Search Results (6913 CVEs found)

CVE Vendors Products Updated CVSS v3.1
CVE-2026-25531 1 Kanboard 1 Kanboard 2026-02-13 4.3 Medium
Kanboard is project management software focused on Kanban methodology. Prior to 1.2.50, The fix for CVE-2023-33968 is incomplete. The TaskCreationController::duplicateProjects() endpoint does not validate user permissions for target projects, allowing authenticated users to duplicate tasks into projects they cannot access. This vulnerability is fixed in 1.2.50.
CVE-2025-30398 1 Microsoft 3 Nuance Powerscribe, Nuance Powerscribe 360, Nuance Powerscribe One 2026-02-13 8.1 High
Missing authorization in Nuance PowerScribe allows an unauthorized attacker to disclose information over a network.
CVE-2026-25939 1 Frangoteam 1 Fuxa 2026-02-13 9.1 Critical
FUXA is a web-based Process Visualization (SCADA/HMI/Dashboard) software. From 1.2.8 through version 1.2.10, an authorization bypass vulnerability in the FUXA allows an unauthenticated, remote attacker to create and modify arbitrary schedulers, exposing connected ICS/SCADA environments to follow-on actions. This has been patched in FUXA version 1.2.11.
CVE-2025-21396 1 Microsoft 2 Account, Micrososft Account 2026-02-13 8.2 High
Missing authorization in Microsoft Account allows an unauthorized attacker to elevate privileges over a network.
CVE-2025-21416 1 Microsoft 1 Azure Virtual Desktop 2026-02-13 8.5 High
Missing authorization in Azure Virtual Desktop allows an authorized attacker to elevate privileges over a network.
CVE-2025-49747 1 Microsoft 1 Azure Machine Learning 2026-02-13 9.9 Critical
Missing authorization in Azure Machine Learning allows an authorized attacker to elevate privileges over a network.
CVE-2025-49723 1 Microsoft 16 Windows 10 1809, Windows 10 21h2, Windows 10 21h2 and 13 more 2026-02-13 8.8 High
Missing authorization in Windows StateRepository API allows an authorized attacker to perform tampering locally.
CVE-2025-50171 1 Microsoft 12 Server, Windows, Windows 10 21h2 and 9 more 2026-02-13 9.1 Critical
Missing authorization in Remote Desktop Server allows an unauthorized attacker to perform spoofing over a network.
CVE-2025-14592 1 Gitlab 1 Gitlab 2026-02-13 3.7 Low
GitLab has remediated an issue in GitLab CE/EE affecting all versions from 18.6 before 18.6.6, 18.7 before 18.7.4, and 18.8 before 18.8.4 that, under certain conditions could have allowed an authenticated user to perform unauthorized operations by submitting GraphQL mutations through the GLQL API endpoint.
CVE-2026-20626 1 Apple 5 Ios And Ipados, Ipados, Iphone Os and 2 more 2026-02-13 7.8 High
This issue was addressed with improved checks. This issue is fixed in macOS Sequoia 15.7.4, iOS 26.3 and iPadOS 26.3, macOS Tahoe 26.3, visionOS 26.3. A malicious app may be able to gain root privileges.
CVE-2026-21743 1 Fortinet 1 Fortiauthenticator 2026-02-12 6.8 Medium
A missing authorization vulnerability in Fortinet FortiAuthenticator 6.6.0 through 6.6.6, FortiAuthenticator 6.5 all versions, FortiAuthenticator 6.4 all versions, FortiAuthenticator 6.3 all versions may allow a read-only user to make modification to local users via a file upload to an unprotected endpoint.
CVE-2025-67574 2 Wordpress, Wpdevart 2 Wordpress, Booking Calendar 2026-02-12 5.3 Medium
Missing Authorization vulnerability in wpdevart Booking calendar, Appointment Booking System booking-calendar allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Booking calendar, Appointment Booking System: from n/a through <= 3.2.30.
CVE-2026-1537 2 Latepoint, Wordpress 2 Latepoint – Calendar Booking Plugin For Appointments And Events, Wordpress 2026-02-12 5.3 Medium
The LatePoint – Calendar Booking Plugin for Appointments and Events plugin for WordPress is vulnerable to unauthorized access of data due to a missing capability check on the load_step() function in all versions up to, and including, 5.2.6. This makes it possible for unauthenticated attackers to view booking information including customer names, email addresses, phone numbers, appointment times, and service details.
CVE-2026-25036 2 Wordpress, Wpchill 2 Wordpress, Passster 2026-02-12 6.5 Medium
Missing Authorization vulnerability in WP Chill Passster content-protector allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Passster: from n/a through <= 4.2.25.
CVE-2026-25609 1 Mongodb 1 Mongodb 2026-02-11 5.4 Medium
Incorrect validation of the profile command may result in the determination that a request altering the 'filter' is read-only.
CVE-2025-15524 2 Fooplugins, Wordpress 2 Gallery By Foogallery, Wordpress 2026-02-11 4.3 Medium
The Gallery by FooGallery plugin for WordPress is vulnerable to unauthorized access of data due to a missing capability check on the ajax_get_gallery_info() function in all versions up to, and including, 3.1.9. This makes it possible for authenticated attackers, with Subscriber-level access and above, to retrieve metadata (name, image count, thumbnail URL) of private, draft, and password-protected galleries by enumerating gallery IDs.
CVE-2025-15400 2 Openpix, Wordpress 2 Pix Para Woocommerce, Wordpress 2026-02-11 6.5 Medium
The Pix para Woocommerce WordPress plugin through 2.13.3 allows any authenticated user to trigger AJAX actions that reset payment gateway configuration options without capability or nonce checks. This permits any authenticated users, such as subscribers to clear API credentials and webhook status, causing persistent disruption of OpenPix payment functionality.
CVE-2026-1748 2 Kirilkirkov, Wordpress 2 Invoct – Pdf Invoices & Billing For Woocommerce, Wordpress 2026-02-11 4.3 Medium
The Invoct – PDF Invoices & Billing for WooCommerce plugin for WordPress is vulnerable to unauthorized access of data due to a missing capability check on multiple functions in all versions up to, and including, 1.6. This makes it possible for authenticated attackers, with Subscriber-level access and above, to retrieve invoice clients, invoice items, and list of WordPress users along with their emails.
CVE-2026-1786 2 Badbreze, Wordpress 2 Twitter Posts To Blog, Wordpress 2026-02-11 6.5 Medium
The Twitter posts to Blog plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the 'dg_tw_options' function in all versions up to, and including, 1.11.25. This makes it possible for unauthenticated attackers to update plugin settings including Twitter API credentials, post author, post status, and the capability required to access the plugin's admin menu.
CVE-2026-1833 2 Sm Rasmy, Wordpress 2 Wamate Confirm – Order Confirmation, Wordpress 2026-02-11 5.3 Medium
The WaMate Confirm – Order Confirmation plugin for WordPress is vulnerable to unauthorized access in all versions up to, and including, 2.0.1. This is due to the plugin not properly verifying that a user is authorized to perform an action. This makes it possible for authenticated attackers, with subscriber-level access and above, to block and unblock phone numbers, which should be restricted to administrators.