Page 2 of 14 results (0.003 seconds)

CVSS: 7.5EPSS: 0%CPEs: 1EXPL: 0

Multiple SQL injection vulnerabilities in Zen Cart 1.3.0.2 and earlier allow remote attackers to execute arbitrary SQL commands via (1) GPC data to the ipn_get_stored_session function in ipn_main_handler.php, which can be leveraged to modify elements of $_SESSION; and allow remote authenticated users to execute arbitrary SQL commands via (2) a session id within a cookie to whos_online_session_recreate, (3) the quantity field to the add_cart function, (4) an id[] parameter when adding an item to a shopping cart, or (5) a redemption code when checking out (dc_redeem_code parameter to includes/modules/order_total/ot_coupon.php). Múltiples vulnerabilidades de inyección SQL en Zen Cart 1.3.0.2 y anteriores permite a atacantes remotos ejecutar comandos SQL de su elección mediante (1) datos GPC en la función ipn_get_stored_session en ipn_main_handler.php, lo cual puede ser aprovechado para modificar elementos de $_SESSION; y permite a usuarios autenticados remotamente ejecutar comandos SQL de su elección mediante (2) un identificador de sesión dentro de una cookie para whos_online_session_recreate, (3) el campo quantity para la función add_cart, (4) un parámetro id[] cuando se añade un producto a un carrito de la compra, o (5) un código de amortización cuando se está confirmando la compra (el parámetro dc_redeem_code en el includes/modules/order_total/ot_coupon.php). • http://secunia.com/advisories/21484 http://www.gulftech.org/?node=research&article_id=00109-08152006 http://www.osvdb.org/28144 http://www.osvdb.org/28145 http://www.osvdb.org/28146 http://www.osvdb.org/28147 http://www.osvdb.org/28148 http://www.securityfocus.com/bid/19542 http://www.vupen.com/english/advisories/2006/3283 http://www.zen-cart.com/forum/showthread.php?t=43579 https://exchange.xforce.ibmcloud.com/vulnerabilities/28393 • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •

CVSS: 5.1EPSS: 7%CPEs: 1EXPL: 1

PHP remote file inclusion vulnerability in index.php in Zen Cart 1.3.0.2 and earlier, when register_globals is enabled, allows remote attackers to execute arbitrary PHP code via a URL in the autoLoadConfig[999][0][loadFile] parameter. Vulnerabilidad de inclusión remota de archivo en PHP en index.php en Zen Cart 1.3.0.2 y anteriores, cuando register_globals está activado, permite a atacantes remotos ejecutar código PHP de su elección mediante una URL en el parámetro autoLoadConfig[999][0][loadFile]. • https://www.exploit-db.com/exploits/28392 http://secunia.com/advisories/21484 http://www.gulftech.org/?node=research&article_id=00109-08152006 http://www.osvdb.org/28149 http://www.securityfocus.com/bid/19543 http://www.vupen.com/english/advisories/2006/3283 https://exchange.xforce.ibmcloud.com/vulnerabilities/28394 • CWE-94: Improper Control of Generation of Code ('Code Injection') •

CVSS: 7.5EPSS: 0%CPEs: 14EXPL: 0

SQL injection vulnerability in Zen Cart before 1.2.7 allows remote attackers to execute arbitrary SQL commands via unspecified vectors. • http://secunia.com/advisories/18801 http://sourceforge.net/project/shownotes.php?release_id=392886 http://www.osvdb.org/23110 http://www.vupen.com/english/advisories/2006/0546 https://exchange.xforce.ibmcloud.com/vulnerabilities/24701 •

CVSS: 10.0EPSS: 0%CPEs: 11EXPL: 0

Zen Cart before 1.2.7 does not protect the admin/includes directory, which allows remote attackers to cause unknown impact via unspecified vectors, probably direct requests. • http://secunia.com/advisories/18801 http://sourceforge.net/project/shownotes.php?release_id=392886 http://www.vupen.com/english/advisories/2006/0546 • CWE-264: Permissions, Privileges, and Access Controls •

CVSS: 10.0EPSS: 0%CPEs: 14EXPL: 0

Unspecified vulnerabilities in Zen Cart before 1.2.7 allow remote attackers to cause unknown impact via unspecified vectors related to "other attempted exploits" other than SQL injection. • http://secunia.com/advisories/18801 http://sourceforge.net/project/shownotes.php?release_id=392886 http://www.vupen.com/english/advisories/2006/0546 https://exchange.xforce.ibmcloud.com/vulnerabilities/24701 •