Check CVE Id
Check CWE Id
Huawei AnyMail before 2.6.0301.0060 allows remote attackers to cause a denial of service (application crash) via a crafted compressed email attachment.
CVSS Base Score
The SIP TLS module of Huawei CloudLink Phone 7900 with V600R019C10 has a TLS certificate verification vulnerability. Due to insufficient verification of specific parameters of the TLS server certificate, attackers can perform man-in-the-middle attack...
PCManager 126.96.36.199 has an improper authentication vulnerability. The certain driver interface of the software does not perform a validation of user-mode data properly, successful exploit could result in malicious code execution.
Huawei smart phones Emily-L29C with versions of 188.8.131.52a(C432), 184.108.40.206(C782), 220.127.116.11(C10), 18.104.22.168(C461), 22.214.171.124(C635), 126.96.36.199(C185), 188.8.131.52(C605), 184.108.40.206(C636) have a double free vulnerability. An attacker can trick a user to c...
There is an information disclosure vulnerability on Secure Input of certain Huawei smartphones in Versions earlier than Tony-AL00B 220.127.116.11(C00E214R2P1). The Secure Input does not properly limit certain system privilege. An attacker tricks the user ...
HiSuite 18.104.22.1680 versions and earlier contains a DLL hijacking vulnerability. This vulnerability exists due to some DLL file is loaded by HiSuite improperly. And it allows an attacker to load this DLL file of the attacker's choosing that could execu...
There is a Clickjacking vulnerability in Huawei HG255s product. An attacker may trick user to click a link and affect the integrity of a device by exploiting this vulnerability.
There is a code execution vulnerability in Huawei PCManager versions earlier than PCManager 22.214.171.124. The attacker can tricking a user to install and run a malicious application to exploit this vulnerability. Successful exploitation may cause the att...
There is a privilege escalation vulnerability in Huawei PCManager versions earlier than PCManager 126.96.36.199. The attacker can tricking a user to install and run a malicious application to exploit this vulnerability. Successful exploitation may cause t...
Back to Top