Vulnerabilities (CVE)

Filtered by CWE-639
Total 833 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2025-27561 2025-04-16 N/A 5.3 MEDIUM
Unauthenticated attackers can rename "rooms" of arbitrary users.
CVE-2025-27575 2025-04-16 N/A 5.3 MEDIUM
An unauthenticated attacker can obtain EV charger version and firmware upgrading history by knowing the charger ID.
CVE-2025-27927 2025-04-16 N/A 5.3 MEDIUM
An unauthenticated attackers can obtain a list of smart devices by knowing a valid username through an unprotected API.
CVE-2025-31949 2025-04-16 N/A 5.3 MEDIUM
An authenticated attacker can obtain any plant name by knowing the plant ID.
CVE-2025-31941 2025-04-16 N/A 5.3 MEDIUM
An unauthenticated attacker can obtain a list of smart devices by knowing a valid username.
CVE-2025-24315 2025-04-16 N/A 5.3 MEDIUM
Unauthenticated attackers can add devices of other users to their scenes (or arbitrary scenes of other arbitrary users).
CVE-2025-31945 2025-04-16 N/A 5.3 MEDIUM
An unauthenticated attacker can obtain other users' charger information.
CVE-2025-31950 2025-04-16 N/A 5.3 MEDIUM
An unauthenticated attacker can obtain EV charger energy consumption information of other users.
CVE-2025-31654 2025-04-16 N/A 5.3 MEDIUM
An attacker can get information about the groups of the smart home devices for arbitrary users (i.e., "rooms").
CVE-2025-26857 2025-04-16 N/A 5.3 MEDIUM
Unauthenticated attackers can rename arbitrary devices of arbitrary users (i.e., EV chargers).
CVE-2025-31147 2025-04-16 N/A 5.3 MEDIUM
Unauthenticated attackers can query information about total energy consumed by EV chargers of arbitrary users.
CVE-2025-27719 2025-04-16 N/A 5.3 MEDIUM
Unauthenticated attackers can query an API endpoint and get device details.
CVE-2025-27929 2025-04-16 N/A 5.3 MEDIUM
Unauthenticated attackers can retrieve full list of users associated with arbitrary accounts.
CVE-2025-31360 2025-04-16 N/A 6.5 MEDIUM
Unauthenticated attackers can trigger device actions associated with specific "scenes" of arbitrary users.
CVE-2025-26977 1 Ninjateam 1 Filebird 2025-04-15 N/A 3.8 LOW
Authorization Bypass Through User-Controlled Key vulnerability in Ninja Team Filebird allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects Filebird: from n/a through 6.4.2.1.
CVE-2025-3575 2025-04-15 N/A N/A
Insecure Direct Object Reference vulnerability in Deporsite from T-INNOVA allows an attacker to retrieve sensitive information from others users via "idUsuario" parameter in "/helper/Familia/establecerUsuarioSeleccion" endpoint.
CVE-2025-3282 2025-04-15 N/A 5.3 MEDIUM
The User Registration & Membership – Custom Registration Form, Login Form, and User Profile plugin for WordPress is vulnerable to Insecure Direct Object Reference in all versions up to, and including, 4.1.3 via the user_registration_membership_register_member() due to missing validation on the 'membership_id' user controlled key. This makes it possible for unauthenticated attackers to update any user's membership to any other active or non-active membership type.
CVE-2025-3574 2025-04-15 N/A N/A
Insecure Direct Object Reference vulnerability in Deporsite from T-INNOVA allows an attacker to retrieve sensitive information from others users via "idUsuario" parameter in "/helper/Familia/obtenerFamiliaUsuario" endpoint.
CVE-2025-3292 2025-04-15 N/A 4.3 MEDIUM
The User Registration & Membership – Custom Registration Form, Login Form, and User Profile plugin for WordPress is vulnerable to Insecure Direct Object Reference in all versions up to, and including, 4.1.3 via the user_registration_update_profile_details() due to missing validation on the 'user_id' user controlled key. This makes it possible for unauthenticated attackers to update other user's passwords, if they have access to the user ID and email.
CVE-2024-33668 1 Zammad 1 Zammad 2025-04-15 N/A 9.1 CRITICAL
An issue was discovered in Zammad before 6.3.0. The Zammad Upload Cache uses insecure, partially guessable FormIDs to identify content. An attacker could try to brute force them to upload malicious content to article drafts they have no access to.