5 results (0.002 seconds)

CVSS: 4.3EPSS: 0%CPEs: 1EXPL: 1

Cross-site scripting (XSS) vulnerability in info.php in TomatoCart 1.1.8.6.1 allows remote attackers to inject arbitrary web script or HTML via the faqs_id parameter. Vulnerabilidad de XSS en info.php en TomatoCart 1.1.8.6.1 permite a atacantes remotos inyectar secuencias de comandos web o HTML arbitrarios a través del parámetro faqs_id. TomatoCart version 1.x (latest-stable) suffers from cross site scripting and remote SQL injection vulnerabilities. • http://packetstormsecurity.com/files/127785/TomatoCart-1.x-Cross-Site-Scripting-SQL-Injection.html https://breaking.technology/advisories/CVE-2014-3830.txt • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 6.5EPSS: 0%CPEs: 1EXPL: 2

SQL injection vulnerability in TomatoCart 1.1.8.6.1 allows remote authenticated users to execute arbitrary SQL commands via the First Name and Last Name fields in a new address book contact. Vulnerabilidad de inyección SQL en TomatoCart 1.1.8.6.1 permite a usuarios remotos autenticados ejecutar comandos SQL arbitrarios a través de los campos First Name y Last Name en un contacto del libro nuevo de direcciones. TomatoCart version 1.x (latest-stable) suffers from cross site scripting and remote SQL injection vulnerabilities. • https://www.exploit-db.com/exploits/34308 http://packetstormsecurity.com/files/127785/TomatoCart-1.x-Cross-Site-Scripting-SQL-Injection.html https://breaking.technology/advisories/CVE-2014-3978.txt • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •

CVSS: 5.0EPSS: 3%CPEs: 1EXPL: 4

Directory traversal vulnerability in json.php in TomatoCart 1.2.0 Alpha 2 and possibly earlier allows remote attackers to read arbitrary files via a .. (dot dot) in the module parameter in a "3" action. Una vulnerabilidad de salto de directorio en json.php en TomatoCart v1.2.0 Alpha 2 y posiblemente anteriores permite a atacantes remotos leer archivos de su elección a través de un .. (punto punto) en el parámetro 'module' en una acción "3". • https://www.exploit-db.com/exploits/37021 http://osvdb.org/80689 http://packetstormsecurity.org/files/111291/TomatoCart-1.2.0-Alpha-2-Local-File-Inclusion.html http://www.mavitunasecurity.com/local-file-inclusion-vulnerability-in-tomatocart http://www.securityfocus.com/bid/52766 https://exchange.xforce.ibmcloud.com/vulnerabilities/74459 • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •

CVSS: 3.5EPSS: 0%CPEs: 1EXPL: 0

TomatoCart 1.1.7, when the PayPal Express Checkout module is enabled in sandbox mode, allows remote authenticated users to bypass intended payment requirements by modifying a certain redirection URL. TomatoCart v1.1.7, cuando el módulo PayPal Express Checkout está activado en modo de ejecución controlada (sandbox), permite a usuarios remotos autenticados a evitar los requisitos de pago establecidos, modificando cierta redirección URL. • http://osvdb.org/86883 http://www.kb.cert.org/vuls/id/207540 http://www.securityfocus.com/bid/56333 https://exchange.xforce.ibmcloud.com/vulnerabilities/79696 • CWE-264: Permissions, Privileges, and Access Controls •

CVSS: 5.0EPSS: 0%CPEs: 1EXPL: 0

TomatoCart 1.1.3 allows remote attackers to obtain sensitive information via a direct request to a .php file, which reveals the installation path in an error message, as demonstrated by templates/system/offline.php and certain other files. TomatoCart v1.1.3 permite a atacantes remotos obtener información sensible a través de una petición directa a un archivo .php, lo que revela la ruta de instalación en un mensaje de error, como se demostró con templates/system/offline.php y algunos otros archivos. • http://code.google.com/p/inspathx/source/browse/trunk/paths_vuln/%21_README http://code.google.com/p/inspathx/source/browse/trunk/paths_vuln/tomatocart-1.1.3 http://www.openwall.com/lists/oss-security/2011/06/27/6 • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •