Page 9 of 54 results (0.003 seconds)

CVSS: 5.0EPSS: 1%CPEs: 1EXPL: 2

Directory traversal vulnerability in index.php in Coppermine 1.4.4 allows remote attackers to read arbitrary files via a .//./ (modified dot dot slash) in the file parameter, which causes a regular expression to collapse the sequences into standard "../" sequences. • https://www.exploit-db.com/exploits/27669 http://myimei.com/security/2006-04-14/copperminephotogallery144-plugininclusionsystemindexphp-remotefileinclusion-attack.html http://secunia.com/advisories/19665 http://www.securityfocus.com/archive/1/431062 http://www.securityfocus.com/archive/1/431118/30/0/threaded http://www.securityfocus.com/bid/17570 http://www.vupen.com/english/advisories/2006/1392 https://exchange.xforce.ibmcloud.com/vulnerabilities/25866 •

CVSS: 5.0EPSS: 1%CPEs: 1EXPL: 2

Absolute path traversal vulnerability in docs/showdocs.php in Coppermine Photo Gallery 1.4.3 and earlier allows remote attackers to include arbitrary files via the f parameter, and possibly remote files using UNC share pathnames. • http://coppermine-gallery.net/forum/index.php?topic=28062.0 http://retrogod.altervista.org/cpg_143_adv.html http://secunia.com/advisories/18941 http://securitytracker.com/id?1015646 http://www.securityfocus.com/archive/1/425387 http://www.securityfocus.com/bid/16718 http://www.vupen.com/english/advisories/2006/0669 https://exchange.xforce.ibmcloud.com/vulnerabilities/24816 •

CVSS: 5.0EPSS: 0%CPEs: 1EXPL: 3

Directory traversal vulnerability in init.inc.php in Coppermine Photo Gallery 1.4.3 and earlier allows remote attackers to include arbitrary files via a .. (dot dot) sequence and trailing NULL (%00) byte in the lang parameter. • http://coppermine-gallery.net/forum/index.php?topic=28062.0 http://retrogod.altervista.org/cpg_143_adv.html http://retrogod.altervista.org/cpg_143_incl_xpl.html http://secunia.com/advisories/18941 http://securitytracker.com/id?1015646 http://www.securityfocus.com/archive/1/425387 http://www.securityfocus.com/bid/16718 http://www.vupen.com/english/advisories/2006/0669 https://exchange.xforce.ibmcloud.com/vulnerabilities/24814 •

CVSS: 5.0EPSS: 0%CPEs: 2EXPL: 0

relocate_server.php in Coppermine Photo Gallery (CPG) 1.4.2 and 1.4 beta is not removed after installation and does not use authentication, which allows remote attackers to obtain sensitive information, such as database configuration, via a direct request. relocate_server.php en Coppermine Photo Gallery (CPG) 1.4.2 y 1.4 beta no se elimina después de la instalación y no usa autenticación, lo que permite a atacantes remotos obtener información sensible, como la configuración de la base de datos, a través de una petición directa. • http://coppermine-gallery.net/forum/index.php?topic=24217.0 http://secunia.com/advisories/17855 http://www.vupen.com/english/advisories/2005/2698 • CWE-287: Improper Authentication •

CVSS: 4.3EPSS: 0%CPEs: 9EXPL: 0

Cross-site scripting (XSS) vulnerability in displayimage.php in Coppermine Photo Gallery before 1.3.4 allows remote attackers to inject arbitrary web script or HTML via EXIF data. • http://coppermine-gallery.net/forum/index.php?topic=20933.0 http://secunia.com/advisories/16499 http://securitytracker.com/id?1014799 http://www.securityfocus.com/bid/14625 •