Vulmon
Recent Vulnerabilities
Product List
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
huawei ever-l29b firmware vulnerabilities and exploits
(subscribe to this query)
4.6
CVSSv3
CVE-2020-1882
Huawei mobile phones Ever-L29B versions earlier than 10.0.0.180(C185E6R3P3), earlier than 10.0.0.180(C432E6R1P7), earlier than 10.0.0.180(C636E5R2P3); HUAWEI Mate 20 RS versions earlier than 10.0.0.175(C786E70R3P8); HUAWEI Mate 20 X versions earlier than 10.0.0.176(C00E70R2P8); a...
Huawei Mate 20 Rs Firmware
Huawei Mate 20 X Firmware
Huawei Honor Magic2 Firmware
Huawei Ever-l29b Firmware
5.3
CVSSv3
CVE-2019-5235
Some Huawei smart phones have a null pointer dereference vulnerability. An attacker crafts specific packets and sends to the affected product to exploit this vulnerability. Successful exploitation may cause the affected phone to be abnormal.
Huawei Alp-al00b Firmware 8.0.0.153(c00)
Huawei Alp-tl00b Firmware 8.0.0.129(sp2c01)
Huawei Bla-al00b Firmware 8.0.0.129(sp2c786)
Huawei Bla-al00b Firmware 8.0.0.153(c00)
Huawei Bla-tl00b Firmware 8.0.0.129(sp2c01)
Huawei Charlotte-al00a Firmware 8.1.0.176(c00)
Huawei Charlotte-tl00b Firmware 8.1.0.176(c01)
Huawei Columbia-al10b Firmware 8.1.0.163(c00)
Huawei Columbia-al10i Firmware 8.1.0.150(c675custc675d2)
Huawei Columbia-l29d Firmware 8.1.0.146(c461)
Huawei Columbia-l29d Firmware 8.1.0.148(c185)
Huawei Columbia-l29d Firmware 8.1.0.151(c10)
Huawei Columbia-l29d Firmware 8.1.0.151(c432)
Huawei Columbia-tl00d Firmware 8.1.0.186(c01gt)
Huawei Elle-al00b Firmware 9.1.0.162(c00e160r2p1)
Huawei Elle-tl00b Firmware 9.1.0.162(c01e160r2p1)
Huawei Emily-al00a Firmware 8.1.0.190(c00)
Huawei Emily-tl00b Firmware 8.1.0.175(c01)
Huawei Ever-al00b Firmware 9.0.0.195(c00e195r2p1)
Huawei Ever-l29b Firmware 9.0.0.206(c185e3r3p1)
Huawei Ever-l29b Firmware 9.0.0.207(c636e3r2p1)
Huawei Ever-l29b Firmware 9.0.0.208(c432e3r1p12)
5.3
CVSSv3
CVE-2019-5302
There are two denial of service vulnerabilities on some Huawei smartphones. An attacker may send specially crafted TD-SCDMA messages from a rogue base station to the affected devices. Due to insufficient input validation of two values when parsing the messages, successful exploit...
Huawei Alp-al00b Firmware
Huawei Alp-l09 Firmware
Huawei Alp-l29 Firmware
Huawei Bla-l29c Firmware
Huawei Berkeley-al20 Firmware
Huawei Berkeley-l09 Firmware
Huawei Charlotte-l09c Firmware
Huawei Charlotte-l29c Firmware
Huawei Columbia-al10b Firmware
Huawei Columbia-l29d Firmware
Huawei Cornell-al00a Firmware
Huawei Cornell-l29a Firmware
Huawei Emily-l09c Firmware
Huawei Emily-l29c Firmware
Huawei Ever-l29b Firmware
Huawei Mate 20 Firmware
Huawei Mate 20 Pro Firmware
Huawei Mate 20 Rs Firmware
Huawei Mate 20 X Firmware
Huawei P20 Firmware
Huawei P20 Pro Firmware
Huawei P30 Firmware
5.3
CVSSv3
CVE-2019-5303
There are two denial of service vulnerabilities on some Huawei smartphones. An attacker may send specially crafted TD-SCDMA messages from a rogue base station to the affected devices. Due to insufficient input validation of two values when parsing the messages, successful exploit...
Huawei Alp-al00b Firmware
Huawei Alp-l09 Firmware
Huawei Alp-l29 Firmware
Huawei Bla-l29c Firmware
Huawei Berkeley-al20 Firmware
Huawei Berkeley-l09 Firmware
Huawei Charlotte-l09c Firmware
Huawei Charlotte-l29c Firmware
Huawei Columbia-al10b Firmware
Huawei Columbia-l29d Firmware
Huawei Cornell-al00a Firmware
Huawei Cornell-l29a Firmware
Huawei Emily-l09c Firmware
Huawei Emily-l29c Firmware
Huawei Ever-l29b Firmware
Huawei Mate 20 Firmware
Huawei Mate 20 Pro Firmware
Huawei Mate 20 Rs Firmware
Huawei Mate 20 X Firmware
Huawei P20 Firmware
Huawei P20 Pro Firmware
Huawei P30 Firmware
6.5
CVSSv3
CVE-2019-5221
There is a path traversal vulnerability on Huawei Share. The software does not properly validate the path, an attacker could crafted a file path when transporting file through Huawei Share, successful exploit could allow the malicious user to transport a file to arbitrary path on...
Huawei Mate 20 X Firmware
8.1
CVSSv3
CVE-2019-9506
The Bluetooth BR/EDR specification up to and including version 5.1 permits sufficiently low encryption key length and does not prevent an attacker from influencing the key length negotiation. This allows practical brute-force attacks (aka "KNOB") that can decrypt traffi...
Google Android -
Apple Mac Os X 10.12.6
Apple Mac Os X 10.13.6
Apple Watchos 5.3
Apple Iphone Os 12.4
Apple Mac Os X 10.14.5
Apple Tvos 12.4
Canonical Ubuntu Linux 18.04
Canonical Ubuntu Linux 19.04
Canonical Ubuntu Linux 16.04
Debian Debian Linux 8.0
Opensuse Leap 15.0
Opensuse Leap 15.1
Redhat Enterprise Linux Server 7.0
Redhat Enterprise Linux For Real Time 7
Redhat Enterprise Linux For Real Time For Nfv 7
Redhat Enterprise Linux Server Tus 7.3
Redhat Enterprise Linux Server Aus 7.3
Redhat Enterprise Linux Server Aus 7.4
Redhat Enterprise Linux Server Tus 7.4
Redhat Enterprise Linux Server Tus 7.6
Redhat Enterprise Linux Server Aus 7.6
5 Github repositories
2 Articles
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-27802
template injection
CVE-2024-0044
code injection
CVE-2024-35474
CVE-2024-27857
CVE-2024-23251
CVE-2024-23692
physical
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started