Search Results (1500 CVEs found)

CVE Vendors Products Updated CVSS v3.1
CVE-2025-24315 1 Growatt 1 Cloud Portal 2025-11-14 5.3 Medium
Unauthenticated attackers can add devices of other users to their scenes (or arbitrary scenes of other arbitrary users).
CVE-2025-24850 1 Growatt 1 Cloud Portal 2025-11-14 5.3 Medium
An attacker can export other users' plant information.
CVE-2025-25276 1 Growatt 1 Cloud Portal 2025-11-14 5.3 Medium
An unauthenticated attacker can hijack other users' devices and potentially control them.
CVE-2025-26857 1 Growatt 1 Cloud Portal 2025-11-14 5.3 Medium
Unauthenticated attackers can rename arbitrary devices of arbitrary users (i.e., EV chargers).
CVE-2025-27561 1 Growatt 1 Cloud Portal 2025-11-14 5.3 Medium
Unauthenticated attackers can rename "rooms" of arbitrary users.
CVE-2025-27565 1 Growatt 1 Cloud Portal 2025-11-14 5.3 Medium
An unauthenticated attacker can delete any user's "rooms" by knowing the user's and room IDs.
CVE-2025-27575 1 Growatt 1 Cloud Portal 2025-11-14 5.3 Medium
An unauthenticated attacker can obtain EV charger version and firmware upgrading history by knowing the charger ID.
CVE-2025-27719 1 Growatt 1 Cloud Portal 2025-11-14 5.3 Medium
Unauthenticated attackers can query an API endpoint and get device details.
CVE-2025-27927 1 Growatt 1 Cloud Portal 2025-11-14 5.3 Medium
An unauthenticated attackers can obtain a list of smart devices by knowing a valid username through an unprotected API.
CVE-2025-27929 1 Growatt 1 Cloud Portal 2025-11-14 5.3 Medium
Unauthenticated attackers can retrieve full list of users associated with arbitrary accounts.
CVE-2025-30257 1 Growatt 1 Cloud Portal 2025-11-14 5.3 Medium
Unauthenticated attackers can retrieve serial number of smart meters associated to a specific user account.
CVE-2025-31147 1 Growatt 1 Cloud Portal 2025-11-14 5.3 Medium
Unauthenticated attackers can query information about total energy consumed by EV chargers of arbitrary users.
CVE-2025-41069 1 T-innova 1 Deporsite 2025-11-14 N/A
Insecure Direct Object Reference (IDOR) vulnerability in DeporSite of T-INNOVA. This vulnerability allows an attacker to access or modify unauthorized resources by manipulating requests using the 'idUsuario' parameter in ‘/ajax/TInnova_v2/Formulario_Consentimiento/llamadaAjax/obtenerDatosConsentimientos’, which could lead to the exposure or alteration os confidential data.
CVE-2024-12767 1 Buddyboss 1 Buddyboss Platform 2025-11-13 3.5 Low
The buddyboss-platform WordPress plugin before 2.7.60 lacks proper access controls and allows a logged-in user to view comments on private posts
CVE-2025-27938 1 Growatt 1 Cloud Portal 2025-11-12 5.3 Medium
Unauthenticated attackers can obtain restricted information about a user's smart device collections (i.e., "rooms").
CVE-2025-27939 1 Growatt 1 Cloud Portal 2025-11-12 7.5 High
An attacker can change registered email addresses of other users and take over arbitrary accounts.
CVE-2025-30254 1 Growatt 1 Cloud Portal 2025-11-12 5.3 Medium
An unauthenticated attacker can obtain a serial number of a smart meter(s) using its owner's username.
CVE-2025-30514 1 Growatt 1 Cloud Portal 2025-11-12 5.3 Medium
Unauthenticated attackers can obtain restricted information about a user's smart device collections (i.e., "scenes").
CVE-2025-62241 1 Liferay 2 Digital Experience Platform, Dxp 2025-11-12 4.3 Medium
Insecure Direct Object Reference (IDOR) vulnerability with shipment addresses in Liferay DXP 2023.Q4.1 through 2023.Q4.5 allows remote authenticated users to from one virtual instance to view the shipment addresses of different virtual instance via the _com_liferay_commerce_order_web_internal_portlet_CommerceOrderPortlet_commerceOrderId parameter.
CVE-2025-12854 1 Newbee-mall Project 1 Newbee-mall 2025-11-12 3.7 Low
A vulnerability was identified in newbee-mall-plus up to 2.4.1. This vulnerability affects the function executeSeckill of the file /seckillExecution/. The manipulation of the argument userid leads to authorization bypass. It is possible to initiate the attack remotely. The attack is considered to have high complexity. It is stated that the exploitability is difficult. The exploit is publicly available and might be used.