Show filters
154 Total Results
Displaying 11-20 of 154
Sort by:
Attacker Value
Unknown
CVE-2024-6559
Disclosure Date: July 16, 2024 (last updated July 16, 2024)
The Backup, Restore and Migrate WordPress Sites With the XCloner Plugin plugin for WordPress is vulnerable to Full Path Disclosure in all versions up to, and including, 4.7.3. This is due the plugin utilizing sabre without preventing direct access to the files. This makes it possible for unauthenticated attackers to retrieve the full path of the web application, which can be used to aid other attacks. The information displayed is not useful on its own, and requires another vulnerability to be present for damage to an affected website.
0
Attacker Value
Unknown
CVE-2024-5942
Disclosure Date: June 29, 2024 (last updated July 10, 2024)
The Page and Post Clone plugin for WordPress is vulnerable to Insecure Direct Object Reference in all versions up to, and including, 6.0 via the 'content_clone' function due to missing validation on a user controlled key. This makes it possible for authenticated attackers, with Author-level access and above, to clone and read private posts.
0
Attacker Value
Unknown
CVE-2024-38374
Disclosure Date: June 28, 2024 (last updated June 29, 2024)
The CycloneDX core module provides a model representation of the SBOM along with utilities to assist in creating, validating, and parsing SBOMs. Before deserializing CycloneDX Bill of Materials in XML format, _cyclonedx-core-java_ leverages XPath expressions to determine the schema version of the BOM. The `DocumentBuilderFactory` used to evaluate XPath expressions was not configured securely, making the library vulnerable to XML External Entity (XXE) injection. This vulnerability has been fixed in cyclonedx-core-java version 9.0.4.
0
Attacker Value
Unknown
CVE-2023-38395
Disclosure Date: June 12, 2024 (last updated August 08, 2024)
Missing Authorization vulnerability in Afzal Multani WP Clone Menu.This issue affects WP Clone Menu: from n/a through 1.0.1.
0
Attacker Value
Unknown
CVE-2024-34345
Disclosure Date: May 14, 2024 (last updated May 15, 2024)
The CycloneDX JavaScript library contains the core functionality of OWASP CycloneDX for JavaScript. In 6.7.0, XML External entity injections were possible, when running the provided XML Validator on arbitrary input. This issue was fixed in version 6.7.1.
0
Attacker Value
Unknown
CVE-2024-33636
Disclosure Date: April 29, 2024 (last updated April 29, 2024)
Missing Authorization vulnerability in Mahesh Vora WP Page Post Widget Clone.This issue affects WP Page Post Widget Clone: from n/a through 1.0.1.
0
Attacker Value
Unknown
CVE-2024-2294
Disclosure Date: March 16, 2024 (last updated April 01, 2024)
The Backuply – Backup, Restore, Migrate and Clone plugin for WordPress is vulnerable to Directory Traversal in all versions up to, and including, 1.2.7 via the backup_name parameter in the backuply_download_backup function. This makes it possible for attackers to have an account with only activate_plugins capability to access arbitrary files on the server, which can contain sensitive information. This only impacts sites hosted on Windows servers.
0
Attacker Value
Unknown
CVE-2023-6750
Disclosure Date: January 08, 2024 (last updated January 12, 2024)
The Clone WordPress plugin before 2.4.3 uses buffer files to store in-progress backup informations, which is stored at a publicly accessible, statically defined file path.
0
Attacker Value
Unknown
CVE-2020-27631
Disclosure Date: October 10, 2023 (last updated October 14, 2023)
In Oryx CycloneTCP 1.9.6, TCP ISNs are improperly random.
0
Attacker Value
Unknown
CVE-2023-3977
Disclosure Date: July 28, 2023 (last updated October 08, 2023)
Several plugins for WordPress by Inisev are vulnerable to Cross-Site Request Forgery to unauthorized installation of plugins due to a missing nonce check on the handle_installation function that is called via the inisev_installation AJAX aciton in various versions. This makes it possible for unauthenticated attackers to install plugins from the limited list via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
0