Gallery Plugin1.4 for WordPress has a Remote File Include Vulnerability
Source: Flexera Software LLC
Max CVSS
9.8
EPSS Score
0.30%
Published
2020-01-22
Updated
2020-01-24
Unspecified vulnerability in the stats module in Gallery 1.5.1-RC2 and earlier allows remote attackers to obtain sensitive information via unspecified attack vectors, related to "two file exposure bugs."
Source: MITRE
Max CVSS
5.0
EPSS Score
0.91%
Published
2006-08-16
Updated
2011-03-08
Cross-site scripting (XSS) vulnerability in Gallery before 1.5.3 allows remote attackers to inject arbitrary web script or HTML via unknown attack vectors.
Source: MITRE
Max CVSS
4.3
EPSS Score
0.41%
Published
2006-04-11
Updated
2017-07-20
Directory traversal vulnerability in Gallery 2.0.3 and earlier, and 2.1 before RC-2a, allows remote attackers to include arbitrary PHP files via ".." (dot dot) sequences in the stepOrder parameter to (1) upgrade/index.php or (2) install/index.php.
Source: MITRE
Max CVSS
5.0
EPSS Score
3.66%
Published
2006-03-14
Updated
2017-10-19
Directory traversal vulnerability in the session handling class (GallerySession.class) in Gallery 2 up to 2.0.2 allows remote attackers to access and delete files by specifying the session in a cookie, which is used in constructing file paths before the session value is sanitized.
Source: MITRE
Max CVSS
6.4
EPSS Score
0.84%
Published
2006-03-09
Updated
2017-07-20
Cross-site scripting (XSS) vulnerability in Gallery 2 up to 2.0.2 allows remote attackers to inject arbitrary web script or HTML via the X-Forwarded-For (X_FORWARDED_FOR) HTTP header, which is not properly handled when adding a comment to an album.
Source: MITRE
Max CVSS
4.3
EPSS Score
0.49%
Published
2006-03-09
Updated
2017-07-20
Gallery 2 up to 2.0.2 allows remote attackers to spoof their IP address via a modified X-Forwarded-For (X_FORWARDED_FOR) HTTP header, which is checked by Gallery before other more reliable sources of IP address information, such as REMOTE_ADDR.
Source: MITRE
Max CVSS
6.4
EPSS Score
1.36%
Published
2006-03-09
Updated
2017-07-20
Unspecified vulnerability in util.php in Gallery before 1.5.2-pl2 allows remote authenticated users with trick an owner into modifying stored album data and possibly executing arbitrary code via unspecified vectors involving a crafted link to a crafted file.
Source: MITRE
Max CVSS
6.5
EPSS Score
0.68%
Published
2006-02-08
Updated
2017-07-20
Cross-site scripting (XSS) vulnerability in Gallery before 1.5.2 allows remote attackers to inject arbitrary web script or HTML via unknown attack vectors, possibly involving the user name (fullname).
Source: MITRE
Max CVSS
4.3
EPSS Score
0.81%
Published
2006-01-21
Updated
2017-07-20
Unspecified vulnerability in the zipcart module in Gallery 2.0 before 2.0.2 allows remote attackers to read arbitrary files via unknown vectors.
Source: MITRE
Max CVSS
5.0
EPSS Score
0.65%
Published
2005-12-05
Updated
2018-10-19
The installer for Gallery 2.0 before 2.0.2 stores the install log under the web document root with insufficient access control, which allows remote attackers to obtain sensitive information.
Source: MITRE
Max CVSS
5.0
EPSS Score
0.63%
Published
2005-12-05
Updated
2018-10-19
Directory traversal vulnerability in the gallery script in Gallery 2.0 (G2) allows remote attackers to read or include arbitrary files via ".." sequences in the g2_itemId parameter.
Source: MITRE
Max CVSS
6.4
EPSS Score
1.40%
Published
2005-10-17
Updated
2008-09-05
Cross-site scripting (XSS) vulnerability in Gallery 1.5.1-RC2 and earlier allows remote attackers to inject arbitrary web script or HTML via EXIF data, such as the Camera Model Tag.
Source: MITRE
Max CVSS
4.3
EPSS Score
0.49%
Published
2005-08-30
Updated
2017-07-11
User.php in Gallery, as used in Postnuke, allows users with any Admin privileges to gain access to all galleries.
