Vulnerabilities > Coppermine > Coppermine Photo Gallery > 1.4.4

DATE CVE VULNERABILITY TITLE RISK
2007-09-19 CVE-2007-4977 Cross-Site Scripting vulnerability in Coppermine Photo Gallery
Cross-site scripting (XSS) vulnerability in mode.php in Coppermine Photo Gallery (CPG) 1.4.12 and earlier allows remote attackers to inject arbitrary web script or HTML via the referer parameter.
network
coppermine CWE-79
3.5
2007-09-19 CVE-2007-4976 Path Traversal vulnerability in Coppermine Photo Gallery
Directory traversal vulnerability in viewlog.php in Coppermine Photo Gallery (CPG) 1.4.12 and earlier allows remote authenticated administrators to include and execute arbitrary local files via a ..
network
low complexity
coppermine CWE-22
6.5
2007-01-09 CVE-2007-0122 SQL Injection vulnerability in Coppermine Photo Gallery Albmgr.PHP
Multiple SQL injection vulnerabilities in Coppermine Photo Gallery 1.4.10 and earlier allow remote authenticated administrators to execute arbitrary SQL commands via (1) the cat parameter to albmgr.php, and possibly (2) the gid parameter to usermgr.php; (3) the start parameter to db_ecard.php; and the albumid parameter to unspecified files, related to the (4) filename_to_title and (5) del_titles functions.
network
low complexity
coppermine
6.5
2006-06-12 CVE-2006-2976 Remote Security vulnerability in Coppermine Photo Gallery
Unspecified vulnerability in usermgr.php in Coppermine Photo Gallery before 1.4.7 has unknown impact and remote attack vectors, possibly related to authorization/authentication errors.
network
low complexity
coppermine
7.5
2006-05-22 CVE-2006-2514 File-Upload vulnerability in Coppermine Photo Gallery
Coppermine galleries before 1.4.6, when running on Apache with mod_mime installed, allows remote attackers to upload arbitrary files via a filename with multiple file extensions.
network
low complexity
coppermine
7.5
2006-04-20 CVE-2006-1909 Local File Include vulnerability in Coppermine Photo Gallery 1.4.4
Directory traversal vulnerability in index.php in Coppermine 1.4.4 allows remote attackers to read arbitrary files via a .//./ (modified dot dot slash) in the file parameter, which causes a regular expression to collapse the sequences into standard "../" sequences.
network
low complexity
coppermine
5.0