CVE-2019-14314
- EPSS 32.41%
- Veröffentlicht 27.08.2019 16:15:11
- Zuletzt bearbeitet 21.11.2024 04:26:28
A SQL injection vulnerability exists in the Imagely NextGEN Gallery plugin before 3.2.11 for WordPress. Successful exploitation of this vulnerability would allow a remote attacker to execute arbitrary SQL commands on the affected system via modules/n...
CVE-2016-10889
- EPSS 0.78%
- Veröffentlicht 14.08.2019 15:15:11
- Zuletzt bearbeitet 21.11.2024 02:44:59
The nextgen-gallery plugin before 2.1.57 for WordPress has SQL injection via a gallery name.
CVE-2016-6565
- EPSS 1.52%
- Veröffentlicht 13.07.2018 20:29:01
- Zuletzt bearbeitet 21.11.2024 02:56:22
The Imagely NextGen Gallery plugin for Wordpress prior to version 2.1.57 does not properly validate user input in the cssfile parameter of a HTTP POST request, which may allow an authenticated user to read arbitrary files from the server, or execute ...
CVE-2018-1000172
- EPSS 0.19%
- Veröffentlicht 30.04.2018 22:29:00
- Zuletzt bearbeitet 21.11.2024 03:39:50
Imagely NextGEN Gallery version 2.2.30 and earlier contains a Cross Site Scripting (XSS) vulnerability in Image Alt & Title Text. This attack appears to be exploitable via a victim viewing the image in the administrator page. This vulnerability appea...
CVE-2018-7586
- EPSS 1.57%
- Veröffentlicht 01.03.2018 22:29:00
- Zuletzt bearbeitet 21.11.2024 04:12:25
In the nextgen-gallery plugin before 2.2.50 for WordPress, gallery paths are not secured.
CVE-2015-9229
- EPSS 0.2%
- Veröffentlicht 12.09.2017 22:29:00
- Zuletzt bearbeitet 20.04.2025 01:37:25
In the nggallery-manage-gallery page in the Photocrati NextGEN Gallery plugin 2.1.15 for WordPress, XSS is possible for remote authenticated administrators via the images[1][alttext] parameter.
- EPSS 5.04%
- Veröffentlicht 12.09.2017 08:29:00
- Zuletzt bearbeitet 20.04.2025 01:37:25
In post-new.php in the Photocrati NextGEN Gallery plugin 2.1.10 for WordPress, unrestricted file upload is available via the name parameter, if a file extension is changed from .jpg to .php.