CVE-2007-6689
https://notcve.org/view.php?id=CVE-2007-6689
Menalto Gallery before 2.2.4 does not properly check for malicious file extensions during file uploads, which allows attackers to execute arbitrary code via the (1) Core application or (2) MIME module. Menalto Gallery anterior a 2.2.4 no comprueba extensiones de fichero maliciosas durante la subida de ficheros, lo cual permite a atacantes remotos ejecutar código de su elección mediante los módulos (1) Core o (2) MIME. • http://bugs.gentoo.org/show_bug.cgi?id=203217 http://gallery.menalto.com/gallery_2.2.4_released http://osvdb.org/41669 http://secunia.com/advisories/28898 http://security.gentoo.org/glsa/glsa-200802-04.xml • CWE-20: Improper Input Validation •
CVE-2007-6690
https://notcve.org/view.php?id=CVE-2007-6690
The Gallery Remote module in Menalto Gallery before 2.2.4 does not check permissions for unspecified GR commands, which has unknown impact and attack vectors. El módulo Gallery Remote para Menalto Gallery anterior a 2.2.4 no comprueba los permisos para comandos GR no especificados, lo cual tiene impacto y vectores de ataque desconocidos. • http://bugs.gentoo.org/show_bug.cgi?id=203217 http://gallery.menalto.com/gallery_2.2.4_released http://osvdb.org/41668 http://secunia.com/advisories/28898 http://security.gentoo.org/glsa/glsa-200802-04.xml • CWE-264: Permissions, Privileges, and Access Controls •
CVE-2007-6691
https://notcve.org/view.php?id=CVE-2007-6691
Multiple unspecified vulnerabilities in Menalto Gallery before 2.2.4 have unknown impact, related to (1) "hotlink protection" in the URL rewrite module, (2) a WebDAV view in the WebDAV module, (3) a comment view in the Comment module, (4) unspecified "item information disclosure attacks" in the Core module Gallery application, (5) the slideshow in the Slideshow module, and (6) multiple Print modules. Múltiples vulnerabilidades no especificadas en Menalto Gallery anterior a 2.2.4 tiene impacto desconocido, relacionado con (1) "hotlink protection" en el módulo URL rewrite, (2) una vista WebDAV en el módulo WebDAV, (3) una vista de comentario en el módulo Comment, (4) "ataques de revelación de información de ítem" no especificados en el módulo Core de la aplicación Gallery, (5) la exposición de diapositivas en el módulo Slideshow, y (6) múltiples módulos de impresión. • http://bugs.gentoo.org/show_bug.cgi?id=203217 http://gallery.menalto.com/gallery_2.2.4_released http://osvdb.org/41662 http://osvdb.org/41663 http://osvdb.org/41664 http://osvdb.org/41665 http://osvdb.org/41666 http://osvdb.org/41667 http://secunia.com/advisories/28898 http://security.gentoo.org/glsa/glsa-200802-04.xml •
CVE-2007-4650
https://notcve.org/view.php?id=CVE-2007-4650
Multiple unspecified vulnerabilities in Gallery before 2.2.3 allow attackers to (1) rename items, (2) read and modify item properties, or (3) lock and replace items via unknown vectors in (a) the WebDAV module; and (4) edit unspecified data files using "linked items" in WebDAV and (b) Reupload modules. Múltiples vulnerabilidades no especificadas en Gallery anterior a 2.2.3 permite a atacantes (1) renombrar artículos, (2) leer y modificar propiedades de artículos, o (3) ver y reemplazar artículos mediante vectores no especificados en (a) el módulo WebDAV; y (4) editar información de ficheros no especificados utilizando "artículos enlazados" en WebDAV y (b) módulos Reupload. • http://bugs.gentoo.org/show_bug.cgi?id=191587 http://gallery.menalto.com/gallery_2.2.3_released http://osvdb.org/41657 http://osvdb.org/41658 http://secunia.com/advisories/26716 http://secunia.com/advisories/26719 http://secunia.com/advisories/27502 http://secunia.com/advisories/27594 http://security.gentoo.org/glsa/glsa-200711-03.xml http://www.debian.org/security/2007/dsa-1404 http://www.securityfocus.com/bid/25580 http://www.vupen.com/english/advisories • CWE-264: Permissions, Privileges, and Access Controls •
CVE-2006-1219 – Gallery 2.0.3 - 'stepOrder[]' Remote Command Execution
https://notcve.org/view.php?id=CVE-2006-1219
Directory traversal vulnerability in Gallery 2.0.3 and earlier, and 2.1 before RC-2a, allows remote attackers to include arbitrary PHP files via ".." (dot dot) sequences in the stepOrder parameter to (1) upgrade/index.php or (2) install/index.php. • https://www.exploit-db.com/exploits/1566 http://gallery.menalto.com/2.0.4_and_2.1_rc_2a_update http://secunia.com/advisories/19175 http://www.securityfocus.com/bid/17051 http://www.vupen.com/english/advisories/2006/0895 https://exchange.xforce.ibmcloud.com/vulnerabilities/25129 •