Note:
This project will be discontinued after December 13, 2021. [more]
Product:
Oxfords\-An00a_firmware
(Huawei)Repositories |
Unknown: This might be proprietary software. |
#Vulnerabilities | 4 |
Date | Id | Summary | Products | Score | Patch | Annotated |
---|---|---|---|---|---|---|
2020-03-20 | CVE-2020-1878 | Huawei smartphone OxfordS-AN00A with versions earlier than 10.0.1.152D(C735E152R3P3),versions earlier than 10.0.1.160(C00E160R4P1) have an improper authentication vulnerability. Authentication to target component is improper when device performs an operation. Attackers exploit this vulnerability to obtain some information by loading malicious application, leading to information leak. | Oxfords\-An00a_firmware | 5.5 | ||
2021-08-03 | CVE-2021-22400 | Some Huawei Smartphones has an insufficient input validation vulnerability due to the lack of parameter validation. An attacker may trick a user into installing a malicious APP. The app can modify specific parameters, causing the system to crash. Affected product include:OxfordS-AN00A... | Oxfords\-An00a_firmware | 5.5 | ||
2020-09-03 | CVE-2020-9235 | Huawei smartphones HONOR 20 PRO Versions earlier than 10.1.0.230(C432E9R5P1),Versions earlier than 10.1.0.231(C10E3R3P2),Versions earlier than 10.1.0.231(C185E3R5P1),Versions earlier than 10.1.0.231(C636E3R3P1);Versions earlier than 10.1.0.212(C432E10R3P4),Versions earlier than 10.1.0.213(C636E3R4P3),Versions earlier than 10.1.0.214(C10E5R4P3),Versions earlier than 10.1.0.214(C185E3R3P3);Versions earlier than 10.1.0.212(C00E210R5P1);Versions earlier than 10.1.0.160(C00E160R2P11);Versions... | Honor_20_pro_firmware, Honor_view_20_firmware, Oxfords\-An00a_firmware, Princeton\-Al10b_firmware, Princeton\-Al10d_firmware, Princeton\-Tl10c_firmware, Tony\-Al00b_firmware, Yale\-Al00a_firmware, Yale\-L21a_firmware, Yale\-L61a_firmware | 5.5 | ||
2021-07-13 | CVE-2021-22440 | There is a path traversal vulnerability in some Huawei products. The vulnerability is due to that the software uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the software does not properly validate the pathname. Successful exploit could allow the attacker to access a location that is outside of the restricted directory by a crafted filename. Affected product versions include:HUAWEI... | Hima\-L29c_firmware, Laya\-Al00ep_firmware, Mate_20_firmware, Mate_20_pro_firmware, Oxfords\-An00a_firmware, Tony\-Al00b_firmware | 4.6 |