Export limit exceeded: 341248 CVEs match your query. Please refine your search to export 10,000 CVEs or fewer.

Search

Search Results (7269 CVEs found)

CVE Vendors Products Updated CVSS v3.1
CVE-2023-45272 1 10web 1 Map Builder For Google Maps 2025-03-06 5.4 Medium
Missing Authorization vulnerability in 10Web 10Web Map Builder for Google Maps allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects 10Web Map Builder for Google Maps: from n/a through 1.0.73.
CVE-2025-1666 2025-03-06 4.3 Medium
The Cookie banner plugin for WordPress – Cookiebot CMP by Usercentrics plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the send_uninstall_survey() function in all versions up to, and including, 4.4.1. This makes it possible for authenticated attackers, with Subscriber-level access and above, to submit the uninstall survey on behalf of a website.
CVE-2023-4059 1 Cozmoslabs 1 Profile Builder 2025-03-06 4.3 Medium
The Profile Builder WordPress plugin before 3.9.8 lacks authorisation and CSRF in its page creation function which allows unauthenticated users to create the register, log-in and edit-profile pages from the plugin on the blog
CVE-2022-47479 2 Google, Unisoc 14 Android, S8000, Sc7731e and 11 more 2025-03-06 5.5 Medium
In telephony service, there is a missing permission check. This could lead to local information disclosure with no additional execution privileges needed.
CVE-2022-47476 2 Google, Unisoc 14 Android, S8000, Sc7731e and 11 more 2025-03-06 5.5 Medium
In telephony service, there is a missing permission check. This could lead to local information disclosure with no additional execution privileges needed.
CVE-2023-26510 1 Ghost 1 Ghost 2025-03-06 5.7 Medium
Ghost 5.35.0 allows authorization bypass: contributors can view draft posts of other users, which is arguably inconsistent with a security policy in which a contributor's draft can only be read by editors until published by an editor. NOTE: the vendor's position is that this behavior has no security impact.
CVE-2024-10860 1 Xlplugins 1 Nextmove 2025-03-06 4.3 Medium
The NextMove Lite – Thank You Page for WooCommerce plugin for WordPress is vulnerable to unauthorized submission of data due to a missing capability check on the _submit_uninstall_reason_action() function in all versions up to, and including, 2.19.0. This makes it possible for authenticated attackers, with Subscriber-level access and above, to submit a deactivation reason on behalf of a site.
CVE-2022-47483 2 Google, Unisoc 14 Android, S8000, Sc7731e and 11 more 2025-03-05 5.5 Medium
In telephony service, there is a missing permission check. This could lead to local denial of service in telephone service with no additional execution privileges needed.
CVE-2022-47482 2 Google, Unisoc 14 Android, S8000, Sc7731e and 11 more 2025-03-05 5.5 Medium
In telephony service, there is a missing permission check. This could lead to local denial of service in telephone service with no additional execution privileges needed.
CVE-2022-47481 2 Google, Unisoc 14 Android, S8000, Sc7731e and 11 more 2025-03-05 5.5 Medium
In telephony service, there is a missing permission check. This could lead to local denial of service in telephone service with no additional execution privileges needed.
CVE-2022-47480 2 Google, Unisoc 14 Android, S8000, Sc7731e and 11 more 2025-03-05 5.5 Medium
In telephony service, there is a missing permission check. This could lead to local denial of service in telephone service with no additional execution privileges needed.
CVE-2023-26957 1 Onekeyadmin 1 Onekeyadmin 2025-03-05 9.1 Critical
onekeyadmin v1.3.9 was discovered to contain an arbitrary file delete vulnerability via the component \admin\controller\plugins.
CVE-2022-47471 2 Google, Unisoc 14 Android, S8000, Sc7731e and 11 more 2025-03-05 5.5 Medium
In telephony service, there is a missing permission check. This could lead to local information disclosure with no additional execution privileges needed.
CVE-2022-47461 2 Google, Unisoc 14 Android, S8000, Sc7731e and 11 more 2025-03-05 6.7 Medium
In telephone service, there is a missing permission check. This could lead to local escalation of privilege with system execution privileges needed.
CVE-2022-47462 2 Google, Unisoc 14 Android, S8000, Sc7731e and 11 more 2025-03-05 6.7 Medium
In telephone service, there is a missing permission check. This could lead to local escalation of privilege with system execution privileges needed.
CVE-2022-47472 2 Google, Unisoc 14 Android, S8000, Sc7731e and 11 more 2025-03-05 5.5 Medium
In telephony service, there is a missing permission check. This could lead to local information disclosure with no additional execution privileges needed.
CVE-2022-47473 2 Google, Unisoc 14 Android, S8000, Sc7731e and 11 more 2025-03-05 5.5 Medium
In telephony service, there is a missing permission check. This could lead to local information disclosure with no additional execution privileges needed.
CVE-2022-47484 2 Google, Unisoc 14 Android, S8000, Sc7731e and 11 more 2025-03-05 5.5 Medium
In telephony service, there is a missing permission check. This could lead to local denial of service in telephone service with no additional execution privileges needed.
CVE-2025-1639 1 Crowdytheme 1 Arolax 2025-03-05 8.8 High
The Animation Addons for Elementor Pro plugin for WordPress is vulnerable to unauthorized arbitrary plugin installation due to a missing capability check on the install_elementor_plugin_handler() function in all versions up to, and including, 1.6. This makes it possible for authenticated attackers, with Subscriber-level access and above, to install and activate arbitrary plugins which can be leveraged to further infect a victim when Elementor is not activated on a vulnerable site.
CVE-2024-8682 2025-03-05 5.3 Medium
The JNews - WordPress Newspaper Magazine Blog AMP Theme theme for WordPress is vulnerable to unauthorized user registration in all versions up to, and including, 11.6.6. This is due to the plugin not properly validate if the user can register option is enabled prior to creating a user though the register_handler() function. This makes it possible for unauthenticated attackers to register as a user even when user registration is disabled.