Search Results (6617 CVEs found)

CVE Vendors Products Updated CVSS v3.1
CVE-2023-42747 2 Google, Unisoc 14 Android, S8000, Sc7731e and 11 more 2025-05-29 7.8 High
In camera service, there is a possible missing permission check. This could lead to local escalation of privilege with no additional execution privileges needed
CVE-2023-42736 2 Google, Unisoc 14 Android, S8000, Sc7731e and 11 more 2025-05-29 7.8 High
In telecom service, there is a possible missing permission check. This could lead to local escalation of privilege with no additional execution privileges needed
CVE-2024-31099 1 Averta 1 Shortcodes And Extra Features For Phlox Theme 2025-05-29 6.4 Medium
Missing Authorization vulnerability in Averta Shortcodes and extra features for Phlox theme auxin-elements.This issue affects Shortcodes and extra features for Phlox theme: from n/a through 2.15.7.
CVE-2024-37444 1 Wpmudev 2 Defender, Defender Security 2025-05-28 5.3 Medium
Missing Authorization vulnerability in WPMU DEV Defender Security allows Accessing Functionality Not Properly Constrained by ACLs.This issue affects Defender Security: from n/a through 4.7.1.
CVE-2024-39635 1 Kainelabs 1 Youzify 2025-05-28 5.4 Medium
Missing Authorization vulnerability in KaineLabs Youzify allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Youzify: from n/a through 1.2.6.
CVE-2024-12113 1 Kainelabs 1 Youzify 2025-05-28 4.3 Medium
The Youzify – BuddyPress Community, User Profile, Social Network & Membership Plugin for WordPress plugin for WordPress is vulnerable to unauthorized loss of data due to a missing capability check on the delete_user_review() and delete_review() functions in all versions up to, and including, 1.3.2. This makes it possible for authenticated attackers, with Subscriber-level access and above, to delete other user's reviews.
CVE-2025-1813 1 Zframeworks 1 Zz 2025-05-28 4.3 Medium
A vulnerability classified as problematic was found in zj1983 zz up to 2024-08. Affected by this vulnerability is an unknown functionality. The manipulation leads to cross-site request forgery. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
CVE-2024-43158 1 Masteriyo 1 Masteriyo 2025-05-28 7.5 High
Missing Authorization vulnerability in Masteriyo Masteriyo - LMS allows Accessing Functionality Not Properly Constrained by ACLs.This issue affects Masteriyo - LMS: from n/a through 1.11.4.
CVE-2024-43159 1 Masteriyo 1 Masteriyo 2025-05-28 5.3 Medium
Missing Authorization vulnerability in Masteriyo Masteriyo - LMS allows Accessing Functionality Not Properly Constrained by ACLs.This issue affects Masteriyo - LMS: from n/a through 1.11.6.
CVE-2023-50904 2 Ays-pro, Poll Maker Team 2 Poll Maker, Poll Maker 2025-05-28 5.3 Medium
Missing Authorization vulnerability in Poll Maker Team Poll Maker allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Poll Maker: from n/a through 4.8.0.
CVE-2023-45766 1 Ays-pro 1 Poll Maker 2025-05-28 5.3 Medium
Missing Authorization vulnerability in Poll Maker Team Poll Maker allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Poll Maker: from n/a through 4.7.1.
CVE-2024-56295 1 Ays-pro 1 Poll Maker 2025-05-28 6.5 Medium
Missing Authorization vulnerability in Poll Maker Team Poll Maker allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Poll Maker: from n/a through 5.5.6.
CVE-2024-3601 1 Ays-pro 1 Poll Maker 2025-05-28 5.3 Medium
The Poll Maker – Best WordPress Poll Plugin plugin for WordPress is vulnerable to unauthorized access of data due to a missing capability check on the ays_poll_create_author function in all versions up to, and including, 5.1.8. This makes it possible for unauthenticated attackers to extract email addresses by enumerating them one character at a time.
CVE-2025-24577 1 Ays-pro 1 Poll Maker 2025-05-28 6.5 Medium
Missing Authorization vulnerability in Ays Pro Poll Maker allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects Poll Maker: from n/a through 5.5.0.
CVE-2022-41228 1 Jenkins 1 Ns-nd Integration Performance Publisher 2025-05-28 8.8 High
A missing permission check in Jenkins NS-ND Integration Performance Publisher Plugin 4.8.0.129 and earlier allows attackers with Overall/Read permissions to connect to an attacker-specified webserver using attacker-specified credentials.
CVE-2025-28103 1 Dogukanurker 1 Flaskblog 2025-05-28 6.4 Medium
Incorrect access control in laskBlog v2.6.1 allows attackers to arbitrarily delete user accounts via a crafted request.
CVE-2022-41254 1 Jenkins 1 Cons3rt 2025-05-28 6.5 Medium
Missing permission checks in Jenkins CONS3RT Plugin 1.0.0 and earlier allow attackers with Overall/Read permission to connect to an attacker-specified HTTP server using attacker-specified credentials IDs obtained through another method, capturing credentials stored in Jenkins.
CVE-2022-41252 1 Jenkins 1 Cons3rt 2025-05-28 4.3 Medium
Missing permission checks in Jenkins CONS3RT Plugin 1.0.0 and earlier allows users with Overall/Read permission to enumerate credentials ID of credentials stored in Jenkins.
CVE-2022-41251 1 Jenkins 1 Apprenda 2025-05-28 4.3 Medium
A missing permission check in Jenkins Apprenda Plugin 2.2.0 and earlier allows users with Overall/Read permission to enumerate credentials IDs of credentials stored in Jenkins.
CVE-2022-41242 1 Jenkins 1 Extreme-feedback 2025-05-28 5.4 Medium
A missing permission check in Jenkins extreme-feedback Plugin 1.7 and earlier allows attackers with Overall/Read permission to discover information about job names attached to lamps, discover MAC and IP addresses of existing lamps, and rename lamps.