CVE-2015-7527

lib/core.php in the Cool Video Gallery plugin 1.9 for WordPress allows remote attackers to execute arbitrary code via shell metacharacters in the "Width of preview image" and possibly other input fields in the "Video Gallery Settings" page.
Configurations

Configuration 1 (hide)

cpe:2.3:a:cool_video_gallery_project:cool_video_gallery:1.9:*:*:*:*:wordpress:*:*

History

21 Nov 2024, 02:36

Type Values Removed Values Added
References () http://packetstormsecurity.com/files/134626/WordPress-Cool-Video-Gallery-1.9-Command-Injection.html - Exploit () http://packetstormsecurity.com/files/134626/WordPress-Cool-Video-Gallery-1.9-Command-Injection.html - Exploit
References () http://www.openwall.com/lists/oss-security/2015/12/02/9 - Exploit () http://www.openwall.com/lists/oss-security/2015/12/02/9 - Exploit
References () http://www.securityfocus.com/archive/1/537051/100/0/threaded - () http://www.securityfocus.com/archive/1/537051/100/0/threaded -
References () http://www.vapidlabs.com/advisory.php?v=158 - Exploit () http://www.vapidlabs.com/advisory.php?v=158 - Exploit
References () https://wordpress.org/support/topic/command-injection-vulnerability-in-v19 - Exploit () https://wordpress.org/support/topic/command-injection-vulnerability-in-v19 - Exploit
References () https://wpvulndb.com/vulnerabilities/8348 - () https://wpvulndb.com/vulnerabilities/8348 -

Information

Published : 2015-12-17 19:59

Updated : 2024-11-21 02:36


NVD link : CVE-2015-7527

Mitre link : CVE-2015-7527

CVE.ORG link : CVE-2015-7527


JSON object : View

Products Affected

cool_video_gallery_project

  • cool_video_gallery
CWE
CWE-20

Improper Input Validation