Total
88 CVE
CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
---|---|---|---|---|---|
CVE-2018-6883 | 1 Piwigo | 1 Piwigo | 2023-12-10 | 4.0 MEDIUM | 4.9 MEDIUM |
Piwigo before 2.9.3 has SQL injection in admin/tags.php in the administration panel, via the tags array parameter in an admin.php?page=tags request. The attacker must be an administrator. | |||||
CVE-2018-7724 | 1 Piwigo | 1 Piwigo | 2023-12-10 | 3.5 LOW | 5.4 MEDIUM |
The management panel in Piwigo 2.9.3 has stored XSS via the name parameter in a /admin.php?page=photo-${photo_number} request. CSRF exploitation, related to CVE-2017-10681, may be possible. | |||||
CVE-2018-7723 | 1 Piwigo | 1 Piwigo | 2023-12-10 | 3.5 LOW | 5.4 MEDIUM |
The management panel in Piwigo 2.9.3 has stored XSS via the virtual_name parameter in a /admin.php?page=cat_list request, a different issue than CVE-2017-9836. CSRF exploitation, related to CVE-2017-10681, may be possible. | |||||
CVE-2014-4613 | 1 Piwigo | 1 Piwigo | 2023-12-10 | 4.3 MEDIUM | 6.5 MEDIUM |
Cross-site request forgery (CSRF) vulnerability in the administration panel in Piwigo before 2.6.2 allows remote attackers to hijack the authentication of administrators for requests that add users via a pwg.users.add action in a request to ws.php. | |||||
CVE-2017-17775 | 1 Piwigo | 1 Piwigo | 2023-12-10 | 4.3 MEDIUM | 6.1 MEDIUM |
Piwigo 2.9.2 has XSS via the name parameter in an admin.php?page=album-3-properties request. | |||||
CVE-2017-17822 | 1 Piwigo | 1 Piwigo | 2023-12-10 | 4.0 MEDIUM | 4.9 MEDIUM |
The List Users API of Piwigo 2.9.2 is vulnerable to SQL Injection via the /admin/user_list_backend.php sSortDir_0 parameter. An attacker can exploit this to gain access to the data in a connected MySQL database. | |||||
CVE-2017-10679 | 1 Piwigo | 1 Piwigo | 2023-12-10 | 5.0 MEDIUM | 7.5 HIGH |
Piwigo through 2.9.1 allows remote attackers to obtain sensitive information about the descriptive name of a permalink by examining the redirect URL that is returned in a request for the permalink ID number of a private album. The permalink ID numbers are easily guessed. | |||||
CVE-2017-17774 | 1 Piwigo | 1 Piwigo | 2023-12-10 | 6.8 MEDIUM | 8.8 HIGH |
admin/configuration.php in Piwigo 2.9.2 has CSRF. | |||||
CVE-2017-9836 | 1 Piwigo | 1 Piwigo | 2023-12-10 | 3.5 LOW | 4.8 MEDIUM |
Cross-site scripting (XSS) vulnerability in Piwigo 2.9.1 allows remote authenticated administrators to inject arbitrary web script or HTML via the virtual_name parameter to /admin.php (i.e., creating a virtual album). | |||||
CVE-2017-9452 | 1 Piwigo | 1 Piwigo | 2023-12-10 | 3.5 LOW | 4.8 MEDIUM |
Cross-site scripting (XSS) vulnerability in admin.php in Piwigo 2.9.0 and earlier allows remote attackers to inject arbitrary web script or HTML via the page parameter. | |||||
CVE-2017-10678 | 1 Piwigo | 1 Piwigo | 2023-12-10 | 6.8 MEDIUM | 8.8 HIGH |
Cross-site request forgery (CSRF) vulnerability in Piwigo through 2.9.1 allows remote attackers to hijack the authentication of users for requests to delete permalinks via a crafted request. | |||||
CVE-2017-17827 | 1 Piwigo | 1 Piwigo | 2023-12-10 | 6.8 MEDIUM | 8.8 HIGH |
Piwigo 2.9.2 is vulnerable to Cross-Site Request Forgery via /admin.php?page=configuration§ion=main or /admin.php?page=batch_manager&mode=unit. An attacker can exploit this to coerce an admin user into performing unintended actions. | |||||
CVE-2017-10682 | 1 Piwigo | 1 Piwigo | 2023-12-10 | 7.5 HIGH | 9.8 CRITICAL |
SQL injection vulnerability in the administrative backend in Piwigo through 2.9.1 allows remote users to execute arbitrary SQL commands via the cat_false or cat_true parameter in the comments or status page to cat_options.php. | |||||
CVE-2017-9464 | 1 Piwigo | 1 Piwigo | 2023-12-10 | 5.8 MEDIUM | 6.1 MEDIUM |
An open redirect vulnerability is present in Piwigo 2.9 and probably prior versions, allowing remote attackers to redirect users to arbitrary web sites and conduct phishing attacks. The identification.php component is affected by this issue: the "redirect" parameter is not validated. | |||||
CVE-2017-10681 | 1 Piwigo | 1 Piwigo | 2023-12-10 | 6.8 MEDIUM | 8.8 HIGH |
Cross-site request forgery (CSRF) vulnerability in Piwigo through 2.9.1 allows remote attackers to hijack the authentication of users for requests to unlock albums via a crafted request. | |||||
CVE-2017-16893 | 1 Piwigo | 1 Piwigo | 2023-12-10 | 4.0 MEDIUM | 6.5 MEDIUM |
The application Piwigo is affected by an SQL injection vulnerability in version 2.9.2 and possibly prior. This vulnerability allows remote authenticated attackers to obtain information in the context of the user used by the application to retrieve data from the database. tags.php is affected: values of the edit_list parameters are not sanitized; these are used to construct an SQL query and retrieve a list of registered users into the application. | |||||
CVE-2016-10514 | 1 Piwigo | 1 Piwigo | 2023-12-10 | 4.3 MEDIUM | 6.5 MEDIUM |
url_check_format in include/functions.inc.php in Piwigo before 2.8.3 allows remote attackers to bypass intended access restrictions via a URL that contains a " character, or a URL beginning with a substring other than the http:// or https:// substring. | |||||
CVE-2017-9463 | 1 Piwigo | 1 Piwigo | 2023-12-10 | 4.0 MEDIUM | 6.5 MEDIUM |
The application Piwigo is affected by a SQL injection vulnerability in version 2.9.0 and possibly prior. This vulnerability allows remote authenticated attackers to obtain information in the context of the user used by the application to retrieve data from the database. The user_list_backend.php component is affected: values of the iDisplayStart & iDisplayLength parameters are not sanitized; these are used to construct a SQL query and retrieve a list of registered users into the application. | |||||
CVE-2018-5692 | 1 Piwigo | 1 Piwigo | 2023-12-10 | 4.3 MEDIUM | 6.1 MEDIUM |
Piwigo v2.8.2 has XSS via the `tab`, `to`, `section`, `mode`, `installstatus`, and `display` parameters of the `admin.php` file. | |||||
CVE-2017-17826 | 1 Piwigo | 1 Piwigo | 2023-12-10 | 4.3 MEDIUM | 6.1 MEDIUM |
The Configuration component of Piwigo 2.9.2 is vulnerable to Persistent Cross Site Scripting via the gallery_title parameter in an admin.php?page=configuration§ion=main request. An attacker can exploit this to hijack a client's browser along with the data stored in it. |