Page 4 of 17 results (0.001 seconds)

CVSS: 7.5EPSS: 0%CPEs: 1EXPL: 0

The Imagely NextGen Gallery plugin for Wordpress prior to version 2.1.57 does not properly validate user input in the cssfile parameter of a HTTP POST request, which may allow an authenticated user to read arbitrary files from the server, or execute arbitrary code on the server in some circumstances (dependent on server configuration). El plugin Imagely NextGen Gallery para Wordpress en versiones anteriores a la 2.1.57 no valida correctamente las entradas de usuario en el parámetro cssfile de una petición HTTP POST. Esto podría permitir que un usuario autenticado lea archivos arbitrarios del servidor o ejecute código arbitrario en el servidor en algunas circunstancias (depende de la configuración del servidor). • https://www.kb.cert.org/vuls/id/346175 https://www.securityfocus.com/bid/94356 • CWE-20: Improper Input Validation CWE-98: Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') •

CVSS: 5.5EPSS: 0%CPEs: 1EXPL: 2

In the nggallery-manage-gallery page in the Photocrati NextGEN Gallery plugin 2.1.15 for WordPress, XSS is possible for remote authenticated administrators via the images[1][alttext] parameter. En la página nggallery-manage-gallery en el plugin Photocrati NextGEN Gallery 2.1.15 para WordPress, es posible que los administradores remotos autenticados realicen un ataque de Cross-Site Scripting (XSS) mediante el parámetro images[1][alttext]. • https://cybersecurityworks.com/zerodays/cve-2015-9229-nextgen-gallery.html https://github.com/cybersecurityworks/Disclosed/issues/5 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •