Show filters
286 Total Results
Displaying 81-90 of 286
Sort by:
Attacker Value
Unknown
CVE-2022-4157
Disclosure Date: December 26, 2022 (last updated October 08, 2023)
The Contest Gallery WordPress plugin before 19.1.5.1, Contest Gallery Pro WordPress plugin before 19.1.5.1 do not escape the cg_option_id POST parameter before concatenating it to an SQL query in export-votes-all.php. This may allow malicious users with administrator privileges (i.e. on multisite WordPress configurations) to leak sensitive information from the site's database.
0
Attacker Value
Unknown
CVE-2022-4156
Disclosure Date: December 26, 2022 (last updated October 08, 2023)
The Contest Gallery WordPress plugin before 19.1.5.1, Contest Gallery Pro WordPress plugin before 19.1.5.1 do not escape the user_id POST parameter before concatenating it to an SQL query in ajax-functions-backend.php. This may allow malicious users with at least author privilege to leak sensitive information from the site's database.
0
Attacker Value
Unknown
CVE-2022-4155
Disclosure Date: December 26, 2022 (last updated October 08, 2023)
The Contest Gallery WordPress plugin before 19.1.5.1, Contest Gallery Pro WordPress plugin before 19.1.5.1 do not escape the wp_user_id GET parameter before concatenating it to an SQL query in management-show-user.php. This may allow malicious users with administrator privileges (i.e. on multisite WordPress configurations) to leak sensitive information from the site's database.
0
Attacker Value
Unknown
CVE-2022-4154
Disclosure Date: December 26, 2022 (last updated October 08, 2023)
The Contest Gallery Pro WordPress plugin before 19.1.5 does not escape the wp_user_id GET parameter before concatenating it to an SQL query in management-show-user.php. This may allow malicious users with at administrator privileges (i.e. on multisite WordPress configurations) to leak sensitive information from the site's database.
0
Attacker Value
Unknown
CVE-2022-4153
Disclosure Date: December 26, 2022 (last updated October 08, 2023)
The Contest Gallery WordPress plugin before 19.1.5.1, Contest Gallery Pro WordPress plugin before 19.1.5.1 do not escape the upload[] POST parameter before concatenating it to an SQL query in get-data-create-upload-v10.php. This may allow malicious users with at least author privilege to leak sensitive information from the site's database.
0
Attacker Value
Unknown
CVE-2022-4152
Disclosure Date: December 26, 2022 (last updated October 08, 2023)
The Contest Gallery WordPress plugin before 19.1.5, Contest Gallery Pro WordPress plugin before 19.1.5 do not escape the option_id POST parameter before concatenating it to an SQL query in edit-options.php. This may allow malicious users with at least author privilege to leak sensitive information from the site's database.
0
Attacker Value
Unknown
CVE-2022-4151
Disclosure Date: December 26, 2022 (last updated February 24, 2025)
The Contest Gallery WordPress plugin before 19.1.5.1, Contest Gallery Pro WordPress plugin before 19.1.5.1 do not escape the option_id GET parameter before concatenating it to an SQL query in export-images-data.php. This may allow malicious users with at least author privilege to leak sensitive information from the site's database.
0
Attacker Value
Unknown
CVE-2022-4150
Disclosure Date: December 26, 2022 (last updated October 08, 2023)
The Contest Gallery WordPress plugin before 19.1.5.1, Contest Gallery Pro WordPress plugin before 19.1.5.1 do not escape the option_id POST parameter before concatenating it to an SQL query in order-custom-fields-with-and-without-search.php. This may allow malicious users with at least author privilege to leak sensitive information from the site's database.
0
Attacker Value
Unknown
CVE-2022-45848
Disclosure Date: December 06, 2022 (last updated February 24, 2025)
Unauth. Stored Cross-Site Scripting (XSS) vulnerability in Contest Gallery plugin <= 13.1.0.9 on WordPress.
0
Attacker Value
Unknown
CVE-2022-3991
Disclosure Date: November 29, 2022 (last updated February 24, 2025)
The Photospace Gallery plugin for WordPress is vulnerable to Stored Cross-Site Scripting via its settings parameters saved via the update() function in versions up to, and including, 2.3.5 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with subscriber-level permissions and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
0