{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-20T03:48:43.741","vulnerabilities":[{"cve":{"id":"CVE-2008-4892","sourceIdentifier":"cve@mitre.org","published":"2008-11-04T00:58:39.400","lastModified":"2025-04-09T00:30:58.490","vulnStatus":"Deferred","cveTags":[],"descriptions":[{"lang":"en","value":"Cross-site scripting (XSS) vulnerability in gallery.inc.php in Planetluc MyGallery 1.7.2 and earlier, and possibly other versions before 1.8.1, allows remote attackers to inject arbitrary web script or HTML via the mghash parameter.  NOTE: some of these details are obtained from third party information."},{"lang":"es","value":"Vulnerabilidad de secuencias de comandos en sitios cruzados (XSS) en gallery.inc.php en Planetluc MyGallery v1.7.2 y anteriores, y posiblemente otras versiones anteriores a v1.8.1, permite a atacantes remotos inyectar secuencias de comandos web o HTML mediante el parámetro mghash. Nota: algunos de estos detalles se han obtenido de información de terceros."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:M/Au:N/C:N/I:P/A:N","baseScore":4.3,"accessVector":"NETWORK","accessComplexity":"MEDIUM","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"PARTIAL","availabilityImpact":"NONE"},"baseSeverity":"MEDIUM","exploitabilityScore":8.6,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":true}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-79"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:planetluc:mygallery:1.7.2:*:*:*:*:*:*:*","matchCriteriaId":"41715D87-D567-43C2-AFF1-4A461437C9FF"}]}]}],"references":[{"url":"http://holisticinfosec.org/content/view/86/45/","source":"cve@mitre.org"},{"url":"http://secunia.com/advisories/32505","source":"cve@mitre.org","tags":["Vendor Advisory"]},{"url":"http://www.planetluc.com/en/news/20081101_xss.php?navurl=/en/news.php","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/32067","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/46200","source":"cve@mitre.org"},{"url":"http://holisticinfosec.org/content/view/86/45/","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://secunia.com/advisories/32505","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]},{"url":"http://www.planetluc.com/en/news/20081101_xss.php?navurl=/en/news.php","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/32067","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/46200","source":"af854a3a-2127-422b-91ae-364da2661108"}],"evaluatorSolution":"Patch Information - http://planetluc.com/en/scripts_mygallery.php"}}]}