Search Results (9978 CVEs found)

CVE Vendors Products Updated CVSS v3.1
CVE-2024-37119 1 Uncannyowl 1 Uncanny Automator 2025-08-11 5.3 Medium
Missing Authorization vulnerability in Uncanny Owl Uncanny Automator Pro allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Uncanny Automator Pro: from n/a through 5.3.0.0.
CVE-2024-37470 2 Wofficeio, Xtendify 2 Woffice Core, Woffice 2025-08-11 8.2 High
Missing Authorization vulnerability in WofficeIO Woffice Core allows Accessing Functionality Not Properly Constrained by ACLs.This issue affects Woffice Core: from n/a through 5.4.8.
CVE-2024-1934 1 Wpcompress 2 Image Optimizer, Wp Compress 2025-08-09 7.5 High
The WP Compress – Image Optimizer plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the 'wps_local_compress::__construct' function in all versions up to, and including, 6.11.10. This makes it possible for unauthenticated attackers to reset the CDN region and set a malicious URL to deliver images.
CVE-2025-2075 1 Uncannyowl 1 Uncanny Automator 2025-08-08 8.8 High
The Uncanny Automator – Easy Automation, Integration, Webhooks & Workflow Builder Plugin for WordPress is vulnerable to Privilege Escalation in all versions up to, and including, 6.3.0.2. This is due to add_role() and user_role() functions missing proper capability checks performed through the validate_rest_call() function. This makes it possible for unauthenticated attackers to set the role of arbitrary users to administrator granting full access to the site, though privilege escalation requires an active account on the site so this is considered an authenticated privilege escalation.
CVE-2025-2807 2 Stylemixthemes, Wordpress 2 Motors - Car Dealer\, Classifieds \& Listing, Wordpress 2025-08-08 8.8 High
The Motors – Car Dealership & Classified Listings Plugin plugin for WordPress is vulnerable to arbitrary plugin installations due to a missing capability check in the mvl_setup_wizard_install_plugin() function in all versions up to, and including, 1.4.64. This makes it possible for authenticated attackers, with Subscriber-level access and above, to install and activate arbitrary plugins on the affected site's server which may make remote code execution possible.
CVE-2025-3437 2 Stylemixthemes, Wordpress 2 Motors - Car Dealer\, Classifieds \& Listing, Wordpress 2025-08-08 4.3 Medium
The Motors – Car Dealership & Classified Listings Plugin plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on several functions in the ajax_actions.php file in all versions up to, and including, 1.4.66. This makes it possible for authenticated attackers, with Subscriber-level access and above, to execute several initial set-up actions.
CVE-2025-26526 1 Moodle 1 Moodle 2025-08-08 6.5 Medium
Separate Groups mode restrictions were not factored into permission checks before allowing viewing or deletion of responses in Feedback activities.
CVE-2025-0765 1 Gitlab 1 Gitlab 2025-08-08 4.3 Medium
An issue has been discovered in GitLab CE/EE affecting all versions from 17.9 before 18.0.5, 18.1 before 18.1.3, and 18.2 before 18.2.1 that could have allowed an unauthorized user to access custom service desk email addresses.
CVE-2024-12244 1 Gitlab 1 Gitlab 2025-08-08 4.3 Medium
An issue has been discovered in access controls could allow users to view certain restricted project information even when related features are disabled in GitLab EE, affecting all versions from 17.7 prior to 17.9.7, 17.10 prior to 17.10.5, and 17.11 prior to 17.11.1.
CVE-2025-0652 1 Gitlab 1 Gitlab 2025-08-08 4.3 Medium
An issue has been discovered in GitLab EE/CE affecting all versions starting from 16.9 before 17.7.7, all versions starting from 17.8 before 17.8.5, all versions starting from 17.9 before 17.9.2 could allow unauthorized users to access confidential information intended for internal use only.
CVE-2025-8533 1 Flexibits 1 Fantastical 2025-08-07 N/A
A vulnerability was identified in the XPC services of Fantastical. The services failed to implement proper client authorization checks in its listener:shouldAcceptNewConnection method, unconditionally accepting requests from any local process. As a result, any local, unprivileged process could connect to the XPC service and access its methods. This issue has been resolved in version 4.0.16.
CVE-2024-31409 1 Cyberpower 2 Powerpanel, Powerpanel Business 2025-08-07 6.5 Medium
Certain MQTT wildcards are not blocked on the CyberPower PowerPanel system, which might result in an attacker obtaining data from throughout the system after gaining access to any device.
CVE-2025-43720 1 H-mdm 1 Headwind Mdm 2025-08-07 6.5 Medium
Headwind MDM before 5.33.1 makes configuration details accessible to unauthorized users. The Configuration profile is exposed to the Observer user role, revealing the password requires to escape out of the MDM controlled device's profile.
CVE-2025-43977 1 Sktelecom 1 Com.skt.prod.dialer 2025-08-07 4.3 Medium
The com.skt.prod.dialer application through 12.5.0 for Android enables any installed application (with no permissions) to place phone calls without user interaction by sending a crafted intent via the com.skt.prod.dialer.activities.outgoingcall.OutgoingCallInternalBroadcaster component.
CVE-2025-43976 1 Textnow 1 2ndline 2025-08-07 4.3 Medium
The com.enflick.android.tn2ndLine application through 24.17.1.0 for Android enables any installed application (with no permissions) to place phone calls without user interaction by sending a crafted intent via the com.enflick.android.TextNow.activities.DialerActivity component.
CVE-2025-26901 1 Brizy 1 Brizy 2025-08-07 4.3 Medium
Missing Authorization vulnerability in Brizy Brizy Pro allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Brizy Pro: from n/a through 2.6.1.
CVE-2025-20332 1 Cisco 1 Identity Services Engine Software 2025-08-07 4.3 Medium
A vulnerability in the web-based management interface of Cisco ISE could allow an authenticated, remote attacker to modify parts of the configuration on an affected device. This vulnerability is due to the lack of server-side validation of Administrator permissions. An attacker could exploit this vulnerability by submitting a crafted HTTP request to an affected system. A successful exploit could allow the attacker to modify descriptions of files on a specific page. To exploit this vulnerability, an attacker would need valid read-only Administrator credentials.
CVE-2025-26531 1 Moodle 1 Moodle 2025-08-07 3.1 Low
Insufficient capability checks made it possible to disable badges a user does not have permission to access.
CVE-2025-26532 1 Moodle 1 Moodle 2025-08-06 3.1 Low
Additional checks were required to ensure trusttext is applied (when enabled) to glossary entries being restored.
CVE-2025-8595 2 Themegrill, Wordpress 2 Zakra, Wordpress 2025-08-06 4.3 Medium
The Zakra theme for WordPress is vulnerable to unauthorized data modification due to a missing capability check on the welcome_notice_import_handler() function in all versions up to, and including, 4.1.5. This makes it possible for authenticated attackers, with Subscriber-level access and above, to import demo settings.