Vulnerabilities > Huawei > High
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2024-12-27 | CVE-2020-9211 | Out-of-bounds Write vulnerability in Huawei Mate 30 Firmware 10.1.0.126(C00E125R5P3) There is an out-of-bound read and write vulnerability in Huawei smartphone. | 7.2 |
2024-12-27 | CVE-2020-9222 | Unspecified vulnerability in Huawei Fusioncompute There is a privilege escalation vulnerability in Huawei FusionCompute product. | 7.8 |
2024-12-27 | CVE-2020-9236 | Unspecified vulnerability in Huawei Fusioncompute 8.0.0 There is an improper interface design vulnerability in Huawei product. | 8.8 |
2024-12-20 | CVE-2022-32204 | Unspecified vulnerability in Huawei Cv81-Wdm Firmware 01.70.49.29.46 There is an improper input verification vulnerability in Huawei printer product. | 7.5 |
2024-12-20 | CVE-2022-34159 | Unspecified vulnerability in Huawei Cv81-Wdm Firmware 01.70.49.29.46 Huawei printers have an input verification vulnerability. | 7.5 |
2024-12-12 | CVE-2024-54119 | Unspecified vulnerability in Huawei Harmonyos 5.0.0 Cross-process screen stack vulnerability in the UIExtension module Impact: Successful exploitation of this vulnerability may affect service confidentiality. | 7.5 |
2024-12-12 | CVE-2024-54097 | Unspecified vulnerability in Huawei Emui and Harmonyos Security vulnerability in the HiView module Impact: Successful exploitation of this vulnerability may affect feature implementation and integrity. | 7.5 |
2024-12-12 | CVE-2024-54098 | Unspecified vulnerability in Huawei Emui and Harmonyos Service logic error vulnerability in the system service module Impact: Successful exploitation of this vulnerability may affect service integrity. | 7.5 |
2024-12-12 | CVE-2024-54099 | Unspecified vulnerability in Huawei Emui and Harmonyos File replacement vulnerability on some devices Impact: Successful exploitation of this vulnerability will affect integrity and confidentiality. | 7.1 |
2024-12-12 | CVE-2024-54100 | Unspecified vulnerability in Huawei Emui and Harmonyos Vulnerability of improper access control in the secure input module Impact: Successful exploitation of this vulnerability may cause features to perform abnormally. | 7.5 |