Page 12 of 69 results (0.026 seconds)

CVSS: 4.3EPSS: 0%CPEs: 1EXPL: 0

Multiple cross-site scripting (XSS) vulnerabilities in Gallery 1.3.4-pl1 allow remote attackers to inject arbitrary web script or HTML via (1) the index field in add_comment.php, (2) set_albumName, (3) slide_index, (4) slide_full, (5) slide_loop, (6) slide_pause, (7) slide_dir fields in slideshow_low.php, or (8) username field in search.php. • http://archives.neohapsis.com/archives/vulnwatch/2005-q1/0031.html http://gallery.menalto.com/modules.php?op=modload&name=News&file=article&sid=147 http://marc.info/?l=bugtraq&m=110608459222364&w=2 http://theinsider.deep-ice.com/texts/advisory69.txt https://exchange.xforce.ibmcloud.com/vulnerabilities/18938 https://exchange.xforce.ibmcloud.com/vulnerabilities/43473 •

CVSS: 5.0EPSS: 1%CPEs: 1EXPL: 0

Cross-site scripting vulnerability in login.php in Gallery 1.4.4-pl2 allows remote attackers to inject arbitrary web script or HTML via the username field. • http://archives.neohapsis.com/archives/vulnwatch/2005-q1/0031.html http://gallery.menalto.com/modules.php?op=modload&name=News&file=article&sid=147 http://marc.info/?l=bugtraq&m=110608459222364&w=2 http://secunia.com/advisories/13887 http://theinsider.deep-ice.com/texts/advisory69.txt http://www.gentoo.org/security/en/glsa/glsa-200501-45.xml https://exchange.xforce.ibmcloud.com/vulnerabilities/18938 •

CVSS: 7.5EPSS: 10%CPEs: 1EXPL: 3

The set_time_limit function in Gallery before 1.4.4_p2 deletes non-image files in a temporary directory every 30 seconds after they have been uploaded using save_photos.php, which allows remote attackers to upload and execute execute arbitrary scripts before they are deleted, if the temporary directory is under the web root. • https://www.exploit-db.com/exploits/24383 http://archives.neohapsis.com/archives/fulldisclosure/2004-08/0757.html http://gallery.menalto.com/modules.php?op=modload&name=News&file=article&sid=134&mode=thread&order=0&thold=0 http://www.gentoo.org/security/en/glsa/glsa-200409-05.xml http://www.securityfocus.com/bid/10968 https://exchange.xforce.ibmcloud.com/vulnerabilities/17021 •

CVSS: 5.0EPSS: 7%CPEs: 5EXPL: 1

The register_globals simulation capability in Gallery 1.3.1 through 1.4.1 allows remote attackers to modify the HTTP_POST_VARS variable and conduct a PHP remote file inclusion attack via the GALLERY_BASEDIR parameter, a different vulnerability than CVE-2002-1412. • https://www.exploit-db.com/exploits/23599 http://gallery.menalto.com/modules.php?op=modload&name=News&file=index http://marc.info/?l=bugtraq&m=107524414317693&w=2 http://secunia.com/advisories/10712 http://www.gentoo.org/security/en/glsa/glsa-200402-04.xml http://www.osvdb.org/3737 http://www.securityfocus.com/bid/9490 https://exchange.xforce.ibmcloud.com/vulnerabilities/14950 •

CVSS: 6.8EPSS: 4%CPEs: 8EXPL: 0

Cross-site scripting (XSS) vulnerability in Gallery 1.4.4-pl3 and earlier allows remote attackers to execute arbitrary web script or HTML via "specially formed URLs," possibly via the include parameter in index.php. Vulnerabilidad de secuencias de comandos en sitios cruzados (XSS) en Gallery 1.4.4-pl3 y anteriores permite a atacantes remotos ejecutar script web o HTML de su elección mediante "URL s especialmente malformadas", posiblemente mediante un parámetro include en index.php • http://g3cko.info/gallery2-4.patch http://gallery.menalto.com/modules.php?op=modload&name=News&file=article&sid=142&mode=thread&order=0&thold=0 http://www.debian.org/security/2005/dsa-642 http://www.gentoo.org/security/en/glsa/glsa-200411-10.xml http://www.securityfocus.com/bid/11602 https://exchange.xforce.ibmcloud.com/vulnerabilities/17948 •