Vulnerabilities > Huawei > Medium
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2021-02-06 | CVE-2020-9205 | Improper Neutralization of Formula Elements in a CSV File vulnerability in Huawei Manageone 8.0.1 There has a CSV injection vulnerability in ManageOne 8.0.1. | 4.9 |
2021-02-06 | CVE-2020-9118 | Improper Validation of Integrity Check Value vulnerability in Huawei Ais-Bw80H-00 Firmware There is an insufficient integrity check vulnerability in Huawei Sound X Product. | 6.8 |
2021-02-06 | CVE-2021-22306 | Out-of-bounds Read vulnerability in Huawei Mate 30 Firmware 10.0.0.182(C00E180R6P2) There is an out-of-bound read vulnerability in Mate 30 10.0.0.182(C00E180R6P2). | 4.6 |
2021-02-06 | CVE-2021-22300 | Cleartext Storage of Sensitive Information vulnerability in Huawei Ecns280 TD Firmware V100R005C00/V100R005C10 There is an information leak vulnerability in eCNS280_TD versions V100R005C00 and V100R005C10. | 4.1 |
2021-02-06 | CVE-2021-22307 | Unspecified vulnerability in Huawei Mate 30 Firmware 10.0.0.203(C00E201R7P2) There is a weak algorithm vulnerability in Mate 3010.0.0.203(C00E201R7P2). | 5.5 |
2021-02-06 | CVE-2021-22301 | Classic Buffer Overflow vulnerability in Huawei Mate 30 Firmware 10.0.0.203(C00E201R7P2) Mate 30 10.0.0.203(C00E201R7P2) have a buffer overflow vulnerability. | 6.7 |
2021-01-13 | CVE-2020-9209 | Missing Authorization vulnerability in Huawei Smc2.0 Firmware There is a privilege escalation vulnerability in SMC2.0 product. | 6.7 |
2021-01-13 | CVE-2020-1866 | Out-of-bounds Read vulnerability in Huawei products There is an out-of-bounds read vulnerability in several products. | 6.5 |
2021-01-13 | CVE-2020-1865 | Out-of-bounds Read vulnerability in Huawei products There is an out-of-bounds read vulnerability in Huawei CloudEngine products. | 6.5 |
2021-01-13 | CVE-2020-9143 | Missing Authentication for Critical Function vulnerability in Huawei Emui and Magic UI There is a missing authentication vulnerability in some Huawei smartphone.Successful exploitation of this vulnerability may lead to low-sensitive information exposure. | 5.3 |