this vulnerability may cause out-of-bounds access to the physical memory.... Read more
- Published: Jan. 13, 2021
- Modified: Nov. 21, 2024
-
9.8
CRITICALCVE-2020-9144
There is a heap overflow vulnerability in some Huawei smartphone, attackers can exploit this vulnerability to cause heap overflows due to improper restriction of operations within the bounds of a memory buffer.... Read more
- Published: Jan. 13, 2021
- Modified: Nov. 21, 2024
-
5.3
MEDIUMCVE-2020-9143
There is a missing authentication vulnerability in some Huawei smartphone.Successful exploitation of this vulnerability may lead to low-sensitive information exposure.... Read more
- Published: Jan. 13, 2021
- Modified: Nov. 21, 2024
-
9.1
CRITICALCVE-2020-9142
There is a heap base buffer overflow vulnerability in some Huawei smartphone.Successful exploitation of this vulnerability can cause heap overflow and memory overwriting when the system incorrectly processes the update file.... Read more
- Published: Jan. 13, 2021
- Modified: Nov. 21, 2024
-
9.1
CRITICALCVE-2020-9141
There is a improper privilege management vulnerability in some Huawei smartphone. Successful exploitation of this vulnerability can cause information disclosure and malfunctions due to insufficient verification of data authenticity.... Read more
- Published: Jan. 13, 2021
- Modified: Nov. 21, 2024
-
9.8
CRITICALCVE-2020-9140
There is a vulnerability with buffer access with incorrect length value in some Huawei Smartphone.Unauthorized users may trigger code execution when a buffer overflow occurs.... Read more
- Published: Jan. 13, 2021
- Modified: Nov. 21, 2024
-
9.1
CRITICALCVE-2020-9139
There is a improper input validation vulnerability in some Huawei Smartphone.Successful exploit of this vulnerability can cause memory access errors and denial of service.... Read more
- Published: Jan. 13, 2021
- Modified: Nov. 21, 2024
-
5.3
MEDIUMCVE-2020-9138
There is a heap-based buffer overflow vulnerability in some Huawei Smartphone, Successful exploit of this vulnerability can cause process exceptions during updating.... Read more
- Published: Jan. 13, 2021
- Modified: Nov. 21, 2024
-
6.7
MEDIUMCVE-2020-9137
There is a privilege escalation vulnerability in some versions of CloudEngine 12800,CloudEngine 5800,CloudEngine 6800 and CloudEngine 7800. Due to insufficient input validation, a local attacker with high privilege may execute some specially crafted scrip... Read more
- Published: Dec. 24, 2020
- Modified: Nov. 21, 2024
-
6.7
MEDIUMCVE-2020-9129
HUAWEI Mate 30 versions earlier than 10.1.0.159(C00E159R7P2) have a vulnerability of improper buffer operation. Due to improper restrictions, local attackers with high privileges can exploit the vulnerability to cause system heap overflow.... Read more
- Published: Nov. 13, 2020
- Modified: Nov. 21, 2024
-
4.4
MEDIUMCVE-2020-9128
FusionCompute versions 8.0.0 have an insecure encryption algorithm vulnerability. Attackers with high permissions can exploit this vulnerability to cause information leak.... Read more
Affected Products : fusioncompute- Published: Nov. 12, 2020
- Modified: Nov. 21, 2024
-
6.7
MEDIUMCVE-2020-9127
Some Huawei products have a command injection vulnerability. Due to insufficient input validation, an attacker with high privilege may inject some malicious codes in some files of the affected products. Successful exploit may cause command injection.Affec... Read more
Affected Products : secospace_usg6600_firmware usg9500_firmware secospace_usg6300_firmware secospace_usg6500_firmware nip6300_firmware nip6600_firmware nip6300 secospace_usg6500 usg9500 secospace_usg6300 +2 more products- Published: Nov. 13, 2020
- Modified: Nov. 21, 2024
-
6.7
MEDIUMCVE-2020-9125
There is an out-of-bound read vulnerability in huawei smartphone Mate 30 versions earlier than 10.1.0.156 (C00E155R7P2). An attacker with specific permission can exploit this vulnerability by sending crafted packet with specific parameter to the target de... Read more
- Published: Dec. 29, 2020
- Modified: Nov. 21, 2024
-
7.5
HIGHCVE-2020-9124
There is a memory leak vulnerability in some versions of Huawei CloudEngine product. An unauthenticated, remote attacker may exploit this vulnerability by sending specific message to the affected product. Due to not release the allocated memory properly, ... Read more
- Published: Dec. 29, 2020
- Modified: Nov. 21, 2024