CVE-2020-9244
- EPSS 0.03%
- Veröffentlicht 11.08.2020 19:15:17
- Zuletzt bearbeitet 21.11.2024 05:40:15
HUAWEI Mate 20 versions Versions earlier than 10.1.0.160(C00E160R3P8);HUAWEI Mate 20 Pro versions Versions earlier than 10.1.0.270(C431E7R1P5),Versions earlier than 10.1.0.270(C635E3R1P5),Versions earlier than 10.1.0.273(C636E7R2P4);HUAWEI Mate 20 X ...
CVE-2020-9074
- EPSS 0.18%
- Veröffentlicht 05.06.2020 15:15:11
- Zuletzt bearbeitet 21.11.2024 05:39:58
Huawei Smartphones HONOR 20 PRO;Honor View 20;HONOR 20 have an improper handling of exceptional condition Vulnerability. A component cannot deal with an exception correctly. Attackers can exploit this vulnerability by sending malformed message. This ...
CVE-2020-1808
- EPSS 0.1%
- Veröffentlicht 15.05.2020 14:15:11
- Zuletzt bearbeitet 21.11.2024 05:11:25
Honor 20;HONOR 20 PRO;Honor Magic2;HUAWEI Mate 20 X;HUAWEI P30;HUAWEI P30 Pro;Honor View 20 smartphones with versions earlier than 10.0.0.187(C00E60R4P11); versions earlier than 10.0.0.187(C00E60R4P11); versions earlier than 10.0.0.176(C00E60R2P11);9...
CVE-2019-5302
- EPSS 0.06%
- Veröffentlicht 27.04.2020 20:15:12
- Zuletzt bearbeitet 21.11.2024 04:44:42
There are two denial of service vulnerabilities on some Huawei smartphones. An attacker may send specially crafted TD-SCDMA messages from a rogue base station to the affected devices. Due to insufficient input validation of two values when parsing th...
CVE-2019-5303
- EPSS 0.06%
- Veröffentlicht 27.04.2020 20:15:12
- Zuletzt bearbeitet 21.11.2024 04:44:42
There are two denial of service vulnerabilities on some Huawei smartphones. An attacker may send specially crafted TD-SCDMA messages from a rogue base station to the affected devices. Due to insufficient input validation of two values when parsing th...
CVE-2019-9506
- EPSS 3.04%
- Veröffentlicht 14.08.2019 17:15:11
- Zuletzt bearbeitet 21.11.2024 04:51:45
The Bluetooth BR/EDR specification up to and including version 5.1 permits sufficiently low encryption key length and does not prevent an attacker from influencing the key length negotiation. This allows practical brute-force attacks (aka "KNOB") tha...