Vulnerabilities (CVE)

Join the Common Vulnerabilities and Exposures (CVE) community and start to get notified about new vulnerabilities.

Filtered by NVD-CWE-noinfo
Total 22706 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2021-22472 1 Huawei 2 Emui, Magic Ui 2021-11-01 5.0 MEDIUM 7.5 HIGH
There is an Improper verification vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may affect service confidentiality.
CVE-2021-22481 1 Huawei 2 Emui, Magic Ui 2021-11-01 5.0 MEDIUM 7.5 HIGH
There is a Verification errors vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may affect service confidentiality.
CVE-2021-22483 1 Huawei 2 Emui, Magic Ui 2021-11-01 5.0 MEDIUM 7.5 HIGH
There is a issue of IP address spoofing in Huawei Smartphone. Successful exploitation of this vulnerability may cause DoS.
CVE-2021-22485 1 Huawei 2 Emui, Magic Ui 2021-11-01 5.0 MEDIUM 7.5 HIGH
There is a SSID vulnerability with Wi-Fi network connections in Huawei devices.Successful exploitation of this vulnerability may affect service confidentiality.
CVE-2021-22486 1 Huawei 2 Emui, Magic Ui 2021-11-01 5.0 MEDIUM 7.5 HIGH
There is a issue of Unstandardized field names in Huawei Smartphone. Successful exploitation of this vulnerability may affect service confidentiality.
CVE-2021-36988 1 Huawei 2 Emui, Magic Ui 2021-11-01 5.0 MEDIUM 7.5 HIGH
There is a Parameter verification issue in Huawei Smartphone.Successful exploitation of this vulnerability can affect service integrity.
CVE-2021-36997 1 Huawei 2 Emui, Magic Ui 2021-11-01 5.0 MEDIUM 5.3 MEDIUM
There is a Low memory error in Huawei Smartphone due to the unlimited size of images to be parsed.Successful exploitation of this vulnerability may cause the Gallery or Files app to exit unexpectedly.
CVE-2021-36996 1 Huawei 2 Emui, Magic Ui 2021-11-01 5.0 MEDIUM 5.3 MEDIUM
There is an Improper verification vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may cause transmission of certain virtual information.
CVE-2021-36995 1 Huawei 2 Emui, Magic Ui 2021-11-01 5.0 MEDIUM 7.5 HIGH
There is an Unauthorized file access vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability by modifying soft links may tamper with the files restored from backups.
CVE-2021-36998 1 Huawei 2 Emui, Magic Ui 2021-11-01 5.0 MEDIUM 5.3 MEDIUM
There is an Improper verification vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may allow attempts to read an array that is out of bounds.
CVE-2021-37001 1 Huawei 2 Emui, Magic Ui 2021-11-01 5.0 MEDIUM 7.5 HIGH
There is a Register tampering vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may allow the register value to be modified.
CVE-2021-22407 1 Huawei 2 Emui, Magic Ui 2021-11-01 5.0 MEDIUM 5.3 MEDIUM
There is a Configuration defects in Huawei Smartphone.Successful exploitation of this vulnerability may affect service confidentiality.
CVE-2021-41872 1 Skyworthdigital 2 Penguin Aurora Box 41502, Penguin Aurora Box 41502 Firmware 2021-11-01 5.0 MEDIUM 7.5 HIGH
Skyworth Digital Technology Penguin Aurora Box 41502 has a denial of service vulnerability, which can be exploited by attackers to cause a denial of service.
CVE-2017-18195 1 Concretecms 1 Concrete Cms 2021-11-01 5.0 MEDIUM 5.3 MEDIUM
An issue was discovered in tools/conversations/view_ajax.php in Concrete5 before 8.3.0. An unauthenticated user can enumerate comments from all blog posts by POSTing requests to /index.php/tools/required/conversations/view_ajax with incremental 'cnvID' integers.
CVE-2020-14961 1 Concretecms 1 Concrete Cms 2021-11-01 5.0 MEDIUM 5.3 MEDIUM
Concrete5 before 8.5.3 does not constrain the sort direction to a valid asc or desc value.
CVE-2021-30871 1 Apple 3 Iphone Os, Macos, Watchos 2021-11-01 2.1 LOW 5.5 MEDIUM
This issue was addressed with a new entitlement. This issue is fixed in iOS 14.7, watchOS 7.6, macOS Big Sur 11.5. A local attacker may be able to access analytics data.
CVE-2019-19164 2 Microsoft, Raonwiz 2 Activex, Dext5 2021-10-29 6.8 MEDIUM 8.8 HIGH
dext5.ocx ActiveX Control in Dext5 Upload 5.0.0.112 and earlier versions contains a vulnerability that could allow remote files to be executed by setting the arguments to the activex method. A remote attacker could induce a user to access a crafted web page, causing damage such as malicious code infection.
CVE-2019-19337 1 Redhat 1 Ceph Storage 2021-10-29 4.0 MEDIUM 6.5 MEDIUM
A flaw was found in Red Hat Ceph Storage version 3 in the way the Ceph RADOS Gateway daemon handles S3 requests. An authenticated attacker can abuse this flaw by causing a remote denial of service by sending a specially crafted HTTP Content-Length header to the Ceph RADOS Gateway server.
CVE-2019-16021 1 Cisco 20 Asr 9000, Asr 9010, Asr 9904 and 17 more 2021-10-29 5.0 MEDIUM 7.5 HIGH
Multiple vulnerabilities in the implementation of Border Gateway Protocol (BGP) Ethernet VPN (EVPN) functionality in Cisco IOS XR Software could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition. The vulnerabilities are due to incorrect processing of BGP update messages that contain crafted EVPN attributes. An attacker could exploit these vulnerabilities by sending BGP EVPN update messages with malformed attributes to be processed by an affected system. A successful exploit could allow the attacker to cause the BGP process to restart unexpectedly, resulting in a DoS condition. The Cisco implementation of BGP accepts incoming BGP traffic only from explicitly defined peers. To exploit these vulnerabilities, the malicious BGP update message would need to come from a configured, valid BGP peer, or would need to be injected by the attacker into the victim's BGP network on an existing, valid TCP connection to a BGP peer.
CVE-2019-15963 1 Cisco 1 Unified Communications Manager 2021-10-29 4.0 MEDIUM 6.5 MEDIUM
A vulnerability in the web-based management interface of Cisco Unified Communications Manager could allow an authenticated, remote attacker to view sensitive information in the web-based management interface of the affected software. The vulnerability is due to insufficient protection of user-supplied input by the web-based management interface of the affected service. An attacker could exploit this vulnerability by accessing the interface and viewing restricted portions of the software configuration. A successful exploit could allow the attacker to gain access to sensitive information or conduct further attacks.