Show filters
977 Total Results
Displaying 61-70 of 977
Sort by:
Attacker Value
Unknown
CVE-2024-52390
Disclosure Date: November 18, 2024 (last updated November 19, 2024)
: Path Traversal: '.../...//' vulnerability in CYAN Backup allows Path Traversal.This issue affects CYAN Backup: from n/a through 2.5.3.
0
Attacker Value
Unknown
CVE-2024-52415
Disclosure Date: November 16, 2024 (last updated November 17, 2024)
Cross-Site Request Forgery (CSRF) vulnerability in Skpstorm SK WP Settings Backup allows Object Injection.This issue affects SK WP Settings Backup: from n/a through 1.0.
0
Attacker Value
Unknown
CVE-2024-8856
Disclosure Date: November 16, 2024 (last updated January 05, 2025)
The Backup and Staging by WP Time Capsule plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the the UploadHandler.php file and no direct file access prevention in all versions up to, and including, 1.22.21. This makes it possible for unauthenticated attackers to upload arbitrary files on the affected site's server which may make remote code execution possible.
0
Attacker Value
Unknown
CVE-2024-10962
Disclosure Date: November 14, 2024 (last updated January 06, 2025)
The Migration, Backup, Staging – WPvivid plugin for WordPress is vulnerable to PHP Object Injection in all versions up to, and including, 0.9.107 via deserialization of untrusted input in the 'replace_row_data' and 'replace_serialize_data' functions. This makes it possible for unauthenticated attackers to inject a PHP Object. No known POP chain is present in the vulnerable software. If a POP chain is present via an additional plugin or theme installed on the target system, it could allow the attacker to delete arbitrary files, retrieve sensitive data, or execute code. An administrator must create a staging site to trigger the exploit.
0
Attacker Value
Unknown
CVE-2024-34015
Disclosure Date: November 11, 2024 (last updated November 12, 2024)
Sensitive information disclosure during file browsing due to improper symbolic link handling. The following products are affected: Acronis Backup plugin for cPanel & WHM (Linux) before build 818.
0
Attacker Value
Unknown
CVE-2024-34014
Disclosure Date: November 11, 2024 (last updated November 12, 2024)
Arbitrary file overwrite during recovery due to improper symbolic link handling. The following products are affected: Acronis Backup plugin for cPanel & WHM (Linux) before build 818, Acronis Backup extension for Plesk (Linux) before build 599, Acronis Backup plugin for DirectAdmin (Linux) before build 181.
0
Attacker Value
Unknown
CVE-2024-10028
Disclosure Date: November 06, 2024 (last updated November 09, 2024)
The Everest Backup – WordPress Cloud Backup, Migration, Restore & Cloning Plugin plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 2.2.13 via the exposed process stats file during the backup process. This makes it possible for unauthenticated attackers to obtain an archive file name and download the site's backup.
0
Attacker Value
Unknown
CVE-2024-43270
Disclosure Date: November 01, 2024 (last updated November 02, 2024)
Missing Authorization vulnerability in WPBackItUp Backup and Restore WordPress allows Accessing Functionality Not Properly Constrained by ACLs.This issue affects Backup and Restore WordPress: from n/a through 1.50.
0
Attacker Value
Unknown
CVE-2024-43268
Disclosure Date: November 01, 2024 (last updated November 02, 2024)
Access Control vulnerability in WPBackItUp Backup and Restore WordPress allows .
This issue affects Backup and Restore WordPress: from n/a through 1.50.
0
Attacker Value
Unknown
CVE-2024-9162
Disclosure Date: October 28, 2024 (last updated January 06, 2025)
The All-in-One WP Migration and Backup plugin for WordPress is vulnerable to arbitrary PHP Code Injection due to missing file type validation during the export in all versions up to, and including, 7.86. This makes it possible for authenticated attackers, with Administrator-level access and above, to create an export file with the .php extension on the affected site's server, adding an arbitrary PHP code to it, which may make remote code execution possible.
0