Page 3 of 20 results (0.009 seconds)

CVSS: 6.8EPSS: 1%CPEs: 11EXPL: 2

classes/admin.class.php in CubeCart 5.2.12 through 5.2.16 and 6.x before 6.0.7 does not properly validate that a password reset request was made, which allows remote attackers to change the administrator password via a recovery request with a space character in the validate parameter and the administrator email in the email parameter. Vulnerabilidad en classes/admin.class.php en CubeCart 5.2.12 hasta la versión 5.2.16 y 6.x en versiones anteriores a 6.0.7, no valida adecuadamente que una petición de reinicio de contraseña fuese realizada, lo que permite a atacantes remotos cambiar la contraseña del administrador a través de una petición de recuperación con un carácter espacio en el parámetro validate y el email del administrador en el parámetro email. • http://packetstormsecurity.com/files/133535/CubeCart-6.0.6-Administrative-Bypass.html http://seclists.org/fulldisclosure/2015/Sep/40 http://www.securitytracker.com/id/1034015 https://forums.cubecart.com/topic/50277-critical-security-issue-admin-account-hijack • CWE-284: Improper Access Control •

CVSS: 6.8EPSS: 16%CPEs: 9EXPL: 2

Session fixation vulnerability in CubeCart before 5.2.9 allows remote attackers to hijack web sessions via the PHPSESSID parameter. Vulnerabilidad de fijación de sesión en CubeCart anterior a 5.2.9 permite a atacantes remotos secuestrar sesiones web a través del parámetro PHPSESSID. • https://www.exploit-db.com/exploits/32830 http://forums.cubecart.com/topic/48427-cubecart-529-relased http://secunia.com/advisories/57856 http://www.exploit-db.com/exploits/32830 http://www.osvdb.org/105784 http://www.securityfocus.com/bid/66805 http://www.securitytracker.com/id/1030086 https://exchange.xforce.ibmcloud.com/vulnerabilities/92526 • CWE-287: Improper Authentication •

CVSS: 9.8EPSS: 13%CPEs: 1EXPL: 4

The Cubecart::_basket method in classes/cubecart.class.php in CubeCart 5.0.0 through 5.2.0 allows remote attackers to unserialize arbitrary PHP objects via a crafted shipping parameter, as demonstrated by modifying the application configuration using the Config object. El método _basket en /classes / cubecart.class.php en CubeCart v5.0.0 a través de v5.2.0 permite a atacantes remotos desserializar objetos PHP a través de un parámetro envío hecho a mano, como se ha demostrado mediante la modificación de la configuración de la aplicación mediante el objeto Config. CubeCart versions 5.0.0 through 5.2.0 suffer from a PHP object injection vulnerability in cubecart.class.php. • https://www.exploit-db.com/exploits/24465 http://archives.neohapsis.com/archives/bugtraq/2013-02/0032.html http://forums.cubecart.com/?showtopic=47026 http://karmainsecurity.com/KIS-2013-02 http://osvdb.org/89923 http://packetstormsecurity.com/files/120094/CubeCart-5.2.0-PHP-Object-Injection.html http://secunia.com/advisories/52072 http://www.exploit-db.com/exploits/24465 http://www.securityfocus.com/bid/57770 https://exchange.xforce.ibmcloud.com/vulnerabilities/81920 • CWE-502: Deserialization of Untrusted Data •

CVSS: 5.8EPSS: 1%CPEs: 21EXPL: 9

Multiple open redirect vulnerabilities in CubeCart 3.0.20 and earlier allow remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via a URL in the (1) r parameter to switch.php or (2) goto parameter to admin/login.php. Múltiples vulnerabilidades de redirección abierta en CubeCart v3.0.20 y anteriores permite a atacantes remotos redirigir a los usuarios a sitios web arbitrarias y llevar a cabo ataques de phishing a través de una URL en el parámetro (1) r para switch.php o (2) el parámetro goto para admin / login. php. • https://www.exploit-db.com/exploits/36686 https://www.exploit-db.com/exploits/36685 https://www.exploit-db.com/exploits/36687 http://archives.neohapsis.com/archives/bugtraq/2012-02/0058.html http://osvdb.org/79140 http://osvdb.org/79141 http://www.openwall.com/lists/oss-security/2012/02/12/4 http://www.openwall.com/lists/oss-security/2012/02/13/5 http://www.openwall.com/lists/oss-security/2012/02/18/1 http://www.securityfocus.com/bid/51966 http:&#x • CWE-20: Improper Input Validation •

CVSS: 7.5EPSS: 0%CPEs: 1EXPL: 0

SQL injection vulnerability in index.php in CubeCart 4.3.3 allows remote attackers to execute arbitrary SQL commands via the searchStr parameter. Vulnerabilidad de inyección SQL en index.php en CubeCart v4.3.3, permite a atacantes remotos ejecutar comandos SQL de su elección a través del parámetro searchStr. • http://secunia.com/advisories/41352 http://securityreason.com/securityalert/8441 http://www.acunetix.com/blog/web-security-zone/articles/sql-injection-xss-cubecart-4-3-3 http://www.securityfocus.com/archive/1/513572/100/0/threaded http://www.securityfocus.com/bid/43114 • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •