Show filters
977 Total Results
Displaying 101-110 of 977
Sort by:
Attacker Value
Unknown

CVE-2024-29850

Disclosure Date: May 22, 2024 (last updated May 23, 2024)
Veeam Backup Enterprise Manager allows account takeover via NTLM relay.
0
Attacker Value
Unknown

CVE-2024-29849

Disclosure Date: May 22, 2024 (last updated May 23, 2024)
Veeam Backup Enterprise Manager allows unauthenticated users to log in as any user to enterprise manager web interface.
0
Attacker Value
Unknown

CVE-2023-41243

Disclosure Date: May 17, 2024 (last updated May 17, 2024)
Improper Privilege Management vulnerability in WPvivid Team WPvivid Backup and Migration allows Privilege Escalation.This issue affects WPvivid Backup and Migration: from n/a through 0.9.90.
0
Attacker Value
Unknown

CVE-2024-4392

Disclosure Date: May 14, 2024 (last updated May 15, 2024)
The Jetpack – WP Security, Backup, Speed, & Growth plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's wpvideo shortcode in all versions up to, and including, 13.3.1 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
0
Attacker Value
Unknown

CVE-2024-3546

Disclosure Date: May 02, 2024 (last updated January 05, 2025)
The WordPress Backup & Migration plugin for WordPress is vulnerable to unauthorized access of data due to a missing capability check on the wp_mgdp_populate_popup function in all versions up to, and including, 1.4.8. This makes it possible for authenticated attackers, with subscriber access or above, to invoke this function and access log files maintained by the plugin. Additionally, the file name is user-provided and not properly sanitized, which allows attackers to read arbitrary log files on the file system.
0
Attacker Value
Unknown

CVE-2024-3682

Disclosure Date: April 26, 2024 (last updated April 26, 2024)
The WP STAGING and WP STAGING Pro plugins for WordPress are vulnerable to Sensitive Information Exposure in versions up to, and including, 3.4.3, and versions up to, and including, 5.4.3, respectively, via the ajaxSendReport function. This makes it possible for unauthenticated attackers to extract sensitive data from a log file, including system information and (in the Pro version) license keys. Successful exploitation requires an administrator to have used the 'Contact Us' functionality along with the "Enable this option to automatically submit the log files." option.
0
Attacker Value
Unknown

CVE-2024-32686

Disclosure Date: April 18, 2024 (last updated April 18, 2024)
Insertion of Sensitive Information into Log File vulnerability in Inisev Backup Migration.This issue affects Backup Migration: from n/a through 1.4.3.
0
Attacker Value
Unknown

CVE-2024-2309

Disclosure Date: April 17, 2024 (last updated April 17, 2024)
The WP STAGING WordPress Backup Plugin WordPress plugin before 3.4.0, wp-staging-pro WordPress plugin before 5.4.0 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)
0
Attacker Value
Unknown

CVE-2023-7201

Disclosure Date: April 15, 2024 (last updated April 15, 2024)
The Everest Backup WordPress plugin before 2.2.5 does not properly validate backup files to be uploaded, allowing high privilege users such as admin to upload arbitrary files on the server even when they should not be allowed to (for example in multisite setup)
0
Attacker Value
Unknown

CVE-2024-3054

Disclosure Date: April 12, 2024 (last updated April 12, 2024)
WPvivid Backup & Migration Plugin for WordPress is vulnerable to PHAR Deserialization in all versions up to, and including, 0.9.99 via deserialization of untrusted input at the wpvividstg_get_custom_exclude_path_free action. This is due to the plugin not providing sufficient path validation on the tree_node[node][id] parameter. This makes it possible for authenticated attackers, with admin-level access and above, to call files using a PHAR wrapper that will deserialize the data and call arbitrary PHP Objects. No POP chain is present in the vulnerable plugin. If a POP chain is present via an additional plugin or theme installed on the target system, it could allow the attacker to delete arbitrary files, retrieve sensitive data, or execute code.
0