Vulnerabilities (CVE)

Filtered by CWE-862
Total 4572 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2022-47476 2 Google, Unisoc 14 Android, S8000, Sc7731e and 11 more 2025-03-06 N/A 5.5 MEDIUM
In telephony service, there is a missing permission check. This could lead to local information disclosure with no additional execution privileges needed.
CVE-2022-47479 2 Google, Unisoc 14 Android, S8000, Sc7731e and 11 more 2025-03-06 N/A 5.5 MEDIUM
In telephony service, there is a missing permission check. This could lead to local information disclosure with no additional execution privileges needed.
CVE-2023-4059 1 Cozmoslabs 1 Profile Builder 2025-03-06 N/A 4.3 MEDIUM
The Profile Builder WordPress plugin before 3.9.8 lacks authorisation and CSRF in its page creation function which allows unauthenticated users to create the register, log-in and edit-profile pages from the plugin on the blog
CVE-2024-10860 1 Xlplugins 1 Nextmove 2025-03-06 N/A 4.3 MEDIUM
The NextMove Lite – Thank You Page for WooCommerce plugin for WordPress is vulnerable to unauthorized submission of data due to a missing capability check on the _submit_uninstall_reason_action() function in all versions up to, and including, 2.19.0. This makes it possible for authenticated attackers, with Subscriber-level access and above, to submit a deactivation reason on behalf of a site.
CVE-2024-37517 1 Brainstormforce 1 Spectra 2025-03-06 N/A 8.8 HIGH
Missing Authorization vulnerability in Brainstorm Force Spectra allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Spectra: from n/a through 2.13.7.
CVE-2024-13719 1 Pepro 1 Peprodev Ultimate Invoice 2025-03-06 N/A 5.3 MEDIUM
The PeproDev Ultimate Invoice plugin for WordPress is vulnerable to Insecure Direct Object Reference in all versions up to, and including, 2.0.8 via the invoicing viewer due to missing validation on a user controlled key. This makes it possible for unauthenticated attackers to view invoices for completed orders which can contain PII of users.
CVE-2025-1666 2025-03-06 N/A 4.3 MEDIUM
The Cookie banner plugin for WordPress – Cookiebot CMP by Usercentrics plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the send_uninstall_survey() function in all versions up to, and including, 4.4.1. This makes it possible for authenticated attackers, with Subscriber-level access and above, to submit the uninstall survey on behalf of a website.
CVE-2022-47481 2 Google, Unisoc 14 Android, S8000, Sc7731e and 11 more 2025-03-05 N/A 5.5 MEDIUM
In telephony service, there is a missing permission check. This could lead to local denial of service in telephone service with no additional execution privileges needed.
CVE-2022-47482 2 Google, Unisoc 14 Android, S8000, Sc7731e and 11 more 2025-03-05 N/A 5.5 MEDIUM
In telephony service, there is a missing permission check. This could lead to local denial of service in telephone service with no additional execution privileges needed.
CVE-2022-47483 2 Google, Unisoc 14 Android, S8000, Sc7731e and 11 more 2025-03-05 N/A 5.5 MEDIUM
In telephony service, there is a missing permission check. This could lead to local denial of service in telephone service with no additional execution privileges needed.
CVE-2022-47480 2 Google, Unisoc 14 Android, S8000, Sc7731e and 11 more 2025-03-05 N/A 5.5 MEDIUM
In telephony service, there is a missing permission check. This could lead to local denial of service in telephone service with no additional execution privileges needed.
CVE-2025-1891 1 Qzw1210 1 Shishuocms 2025-03-05 N/A 8.8 HIGH
A vulnerability was found in shishuocms 1.1 and classified as problematic. This issue affects some unknown processing. The manipulation leads to cross-site request forgery. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.
CVE-2023-26957 1 Onekeyadmin 1 Onekeyadmin 2025-03-05 N/A 9.1 CRITICAL
onekeyadmin v1.3.9 was discovered to contain an arbitrary file delete vulnerability via the component \admin\controller\plugins.
CVE-2024-12331 1 Ninjateam 1 Filester 2025-03-05 N/A 4.3 MEDIUM
The File Manager Pro – Filester plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the 'ajax_install_plugin' function in all versions up to, and including, 1.8.6. This makes it possible for authenticated attackers, with Subscriber-level access and above, to install the Filebird plugin.
CVE-2023-49979 1 Mayurik 1 Best Student Management System 2025-03-05 N/A 7.5 HIGH
A directory listing vulnerability in Customer Support System v1 allows attackers to list directories and sensitive files within the application without requiring authorization.
CVE-2023-49980 1 Mayurik 1 Best Student Result Management System 2025-03-05 N/A 7.5 HIGH
A directory listing vulnerability in Best Student Result Management System v1.0 allows attackers to list directories and sensitive files within the application without requiring authorization.
CVE-2023-49981 1 Oretnom23 1 School Fees Management System 2025-03-05 N/A 7.5 HIGH
A directory listing vulnerability in School Fees Management System v1.0 allows attackers to list directories and sensitive files within the application without requiring authorization.
CVE-2022-47471 2 Google, Unisoc 14 Android, S8000, Sc7731e and 11 more 2025-03-05 N/A 5.5 MEDIUM
In telephony service, there is a missing permission check. This could lead to local information disclosure with no additional execution privileges needed.
CVE-2024-13686 1 Vwthemes 1 Vw Storefront 2025-03-05 N/A 4.3 MEDIUM
The VW Storefront theme for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the vw_storefront_reset_all_settings() function in all versions up to, and including, 0.9.9. This makes it possible for authenticated attackers, with Subscriber-level access and above, to reset the themes settings.
CVE-2025-1639 1 Crowdytheme 1 Arolax 2025-03-05 N/A 8.8 HIGH
The Animation Addons for Elementor Pro plugin for WordPress is vulnerable to unauthorized arbitrary plugin installation due to a missing capability check on the install_elementor_plugin_handler() function in all versions up to, and including, 1.6. This makes it possible for authenticated attackers, with Subscriber-level access and above, to install and activate arbitrary plugins which can be leveraged to further infect a victim when Elementor is not activated on a vulnerable site.