Page 33 of 198 results (0.007 seconds)

CVSS: 4.3EPSS: 0%CPEs: 20EXPL: 0

Cross-site scripting (XSS) vulnerability in Gallery before 1.5.3 allows remote attackers to inject arbitrary web script or HTML via unknown attack vectors. • http://secunia.com/advisories/19580 http://sourceforge.net/project/shownotes.php?release_id=408602&group_id=7130 http://www.osvdb.org/24466 http://www.securityfocus.com/bid/17437 http://www.vupen.com/english/advisories/2006/1285 https://exchange.xforce.ibmcloud.com/vulnerabilities/25707 •

CVSS: 7.5EPSS: 0%CPEs: 1EXPL: 3

SQL injection vulnerability in slides.php in Eric Gerdes Crafty Syntax Image Gallery (CSIG) (aka PHP thumbnail Photo Gallery) 3.1g and earlier allows remote authenticated users to execute arbitrary SQL commands via the limitquery_s parameter when the $projectid variable is less than 1, which prevents the $limitquery_s from being set within slides.php. • https://www.exploit-db.com/exploits/1645 http://bash-x.net/undef/adv/craftygallery.html http://bash-x.net/undef/exploits/crappy_syntax.txt http://secunia.com/advisories/19478 http://www.osvdb.org/24386 http://www.securityfocus.com/bid/17379 http://www.vupen.com/english/advisories/2006/1239 https://exchange.xforce.ibmcloud.com/vulnerabilities/25654 •

CVSS: 9.0EPSS: 4%CPEs: 1EXPL: 5

newimage.php in Eric Gerdes Crafty Syntax Image Gallery (CSIG) (aka PHP thumbnail Photo Gallery) 3.1g and earlier allows remote authenticated users to upload and execute arbitrary PHP code via a multipart/form-data POST with a .jpg filename in the fullimage parameter and the ext parameter set to .php. • https://www.exploit-db.com/exploits/1645 http://bash-x.net/undef/adv/craftygallery.html http://bash-x.net/undef/exploits/crappy_syntax.txt http://secunia.com/advisories/19478 http://www.osvdb.org/24387 http://www.securityfocus.com/bid/17379 http://www.vupen.com/english/advisories/2006/1239 https://exchange.xforce.ibmcloud.com/vulnerabilities/25655 •

CVSS: 5.0EPSS: 3%CPEs: 1EXPL: 1

TFT Gallery 0.10 stores sensitive information under the web root with insufficient access control, which allows remote attackers to download the admin password file and obtain password hashes via a direct request to admin/passwd. • https://www.exploit-db.com/exploits/1611 http://secunia.com/advisories/19411 http://www.securityfocus.com/archive/1/453471/100/0/threaded http://www.securityfocus.com/archive/1/453485/100/0/threaded http://www.securityfocus.com/bid/17250 http://www.vupen.com/english/advisories/2006/1115 https://exchange.xforce.ibmcloud.com/vulnerabilities/25465 •

CVSS: 5.0EPSS: 3%CPEs: 14EXPL: 1

Directory traversal vulnerability in Gallery 2.0.3 and earlier, and 2.1 before RC-2a, allows remote attackers to include arbitrary PHP files via ".." (dot dot) sequences in the stepOrder parameter to (1) upgrade/index.php or (2) install/index.php. • https://www.exploit-db.com/exploits/1566 http://gallery.menalto.com/2.0.4_and_2.1_rc_2a_update http://secunia.com/advisories/19175 http://www.securityfocus.com/bid/17051 http://www.vupen.com/english/advisories/2006/0895 https://exchange.xforce.ibmcloud.com/vulnerabilities/25129 •