Page 4 of 25 results (0.017 seconds)

CVSS: 6.8EPSS: 96%CPEs: 1EXPL: 3

include/imageObjectIM.class.php in Coppermine Photo Gallery (CPG) before 1.4.15, when the ImageMagick picture processing method is configured, allows remote attackers to execute arbitrary commands via shell metacharacters in the (1) quality, (2) angle, or (3) clipval parameter to picEditor.php. El archivo include/imageObjectIM.class.php en Coppermine Photo Gallery (CPG) versiones anteriores a 1.4.15, cuando el método de procesamiento de imágenes de ImageMagick es configurado, permite a los atacantes remotos ejecutar comandos arbitrarios por medio de metacaracteres de shell en el parámetro (1) quality, (2) angle o (3) clipval en el archivo picEditor.php. • https://www.exploit-db.com/exploits/16909 http://coppermine-gallery.net/forum/index.php?topic=50103.0 http://secunia.com/advisories/28682 http://www.securityfocus.com/archive/1/487310/100/200/threaded http://www.securityfocus.com/bid/27512 http://www.securitytracker.com/id?1019286 http://www.vupen.com/english/advisories/2008/0367 http://www.waraxe.us/advisory-65.html https://www.exploit-db.com/exploits/5019 • CWE-20: Improper Input Validation •

CVSS: 4.3EPSS: 0%CPEs: 1EXPL: 0

Cross-site scripting (XSS) vulnerability in displayecard.php in Coppermine Photo Gallery (CPG) before 1.4.14 allows remote attackers to inject arbitrary web script or HTML via the data parameter. Vulnerabilidad de secuencias de comandos en sitios cruzados (XSS) en displayecard.php de Coppermine Photo Gallery (CPG) anterior a 1.4.14 permite a atacantes remotos inyectar secuencias de comandos web o HTML de su elección mediante el parámetro data. • http://coppermine-gallery.net/forum/index.php?topic=48106.0 http://osvdb.org/38420 http://secunia.com/advisories/27534 http://www.securityfocus.com/bid/26357 https://exchange.xforce.ibmcloud.com/vulnerabilities/38290 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 7.5EPSS: 0%CPEs: 1EXPL: 1

SQL injection vulnerability in Coppermine Photo Gallery (CPG) before 1.4.11 allows remote attackers to execute arbitrary SQL commands via an album password cookie to an unspecified component. Vulnerabilidad de inyección SQL en Coppermine Photo Gallery (CPG) anterior a 1.4.11 permite a atacantes remotos ejecutar comandos SQL de su elección mediante una cookie de contraseña de álbum para un componente no especificado. • https://www.exploit-db.com/exploits/3085 http://coppermine-gallery.net/forum/index.php?topic=44845.0 http://secunia.com/advisories/25846 http://www.securityfocus.com/bid/24710 •

CVSS: 7.5EPSS: 85%CPEs: 4EXPL: 3

SQL injection vulnerability in thumbnails.php in Coppermine Photo Gallery (CPG) 1.3.x allows remote authenticated users to execute arbitrary SQL commands via a cpg131_fav cookie. NOTE: it was later reported that 1.4.10, 1.4.14, and other 1.4.x versions are also affected using similar cookies. Vulnerabilidad de inyección SQL en thumbnails.php en Coppermine Photo Gallery (CPG) 1.3.x permite a usuarios autenticados remotos ejecutar comandos SQL de su elección mediante una cookie cpg131_fav. • https://www.exploit-db.com/exploits/3371 http://osvdb.org/33133 http://securityreason.com/securityalert/2297 http://www.securityfocus.com/archive/1/461158/100/0/threaded http://www.securityfocus.com/bid/22709 http://www.securityfocus.com/bid/27372 https://exchange.xforce.ibmcloud.com/vulnerabilities/32688 https://exchange.xforce.ibmcloud.com/vulnerabilities/39806 https://www.exploit-db.com/exploits/4950 https://www.exploit-db.com/exploits/4961 •

CVSS: 6.5EPSS: 1%CPEs: 1EXPL: 0

admin.php in Coppermine Photo Gallery 1.4.10, and possibly earlier, allows remote authenticated users to execute arbitrary shell commands via shell metacharacters (";" semicolon) in the "Command line options for ImageMagick" form field, when used as an option to ImageMagick's convert command. NOTE: The provenance of this information is unknown; the details are obtained solely from third party information. admin.php en Coppermine Photo Gallery 1.4.10 y, posiblemente en versiones anteriores, permite a usuarios remotos autenticados ejecutar comandos del intérprete de comandos (shell) de su elección mediante metacaracteres del shell (";" punto y coma) en las "Opciones de la línea de comandos para el ImageMagick" para el campo de formulario, cuando es usado como una opción del comando de conversión del ImageMagick. NOTA: la procedencia de esta información es desconocida; los detalles se obtienen a partir de la información de terceros. • http://osvdb.org/33093 http://secunia.com/advisories/24019 http://www.securityfocus.com/bid/22406 https://exchange.xforce.ibmcloud.com/vulnerabilities/32236 •