Vulnerabilities (CVE)

Filtered by vendor Imagely Subscribe
Filtered by product Nextgen Gallery
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2015-1785 1 Imagely 1 Nextgen Gallery 2022-07-14 4.3 MEDIUM 6.5 MEDIUM
In nextgen-galery wordpress plugin before 2.0.77.3 there are two vulnerabilities which can allow an attacker to gain full access over the web application. The vulnerabilities lie in how the application validates user uploaded files and lack of security measures preventing unwanted HTTP requests.
CVE-2021-24293 1 Imagely 1 Nextgen Gallery 2021-05-13 4.3 MEDIUM 6.1 MEDIUM
In the eCommerce module of the NextGEN Gallery Pro WordPress plugin before 3.1.11, there is an action to call get_cart_items via photocrati_ajax , after that the settings[shipping_address][name] is able to inject malicious javascript.
CVE-2020-35943 1 Imagely 1 Nextgen Gallery 2021-02-12 4.3 MEDIUM 6.5 MEDIUM
A Cross-Site Request Forgery (CSRF) issue in the NextGEN Gallery plugin before 3.5.0 for WordPress allows File Upload. (It is possible to bypass CSRF protection by simply not including a nonce parameter.)
CVE-2015-9537 1 Imagely 1 Nextgen Gallery 2020-11-10 3.5 LOW 5.4 MEDIUM
The NextGEN Gallery plugin before 2.1.10 for WordPress has multiple XSS issues involving thumbnail_width, thumbnail_height, thumbwidth, thumbheight, wmXpos, and wmYpos, and template.
CVE-2015-9538 1 Imagely 1 Nextgen Gallery 2020-11-10 4.0 MEDIUM 6.5 MEDIUM
The NextGEN Gallery plugin before 2.1.15 for WordPress allows ../ Directory Traversal in path selection.
CVE-2015-9229 1 Imagely 1 Nextgen Gallery 2020-11-10 3.5 LOW 4.8 MEDIUM
In the nggallery-manage-gallery page in the Photocrati NextGEN Gallery plugin 2.1.15 for WordPress, XSS is possible for remote authenticated administrators via the images[1][alttext] parameter.
CVE-2018-1000172 1 Imagely 1 Nextgen Gallery 2018-06-07 3.5 LOW 4.8 MEDIUM
Imagely NextGEN Gallery version 2.2.30 and earlier contains a Cross Site Scripting (XSS) vulnerability in Image Alt & Title Text. This attack appears to be exploitable via a victim viewing the image in the administrator page. This vulnerability appears to have been fixed in 2.2.45.