8.7

CVSS4.0

CVE-2025-41335 - Missing Authorization vulnerability in CanalDenuncia.app

A lack of authorisation vulnerability has been detected in CanalDenuncia.app. This vulnerability allows an attacker to access other users' information by sending a POST through the parameters 'id' and ' 'id_sociedad' in '/api/buscarEmpresaById.php'.

📅 Published: Nov. 4, 2025, 1:15 p.m. 🔄 Last Modified: Nov. 5, 2025, 5:03 p.m.

8.7

CVSS4.0

CVE-2025-41114 - Missing Authorization vulnerability in CanalDenuncia.app

A lack of authorisation vulnerability has been detected in CanalDenuncia.app. This vulnerability allows an attacker to access other users' information by sending a POST through the parameters 'id_denuncia' and 'id_user' in '/backend/api/buscarDocumentosByIdDenunciaUsuario.php'.

📅 Published: Nov. 4, 2025, 1:10 p.m. 🔄 Last Modified: Nov. 5, 2025, 5:06 p.m.

8.7

CVSS4.0

CVE-2025-41113 - Missing Authorization vulnerability in CanalDenuncia.app

A lack of authorisation vulnerability has been detected in CanalDenuncia.app. This vulnerability allows an attacker to access other users' information by sending a POST through the parameter 'id_denuncia' in '/backend/api/buscarDenunciaByPin.php'.

📅 Published: Nov. 4, 2025, 1:10 p.m. 🔄 Last Modified: Nov. 5, 2025, 5:06 p.m.

8.7

CVSS4.0

CVE-2025-41112 - Missing Authorization vulnerability in CanalDenuncia.app

A lack of authorisation vulnerability has been detected in CanalDenuncia.app. This vulnerability allows an attacker to access other users' information by sending a POST through the parameter 'web' in '/backend/api/buscarConfiguracionParametros2.php'.

📅 Published: Nov. 4, 2025, 1:09 p.m. 🔄 Last Modified: Nov. 5, 2025, 5:06 p.m.

8.7

CVSS4.0

CVE-2025-41111 - Missing Authorization vulnerability in CanalDenuncia.app

A lack of authorisation vulnerability has been detected in CanalDenuncia.app. This vulnerability allows an attacker to access other users' information by sending a POST through the parameter 'id_denuncia' in '/backend/api/buscarComentariosByDenuncia.php'.

📅 Published: Nov. 4, 2025, 1:08 p.m. 🔄 Last Modified: Nov. 5, 2025, 5:06 p.m.

6.4

CVSS3.1

CVE-2025-12045 - Orbit Fox Companion <= 3.0.2 - Authenticated (Author+) Stored Cross-Site Scripting via Post Taxonomy

The Orbit Fox: Duplicate Page, Menu Icons, SVG Support, Cookie Notice, Custom Fonts & More plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the category and tag 'name' parameters in all versions up to, and including, 3.0.2 due to insufficient input sanitization and output escap…

📅 Published: Nov. 4, 2025, 11:19 a.m. 🔄 Last Modified: Nov. 4, 2025, 6:53 p.m.

9.8

CVSS3.1

CVE-2025-12493 - ShopLentor <= 3.2.5 - Unauthenticated Local PHP File Inclusion via 'load_template'

The ShopLentor – WooCommerce Builder for Elementor & Gutenberg +21 Modules – All in One Solution (formerly WooLentor) plugin for WordPress is vulnerable to Local File Inclusion in all versions up to, and including, 3.2.5 via the 'load_template' function. This makes it possible for unauthenticated a…

📅 Published: Nov. 4, 2025, 11:19 a.m. 🔄 Last Modified: Nov. 4, 2025, 8:13 p.m.

8.5

CVSS3.1

CVE-2025-11690 - IDOR vulnerability in the CFMOTO RIDE API

An Insecure Direct Object Reference (IDOR) vulnerability exists in the vehicleId parameter, allowing unauthorized access to sensitive information of other users’ vehicles. Exploiting this issue enables an attacker to retrieve data such as GPS coordinates, encryption keys, initialization vectors, mo…

📅 Published: Nov. 4, 2025, 10:25 a.m. 🔄 Last Modified: Nov. 4, 2025, 8:20 p.m.

6.7

CVSS3.1

CVE-2025-20749 -

In charger, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege if a malicious actor has already obtained the System privilege. User interaction is not needed for exploitation. Patch ID: ALPS09915493; Issue ID: MSV-3800.

📅 Published: Nov. 4, 2025, 6:20 a.m. 🔄 Last Modified: Nov. 5, 2025, 5:10 p.m.

6.7

CVSS3.1

CVE-2025-20748 -

In wlan AP driver, there is a possible out of bounds write due to an incorrect bounds check. This could lead to local escalation of privilege if a malicious actor has already obtained the System privilege. User interaction is not needed for exploitation. Patch ID: WCNCR00432679; Issue ID: MSV-3950.

📅 Published: Nov. 4, 2025, 6:20 a.m. 🔄 Last Modified: Nov. 5, 2025, 5:11 p.m.
Total resulsts: 317295
Page 44 of 31,730
« previous page » next page
Filters