Vulnerabilities > Huawei > Berkeley L09 Firmware
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2020-09-11 | CVE-2020-9239 | Improper Input Validation vulnerability in Huawei products Huawei smartphones BLA-A09 versions 8.0.0.123(C212),versions earlier than 8.0.0.123(C567),versions earlier than 8.0.0.123(C797);BLA-TL00B versions earlier than 8.1.0.326(C01);Berkeley-L09 versions earlier than 8.0.0.163(C10),versions earlier than 8.0.0.163(C432),Versions earlier than 8.0.0.163(C636),Versions earlier than 8.0.0.172(C10);Duke-L09 versions Duke-L09C10B187, versions Duke-L09C432B189, versions Duke-L09C636B189;HUAWEI P20 versions earlier than 8.0.1.16(C00);HUAWEI P20 Pro versions earlier than 8.1.0.152(C00);Jimmy-AL00A versions earlier than Jimmy-AL00AC00B172;LON-L29D versions LON-L29DC721B192;NEO-AL00D versions earlier than 8.1.0.172(C786);Stanford-AL00 versions Stanford-AL00C00B123;Toronto-AL00 versions earlier than Toronto-AL00AC00B225;Toronto-AL00A versions earlier than Toronto-AL00AC00B225;Toronto-TL10 versions earlier than Toronto-TL10C01B225 have an information vulnerability. | 5.5 |
2020-06-08 | CVE-2019-19412 | Unspecified vulnerability in Huawei products Huawei smart phones have a Factory Reset Protection (FRP) bypass security vulnerability. low complexity huawei | 4.6 |
2020-05-21 | CVE-2020-9069 | Unspecified vulnerability in Huawei products There is an information leakage vulnerability in some Huawei products. low complexity huawei | 6.5 |
2020-04-27 | CVE-2019-5303 | Improper Input Validation vulnerability in Huawei products There are two denial of service vulnerabilities on some Huawei smartphones. | 5.3 |
2020-04-27 | CVE-2019-5302 | Improper Input Validation vulnerability in Huawei products There are two denial of service vulnerabilities on some Huawei smartphones. | 5.3 |
2020-03-10 | CVE-2020-0069 | Out-of-bounds Write vulnerability in multiple products In the ioctl handlers of the Mediatek Command Queue driver, there is a possible out of bounds write due to insufficient input sanitization and missing SELinux restrictions. | 7.8 |
2019-10-11 | CVE-2019-2215 | Use After Free vulnerability in multiple products A use-after-free in binder.c allows an elevation of privilege from an application to the Linux Kernel. | 7.8 |
2019-08-14 | CVE-2019-9506 | Use of a Broken or Risky Cryptographic Algorithm vulnerability in multiple products The Bluetooth BR/EDR specification up to and including version 5.1 permits sufficiently low encryption key length and does not prevent an attacker from influencing the key length negotiation. | 8.1 |