Source: MITRE
Max CVSS
4.6
EPSS Score
0.07%
Published
2005-08-17
Updated
2008-09-05
main.php in Gallery 2.0 Alpha allows remote attackers to gain sensitive information by changing the value of g2_subView parameter, which reveals the path in an error message.
Source: MITRE
Max CVSS
5.0
EPSS Score
0.77%
Published
2005-05-02
Updated
2017-07-11
Cross-site scripting (XSS) vulnerability in login.php in Gallery 2.0 Alpha allows remote attackers to inject arbitrary web script or HTML via the g2_form[subject] field.
Source: MITRE
Max CVSS
4.3
EPSS Score
0.92%
Published
2005-01-17
Updated
2017-07-11
Cross-site scripting vulnerability in login.php in Gallery 1.4.4-pl2 allows remote attackers to inject arbitrary web script or HTML via the username field.
Source: MITRE
Max CVSS
5.0
EPSS Score
1.68%
Published
2005-05-02
Updated
2017-07-11
Multiple cross-site scripting (XSS) vulnerabilities in Gallery 1.3.4-pl1 allow remote attackers to inject arbitrary web script or HTML via (1) the index field in add_comment.php, (2) set_albumName, (3) slide_index, (4) slide_full, (5) slide_loop, (6) slide_pause, (7) slide_dir fields in slideshow_low.php, or (8) username field in search.php.
Source: MITRE
Max CVSS
4.3
EPSS Score
0.41%
Published
2005-05-02
Updated
2017-07-11
The register_globals simulation capability in Gallery 1.3.1 through 1.4.1 allows remote attackers to modify the HTTP_POST_VARS variable and conduct a PHP remote file inclusion attack via the GALLERY_BASEDIR parameter, a different vulnerability than CVE-2002-1412.
Source: MITRE
Max CVSS
5.0
EPSS Score
7.26%
Published
2004-12-31
Updated
2017-07-11
The set_time_limit function in Gallery before 1.4.4_p2 deletes non-image files in a temporary directory every 30 seconds after they have been uploaded using save_photos.php, which allows remote attackers to upload and execute execute arbitrary scripts before they are deleted, if the temporary directory is under the web root.
Source: MITRE
Max CVSS
7.5
EPSS Score
10.04%
Published
2004-12-31
Updated
2017-07-11
Cross-site scripting (XSS) vulnerability in Gallery 1.4.4-pl3 and earlier allows remote attackers to execute arbitrary web script or HTML via "specially formed URLs," possibly via the include parameter in index.php.
Source: MITRE
Max CVSS
6.8
EPSS Score
4.88%
Published
2005-01-10
Updated
2017-07-11
Gallery 1.4.3 and earlier allows remote attackers to bypass authentication and obtain Gallery administrator privileges.
Source: MITRE
Max CVSS
10.0
EPSS Score
0.37%
Published
2004-08-06
Updated
2017-07-11
PHP remote file include vulnerability in index.php for Gallery 1.4 and 1.4-pl1, when running on Windows or in Configuration mode on Unix, allows remote attackers to inject arbitrary PHP code via a URL in the GALLERY_BASEDIR parameter, a different vulnerability than CVE-2002-1412. NOTE: this issue might be exploitable only during installation, or if the administrator has not run a security script after installation.
Source: MITRE
Max CVSS
7.5
EPSS Score
2.16%
Published
2003-12-31
Updated
2017-07-11
Cross-site scripting (XSS) vulnerability in search.php of Gallery 1.1 through 1.3.4 allows remote attackers to insert arbitrary web script via the searchstring parameter.
Source: MITRE
Max CVSS
4.3
EPSS Score
0.45%
Published
2003-08-27
Updated
2018-10-19
publish_xp_docs.php in Gallery 1.3.2 allows remote attackers to execute arbitrary PHP code by modifying the GALLERY_BASEDIR parameter to reference a URL on a remote web server that contains the code.
Source: MITRE
Max CVSS
7.5
EPSS Score
0.44%
Published
2002-12-31
Updated
2008-09-05
28 vulnerabilities found
1 2
This web site uses cookies for managing your session, storing preferences, website analytics and additional purposes described in our privacy policy.
By using this web site you are agreeing to CVEdetails.com terms of use!