RSS   Vulnerabilities for 'Photo gallery'   RSS

2019-09-08
 
CVE-2019-16119

CWE-89
 

 
SQL injection in the photo-gallery (10Web Photo Gallery) plugin before 1.5.35 for WordPress exists via the admin/controllers/Albumsgalleries.php album_id parameter.

 
 
CVE-2019-16118

CWE-79
 

 
Cross site scripting (XSS) in the photo-gallery (10Web Photo Gallery) plugin before 1.5.35 for WordPress exists via admin/controllers/Options.php.

 
 
CVE-2019-16117

CWE-79
 

 
Cross site scripting (XSS) in the photo-gallery (10Web Photo Gallery) plugin before 1.5.35 for WordPress exists via admin/models/Galleries.php.

 
2019-08-30
 
CVE-2015-9380

CWE-352
 

 
The photo-gallery plugin before 1.2.42 for WordPress has CSRF.

 
2019-08-09
 
CVE-2019-14798

CWE-22
 

 
The 10Web Photo Gallery plugin before 1.5.25 for WordPress has Authenticated Local File Inclusion via directory traversal in the wp-admin/admin-ajax.php?action=shortcode_bwg tagtext parameter.

 
 
CVE-2019-14797

CWE-79
 

 
The 10Web Photo Gallery plugin before 1.5.23 for WordPress has authenticated stored XSS.

 
2019-07-30
 
CVE-2019-14313

CWE-89
 

 
A SQL injection vulnerability exists in the 10Web Photo Gallery plugin before 1.5.31 for WordPress. Successful exploitation of this vulnerability would allow a remote attacker to execute arbitrary SQL commands on the affected system via filemanager/model.php.

 
2018-02-19
 
CVE-2015-2324

CWE-79
 

 
Cross-site scripting (XSS) vulnerability in the filemanager in the Photo Gallery plugin before 1.2.13 for WordPress allows remote authenticated users with edit permission to inject arbitrary web script or HTML via unspecified vectors.

 
2017-08-28
 
CVE-2014-9312

CWE-434
 

 
Unrestricted File Upload vulnerability in Photo Gallery 1.2.5.

 
2017-08-20
 
CVE-2017-12977

CWE-89
 

 
The Web-Dorado "Photo Gallery by WD - Responsive Photo Gallery" plugin before 1.3.51 for WordPress has a SQL injection vulnerability related to bwg_edit_tag() in photo-gallery.php and edit_tag() in admin/controllers/BWGControllerTags_bwg.php. It is exploitable by administrators via the tag_id parameter.

 


Copyright 2019, cxsecurity.com

 

Back to Top