Show filters
78 Total Results
Displaying 21-30 of 78
Sort by:
Attacker Value
Unknown

CVE-2022-4783

Disclosure Date: February 13, 2023 (last updated October 08, 2023)
The Youtube Channel Gallery WordPress plugin through 2.4 does not validate and escape some of its shortcode attributes before outputting them back in a page/post where the shortcode is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks
Attacker Value
Unknown

CVE-2022-4651

Disclosure Date: January 30, 2023 (last updated October 08, 2023)
The Justified Gallery WordPress plugin before 1.7.1 does not validate and escape one of its shortcode attributes, which could allow users with a role as low as contributor to perform Stored Cross-Site Scripting attack.
Attacker Value
Unknown

CVE-2018-25067

Disclosure Date: January 06, 2023 (last updated October 20, 2023)
A vulnerability, which was classified as critical, was found in JoomGallery up to 3.3.3. This affects an unknown part of the file administrator/components/com_joomgallery/views/config/tmpl/default.php of the component Image Sort Handler. The manipulation leads to sql injection. Upgrading to version 3.3.4 is able to address this issue. The identifier of the patch is dc414ee954e849082260f8613e15a1c1e1d354a1. It is recommended to upgrade the affected component. The identifier VDB-217569 was assigned to this vulnerability.
Attacker Value
Unknown

CVE-2022-4142

Disclosure Date: January 02, 2023 (last updated October 08, 2023)
The WordPress Filter Gallery Plugin WordPress plugin before 0.1.6 does not properly escape the filters passed in the ufg_gallery_filters ajax action before outputting them on the page, allowing a high privileged user such as an administrator to inject HTML or javascript to the plugin settings page, even when the unfiltered_html capability is disabled.
Attacker Value
Unknown

CVE-2022-3991

Disclosure Date: November 29, 2022 (last updated October 08, 2023)
The Photospace Gallery plugin for WordPress is vulnerable to Stored Cross-Site Scripting via its settings parameters saved via the update() function in versions up to, and including, 2.3.5 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with subscriber-level permissions and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
Attacker Value
Unknown

CVE-2021-38819

Disclosure Date: November 17, 2022 (last updated December 22, 2024)
A SQL injection vulnerability exits on the Simple Image Gallery System 1.0 application through "id" parameter on the album page.
Attacker Value
Unknown

CVE-2022-38135

Disclosure Date: September 12, 2022 (last updated November 29, 2024)
Broken Access Control vulnerability in Dean Oakley's Photospace Gallery plugin <= 2.3.5 at WordPress allows users with subscriber or higher role to change plugin settings.
Attacker Value
Unknown

CVE-2022-0826

Disclosure Date: May 09, 2022 (last updated October 07, 2023)
The WP Video Gallery WordPress plugin through 1.7.1 does not sanitise and escape a parameter before using it in a SQL statement via an AJAX action, leading to an SQL Injection exploitable by unauthenticated users
Attacker Value
Unknown

CVE-2021-38753

Disclosure Date: August 16, 2021 (last updated February 23, 2025)
An unrestricted file upload on Simple Image Gallery Web App can be exploited to upload a web shell and executed to gain unauthorized access to the server hosting the web app.
Attacker Value
Unknown

CVE-2021-24349

Disclosure Date: June 14, 2021 (last updated February 22, 2025)
This Gallery from files WordPress plugin through 1.6.0 gives the functionality of uploading images to the server. But filenames are not properly sanitized before being output in an error message when they have an invalid extension, leading to a reflected Cross-Site Scripting issue. Due to the lack of CSRF check, the attack could also be performed via such vector.