Page 9 of 49 results (0.006 seconds)

CVSS: 7.5EPSS: 0%CPEs: 1EXPL: 0

SQL injection vulnerability in Coppermine Photo Gallery 1.3.2 allows remote attackers to execute arbitrary SQL commands via the favs parameter to (1) init.inc.php or (2) zipdownload.php. • http://marc.info/?l=bugtraq&m=111402186304179&w=2 http://secunia.com/advisories/15004 http://www.waraxe.us/advisory-42.html https://exchange.xforce.ibmcloud.com/vulnerabilities/20205 •

CVSS: 7.5EPSS: 0%CPEs: 1EXPL: 1

Coppermine Photo Gallery 1.3.2 stores passwords in plaintext, which allows remote attackers to obtain sensitive information. • http://marc.info/?l=bugtraq&m=111402186304179&w=2 http://www.waraxe.us/advisory-42.html https://exchange.xforce.ibmcloud.com/vulnerabilities/20206 •

CVSS: 4.3EPSS: 0%CPEs: 7EXPL: 0

Cross-site scripting (XSS) vulnerability in init.inc.php in Coppermine Photo Gallery 1.3.x allows remote attackers to inject arbitrary web script or HTML via the X-Forwarded-For parameter. • http://coppermine.sourceforge.net/board/index.php?topic=17134 http://marc.info/?l=bugtraq&m=111383800707880&w=2 http://secunia.com/advisories/15004 http://www.securityfocus.com/bid/13218 •

CVSS: 5.0EPSS: 1%CPEs: 11EXPL: 2

Coppermine Photo Gallery 1.2.2b and 1.2.0 RC4 allows remote attackers to obtain sensitive information via a direct HTTP request to (1) phpinfo.php, (2) addpic.php, (3) config.php, (4) db_input.php, (5) displayecard.php, (6) ecard.php, (7) crop.inc.php, which reveal the full path in a PHP error message. • http://marc.info/?l=bugtraq&m=108360247732014&w=2 http://secunia.com/advisories/11524 http://securitytracker.com/id?1010001 http://www.osvdb.org/5756 http://www.osvdb.org/6495 http://www.osvdb.org/6496 http://www.osvdb.org/6497 http://www.osvdb.org/6498 http://www.osvdb.org/6499 http://www.osvdb.org/6500 http://www.waraxe.us/index.php?modname=sa&id=26 https://exchange.xforce.ibmcloud.com/vulnerabilities/16039 •

CVSS: 7.5EPSS: 8%CPEs: 11EXPL: 4

PHP remote file inclusion vulnerability in theme.php in Coppermine Photo Gallery 1.2.2b allows remote attackers to execute arbitrary PHP code by modifying the THEME_DIR parameter to reference a URL on a remote web server that contains user_list_info_box.inc. • https://www.exploit-db.com/exploits/24075 http://marc.info/?l=bugtraq&m=108360247732014&w=2 http://secunia.com/advisories/11524 http://securitytracker.com/id?1010001 http://www.osvdb.org/5912 http://www.securityfocus.com/bid/10253 http://www.waraxe.us/index.php?modname=sa&id=26 https://exchange.xforce.ibmcloud.com/vulnerabilities/16041 •