Filtered by vendor Piwigo
Subscribe
Total
99 CVE
CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
---|---|---|---|---|---|
CVE-2016-9751 | 1 Piwigo | 1 Piwigo | 2024-11-21 | 4.3 MEDIUM | 6.1 MEDIUM |
Cross-site scripting (XSS) vulnerability in the search results front end in Piwigo 2.8.3 allows remote attackers to inject arbitrary web script or HTML via the search parameter. | |||||
CVE-2016-3735 | 1 Piwigo | 1 Piwigo | 2024-11-21 | 6.8 MEDIUM | 8.1 HIGH |
Piwigo is image gallery software written in PHP. When a criteria is not met on a host, piwigo defaults to usingmt_rand in order to generate password reset tokens. mt_rand output can be predicted after recovering the seed used to generate it. This low an unauthenticated attacker to take over an account providing they know an administrators email address in order to be able to request password reset. | |||||
CVE-2016-10514 | 1 Piwigo | 1 Piwigo | 2024-11-21 | 4.3 MEDIUM | 6.5 MEDIUM |
url_check_format in include/functions.inc.php in Piwigo before 2.8.3 allows remote attackers to bypass intended access restrictions via a URL that contains a " character, or a URL beginning with a substring other than the http:// or https:// substring. | |||||
CVE-2016-10513 | 1 Piwigo | 1 Piwigo | 2024-11-21 | 4.3 MEDIUM | 6.1 MEDIUM |
Cross Site Scripting (XSS) exists in Piwigo before 2.8.3 via a crafted search expression to include/functions_search.inc.php. | |||||
CVE-2016-10105 | 1 Piwigo | 1 Piwigo | 2024-11-21 | 7.5 HIGH | 9.8 CRITICAL |
admin/plugin.php in Piwigo through 2.8.3 doesn't validate the sections variable while using it to include files. This can cause information disclosure and code execution if it contains a .. sequence. | |||||
CVE-2016-10085 | 1 Piwigo | 1 Piwigo | 2024-11-21 | 6.5 MEDIUM | 7.2 HIGH |
admin/languages.php in Piwigo through 2.8.3 allows remote authenticated administrators to conduct File Inclusion attacks via the tab parameter. | |||||
CVE-2016-10084 | 1 Piwigo | 1 Piwigo | 2024-11-21 | 6.5 MEDIUM | 7.2 HIGH |
admin/batch_manager.php in Piwigo through 2.8.3 allows remote authenticated administrators to conduct File Inclusion attacks via the $page['tab'] variable (aka the mode parameter). | |||||
CVE-2016-10083 | 1 Piwigo | 1 Piwigo | 2024-11-21 | 4.3 MEDIUM | 6.1 MEDIUM |
Cross-site scripting (XSS) vulnerability in admin/plugin.php in Piwigo through 2.8.3 allows remote attackers to inject arbitrary web script or HTML via a crafted filename that is mishandled in a certain error case. | |||||
CVE-2015-2035 | 1 Piwigo | 1 Piwigo | 2024-11-21 | 6.5 MEDIUM | N/A |
SQL injection vulnerability in the administrative backend in Piwigo before 2.7.4 allows remote administrators to execute arbitrary SQL commands via the user parameter in the history page to admin.php. | |||||
CVE-2015-2034 | 1 Piwigo | 1 Piwigo | 2024-11-21 | 4.3 MEDIUM | N/A |
Cross-site scripting (XSS) vulnerability in the administrative backend in Piwigo before 2.7.4 allows remote attackers to inject arbitrary web script or HTML via the page parameter to admin.php. | |||||
CVE-2015-1517 | 1 Piwigo | 1 Piwigo | 2024-11-21 | 6.0 MEDIUM | N/A |
SQL injection vulnerability in Piwigo before 2.7.4, when all filters are activated, allows remote authenticated users to execute arbitrary SQL commands via the filter_level parameter in a "Refresh photo set" action in the batch_manager page to admin.php. | |||||
CVE-2015-1441 | 1 Piwigo | 1 Piwigo | 2024-11-21 | 7.5 HIGH | N/A |
SQL injection vulnerability in Piwigo before 2.5.6, 2.6.x before 2.6.5, and 2.7.x before 2.7.3 allows remote attackers to execute arbitrary SQL commands via unspecified vectors. | |||||
CVE-2014-9115 | 1 Piwigo | 1 Piwigo | 2024-11-21 | 7.5 HIGH | N/A |
SQL injection vulnerability in the rate_picture function in include/functions_rate.inc.php in Piwigo before 2.5.5, 2.6.x before 2.6.4, and 2.7.x before 2.7.2 allows remote attackers to execute arbitrary SQL commands via the rate parameter to picture.php, related to an improper data type in a comparison of a non-numeric value that begins with a digit. | |||||
CVE-2014-8945 | 1 Piwigo | 1 Lexiglot | 2024-11-21 | 7.5 HIGH | 9.8 CRITICAL |
admin.php?page=projects in Lexiglot through 2014-11-20 allows command injection via username and password fields. | |||||
CVE-2014-8944 | 1 Piwigo | 1 Lexiglot | 2024-11-21 | 3.5 LOW | 5.4 MEDIUM |
Lexiglot through 2014-11-20 allows XSS (Reflected) via the username, or XSS (Stored) via the admin.php?page=config install_name, intro_message, or new_file_content parameter. | |||||
CVE-2014-8943 | 1 Piwigo | 1 Lexiglot | 2024-11-21 | 6.5 MEDIUM | 8.8 HIGH |
Lexiglot through 2014-11-20 allows SSRF via the admin.php?page=projects svn_url parameter. | |||||
CVE-2014-8942 | 1 Piwigo | 1 Lexiglot | 2024-11-21 | 6.8 MEDIUM | 8.8 HIGH |
Lexiglot through 2014-11-20 allows CSRF. | |||||
CVE-2014-8941 | 1 Piwigo | 1 Lexiglot | 2024-11-21 | 7.5 HIGH | 9.8 CRITICAL |
Lexiglot through 2014-11-20 allows SQL injection via an admin.php?page=users&from_id= or admin.php?page=history&limit= URI. | |||||
CVE-2014-8940 | 1 Piwigo | 1 Lexiglot | 2024-11-21 | 5.0 MEDIUM | 5.3 MEDIUM |
Lexiglot through 2014-11-20 allows remote attackers to obtain sensitive information (names and details of projects) by visiting the /update.log URI. | |||||
CVE-2014-8939 | 1 Piwigo | 1 Lexiglot | 2024-11-21 | 4.3 MEDIUM | 5.3 MEDIUM |
Lexiglot through 2014-11-20 allows remote attackers to obtain sensitive information (full path) via an include/smarty/plugins/modifier.date_format.php request if PHP has a non-recommended configuration that produces warning messages. |