Show filters
12 Total Results
Displaying 1-10 of 12
Sort by:
Attacker Value
Unknown

CVE-2024-13869

Disclosure Date: February 22, 2025 (last updated February 23, 2025)
The Migration, Backup, Staging – WPvivid Backup & Migration plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the 'upload_files' function in all versions up to, and including, 0.9.112. This makes it possible for authenticated attackers, with Administrator-level access and above, to upload arbitrary files on the affected site's server which may make remote code execution possible. NOTE: Uploaded files are only accessible on WordPress instances running on the NGINX web server as the existing .htaccess within the target file upload folder prevents access on Apache servers.
Attacker Value
Unknown

CVE-2024-10962

Disclosure Date: November 14, 2024 (last updated January 06, 2025)
The Migration, Backup, Staging – WPvivid plugin for WordPress is vulnerable to PHP Object Injection in all versions up to, and including, 0.9.107 via deserialization of untrusted input in the 'replace_row_data' and 'replace_serialize_data' functions. This makes it possible for unauthenticated attackers to inject a PHP Object. No known POP chain is present in the vulnerable software. If a POP chain is present via an additional plugin or theme installed on the target system, it could allow the attacker to delete arbitrary files, retrieve sensitive data, or execute code. An administrator must create a staging site to trigger the exploit.
0
Attacker Value
Unknown

CVE-2020-36835

Disclosure Date: October 16, 2024 (last updated October 16, 2024)
The Migration, Backup, Staging – WPvivid plugin for WordPress is vulnerable to sensitive information disclosure of a WordPress site's database due to missing capability checks on the wp_ajax_wpvivid_add_remote AJAX action that allows low-level authenticated attackers to send back-ups to a remote location of their choice for review. This affects versions up to, and including 0.9.35.
Attacker Value
Unknown

CVE-2024-1630

Disclosure Date: May 14, 2024 (last updated May 15, 2024)
Path traversal vulnerability in “getAllFolderContents” function of Common Service Desktop, a GE HealthCare ultrasound device component
0
Attacker Value
Unknown

CVE-2024-1629

Disclosure Date: May 14, 2024 (last updated May 15, 2024)
Path traversal vulnerability in “deleteFiles” function of Common Service Desktop, a GE HealthCare ultrasound device component
0
Attacker Value
Unknown

CVE-2024-1628

Disclosure Date: May 14, 2024 (last updated May 15, 2024)
OS command injection vulnerabilities in GE HealthCare ultrasound devices
0
Attacker Value
Unknown

CVE-2024-1486

Disclosure Date: May 14, 2024 (last updated May 15, 2024)
Elevation of privileges via misconfigured access control list in GE HealthCare ultrasound devices
0
Attacker Value
Unknown

CVE-2024-3054

Disclosure Date: April 12, 2024 (last updated April 12, 2024)
WPvivid Backup & Migration Plugin for WordPress is vulnerable to PHAR Deserialization in all versions up to, and including, 0.9.99 via deserialization of untrusted input at the wpvividstg_get_custom_exclude_path_free action. This is due to the plugin not providing sufficient path validation on the tree_node[node][id] parameter. This makes it possible for authenticated attackers, with admin-level access and above, to call files using a PHAR wrapper that will deserialize the data and call arbitrary PHP Objects. No POP chain is present in the vulnerable plugin. If a POP chain is present via an additional plugin or theme installed on the target system, it could allow the attacker to delete arbitrary files, retrieve sensitive data, or execute code.
0
Attacker Value
Unknown

CVE-2020-25179

Disclosure Date: December 14, 2020 (last updated February 22, 2025)
GE Healthcare Imaging and Ultrasound Products may allow specific credentials to be exposed during transport over the network.
Attacker Value
Unknown

CVE-2020-25175

Disclosure Date: December 14, 2020 (last updated February 22, 2025)
GE Healthcare Imaging and Ultrasound Products may allow specific credentials to be exposed during transport over the network.