Photography

This information is sourced from wpvulnerabilities.com. An open-source database of vulnerabilities maintained by the community. Help us out by submitting vulnerabilities!

Vulnerabilities

  • Input validation vulnerability in photography 7.6.1

    Open

    The WordPress Photography theme has a security issue known as Stored Cross-Site Scripting. This affects versions up to and including 7.6.1. The problem is caused by not properly cleaning up user inpu...

    Read More
  • Input validation vulnerability in photography 7.7.5

    Fixed

    The Photography theme for WordPress has a security issue that allows unauthenticated attackers to access and run files on the server without permission. This could lead to unauthorized access, gettin...

    Read More
  • Input validation vulnerability in photography 7.7.2

    Fixed

    The WordPress Photography theme has a security issue that allows hackers to inject harmful web scripts into pages. This can happen if a person clicks on a deceptive link.

    Read More
  • Input validation vulnerability in Photography 7.5.2

    Open

    The Photography theme for WordPress, up to version 7.5.2, has a security issue that allows attackers to inject a harmful PHP Object by using untrustworthy input. This could potentially give unauthori...

    Read More
  • Input validation vulnerability in Photography 7.5.2

    Open

    The WordPress Photography theme has a security vulnerability that allows attackers to inject a harmful code, known as a PHP Object, into the system. This vulnerability can only be exploited by attack...

    Read More
  • Input validation vulnerability in photography 7.5.2

    Open

    The photography template for WordPress has a security issue called Server-Side Request Forgery. This affects all versions, even the latest one (7.5.2). This means that people who are not logged in ca...

    Read More
  • Access violation vulnerability in Photography 7.5.2

    Open

    The WordPress theme for Photography has a security issue that allows unauthorized access. This is because a function in all versions, up to and including 7.5.2, does not have a check to ensure the us...

    Read More