Vulnerabilities > Piwigo > Lexiglot
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2020-06-01 | CVE-2014-8945 | OS Command Injection vulnerability in Piwigo Lexiglot admin.php?page=projects in Lexiglot through 2014-11-20 allows command injection via username and password fields. | 9.8 |
2020-06-01 | CVE-2014-8944 | Cross-site Scripting vulnerability in Piwigo Lexiglot Lexiglot through 2014-11-20 allows XSS (Reflected) via the username, or XSS (Stored) via the admin.php?page=config install_name, intro_message, or new_file_content parameter. | 5.4 |
2020-06-01 | CVE-2014-8943 | Server-Side Request Forgery (SSRF) vulnerability in Piwigo Lexiglot Lexiglot through 2014-11-20 allows SSRF via the admin.php?page=projects svn_url parameter. | 8.8 |
2020-06-01 | CVE-2014-8942 | Cross-Site Request Forgery (CSRF) vulnerability in Piwigo Lexiglot Lexiglot through 2014-11-20 allows CSRF. | 8.8 |
2020-06-01 | CVE-2014-8941 | SQL Injection vulnerability in Piwigo Lexiglot Lexiglot through 2014-11-20 allows SQL injection via an admin.php?page=users&from_id= or admin.php?page=history&limit= URI. | 9.8 |
2020-06-01 | CVE-2014-8940 | Information Exposure vulnerability in Piwigo Lexiglot Lexiglot through 2014-11-20 allows remote attackers to obtain sensitive information (names and details of projects) by visiting the /update.log URI. | 5.3 |
2020-06-01 | CVE-2014-8939 | Path Traversal vulnerability in Piwigo Lexiglot Lexiglot through 2014-11-20 allows remote attackers to obtain sensitive information (full path) via an include/smarty/plugins/modifier.date_format.php request if PHP has a non-recommended configuration that produces warning messages. | 5.3 |
2020-06-01 | CVE-2014-8938 | Insufficiently Protected Credentials vulnerability in Piwigo Lexiglot Lexiglot through 2014-11-20 allows local users to obtain sensitive information by listing a process because the username and password are on the command line. | 7.8 |
2020-06-01 | CVE-2014-8937 | Resource Exhaustion vulnerability in Piwigo Lexiglot Lexiglot through 2014-11-20 allows denial of service because api/update.php launches svn update operations that use a great deal of resources. | 7.5 |