CVE-2022-0826 – WP Video Gallery <= 1.7.1 - Unauthenticated SQLi
https://notcve.org/view.php?id=CVE-2022-0826
The WP Video Gallery WordPress plugin through 1.7.1 does not sanitise and escape a parameter before using it in a SQL statement via an AJAX action, leading to an SQL Injection exploitable by unauthenticated users El plugin WP Video Gallery de WordPress versiones hasta 1.7.1, no sanea ni escapa de un parámetro antes de usarlo en una sentencia SQL por medio de una acción AJAX, conllevando a una inyección SQL explotable por usuarios no autenticados • https://wpscan.com/vulnerability/7a3eed3b-c643-4e24-b833-eba60ab631c5 • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •
CVE-2022-27853 – WordPress Contest Gallery plugin <= 13.1.0.9 - Authenticated Stored Cross-Site Scripting (XSS) vulnerability
https://notcve.org/view.php?id=CVE-2022-27853
Authenticated (author or higher role) Stored Cross-Site Scripting (XSS) in Contest Gallery (WordPress plugin) <= 13.1.0.9 Una vulnerabilidad de tipo Cross-Site Scripting (XSS) Almacenado Autenticado (rol de autor o superior) en Contest Gallery (plugin de WordPress) versiones anteriores a 13.1.0.9 incluyéndola • https://patchstack.com/database/vulnerability/contest-gallery/wordpress-contest-gallery-plugin-13-1-0-9-authenticated-stored-cross-site-scripting-xss-vulnerability https://wordpress.org/plugins/contest-gallery • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •
CVE-2021-24915 – Contest Gallery < 13.1.0.6 - Missing Access Controls to Unauthenticated SQL injection / Email Address Disclosure
https://notcve.org/view.php?id=CVE-2021-24915
The Contest Gallery WordPress plugin before 13.1.0.6 does not have capability checks and does not sanitise or escape the cg-search-user-name-original parameter before using it in a SQL statement when exporting users from a gallery, which could allow unauthenticated to perform SQL injections attacks, as well as get the list of all users registered on the blog, including their username and email address El plugin Contest Gallery de WordPress versiones anteriores a 13.1.0.6, no presenta comprobaciones de capacidad y no sanea o escapa del parámetro cg-search-user-name-original antes de usarlo en una sentencia SQL cuando son exportados usuarios de una galería, lo que podría permitir a personas no autenticadas llevar a cabo ataques de inyecciones SQL, así como conseguir la lista de todos los usuarios registrados en el blog, incluyendo su nombre de usuario y dirección de correo electrónico • https://gist.github.com/tpmiller87/6c05596fe27dd6f69f1aaba4cbb9c917 https://wpscan.com/vulnerability/45ee86a7-1497-4c81-98b8-9a8e5b3d4fac • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •
CVE-2021-38753
https://notcve.org/view.php?id=CVE-2021-38753
An unrestricted file upload on Simple Image Gallery Web App can be exploited to upload a web shell and executed to gain unauthorized access to the server hosting the web app. Una carga de archivos no restringida en la aplicación web Simple Image Gallery, puede ser explotada para cargar una shell web y ejecutada para conseguir acceso no autorizado al servidor que aloja la aplicación web. • https://github.com/dumpling-soup/Simple-Image-Gallery-Web-App/blob/main/README.md • CWE-434: Unrestricted Upload of File with Dangerous Type •
CVE-2021-24349 – Gallery From Files <= 1.6.0 - Reflected Cross-Site Scripting (XSS)
https://notcve.org/view.php?id=CVE-2021-24349
This Gallery from files WordPress plugin through 1.6.0 gives the functionality of uploading images to the server. But filenames are not properly sanitized before being output in an error message when they have an invalid extension, leading to a reflected Cross-Site Scripting issue. Due to the lack of CSRF check, the attack could also be performed via such vector. Esta Galería del plugin de WordPress de archivos versiones hasta 1.6.0, otorga la funcionalidad de subir imágenes al servidor. Pero los nombres de los archivos no se sanean apropiadamente antes de ser emitidos en un mensaje de error cuando tienen una extensión no válida, conllevando a un problema de tipo Cross-Site Scripting reflejado. • https://wpscan.com/vulnerability/6bb4eb71-d702-4732-b01f-b723077d66ca • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') CWE-352: Cross-Site Request Forgery (CSRF) •