Total vulnerabilities in the database
Directory traversal vulnerability in Gallery 2.0.3 and earlier, and 2.1 before RC-2a, allows remote attackers to include arbitrary PHP files via ".." (dot dot) sequences in the stepOrder parameter to (1) upgrade/index.php or (2) install/index.php.
Software | From | Fixed in |
---|---|---|
gallery_project / gallery | 2.0.1 | 2.0.1.x |
gallery_project / gallery | 2.0_alpha4 | 2.0_alpha4.x |
gallery_project / gallery | 2.0_beta2 | 2.0_beta2.x |
gallery_project / gallery | 2.0.2 | 2.0.2.x |
gallery_project / gallery | 2.0_alpha | 2.0_alpha.x |
gallery_project / gallery | 2.0_beta1 | 2.0_beta1.x |
gallery_project / gallery | 2.0_alpha2 | 2.0_alpha2.x |
gallery_project / gallery | 2.0_alpha1 | 2.0_alpha1.x |
gallery_project / gallery | 2.0.3 | 2.0.3.x |
gallery_project / gallery | 2.1_rc1 | 2.1_rc1.x |
gallery_project / gallery | 2.0_beta3 | 2.0_beta3.x |
gallery_project / gallery | 2.1_rc2 | 2.1_rc2.x |
gallery_project / gallery | 2.0 | 2.0.x |
gallery_project / gallery | 2.0_alpha3 | 2.0_alpha3.x |