Page 2 of 7 results (0.026 seconds)

CVSS: 5.0EPSS: 0%CPEs: 52EXPL: 0

The PayPal Website Payments Standard functionality in the Ubercart module 5.x before 5.x-1.9 and 6.x before 6.x-2.1 for Drupal does not properly validate orders, which allows remote attackers to trigger unspecified "duplicate actions" via unknown vectors. la funcionalidad de "PayPal Website Payments Standard" (estándar de pago del sitio PayPal) del módulo Ubercart v5.x anteriores a la v5.x-1.9 y v6.x anteriores a la v6.x-2.1 de Drupal no valida apropiadamente los pedidos, lo que permite a atacantes remotos ejecutar "acciones duplicadas" sin especificar a través de vectores de ataque desconocidos. • http://drupal.org/node/636576 http://osvdb.org/60290 http://secunia.com/advisories/37440 http://www.securityfocus.com/bid/37058 https://exchange.xforce.ibmcloud.com/vulnerabilities/54346 • CWE-20: Improper Input Validation •

CVSS: 4.3EPSS: 0%CPEs: 52EXPL: 0

Unspecified vulnerability in the PayPal Website Payments Standard functionality in the Ubercart module 5.x before 5.x-1.9 and 6.x before 6.x-2.1 for Drupal, when a custom checkout completion message is enabled, allows attackers to obtain sensitive information via unknown vectors. Vulnerabilidad sin especificar en la funcionalidad de "PayPal Website Payments Standard" (estándar de pago del sitio PayPal) del módulo Ubercart v5.x anteriores a la v5.x-1.9 y v6.x anteriores a la v6.x-2.1 de Drupal. Cuando se habilita un mensaje modificado de fin de la confirmación, permite a los atacantes obtener información confidencial a través de vectores de ataque sin especificar. • http://drupal.org/node/636576 http://osvdb.org/60291 http://secunia.com/advisories/37440 http://www.securityfocus.com/bid/37058 https://exchange.xforce.ibmcloud.com/vulnerabilities/54345 •