Page 3 of 21 results (0.004 seconds)

CVSS: 5.0EPSS: 5%CPEs: 11EXPL: 1

CubeCart 3.0 through 3.6 does not properly check authorization for an administration session because of a missing auth.inc.php include, which results in an absolute path traversal vulnerability in FileUpload in connector.php (aka upload.php) that allows remote attackers to upload arbitrary files via a modified CurrentFolder parameter in a direct request to admin/filemanager/upload.php. • https://www.exploit-db.com/exploits/27304 http://securityreason.com/securityalert/482 http://www.cubecart.com/site/forums/index.php?showtopic=14704 http://www.cubecart.com/site/forums/index.php?showtopic=14817 http://www.cubecart.com/site/forums/index.php?showtopic=14825 http://www.cubecart.com/site/forums/index.php?showtopic=14960 http://www.cubecart.com/site/forums/index.php? •

CVSS: 4.3EPSS: 1%CPEs: 1EXPL: 4

Multiple cross-site scripting (XSS) vulnerabilities in CubeCart 3.0.7-pl1 allow remote attackers to inject arbitrary web script or HTML via the (3) redir, (4) productId, (5) docId, (6) act, and (7) catId parameters in index.php; and the (8) username field in a login action in index.php. NOTE: the cart.php/redir and index.php/searchStr vectors are already covered by CVE-2005-3152. • http://bugs.cubecart.com/?do=details&id=459 http://lostmon.blogspot.com/2006/01/cubecart-307-pl1-indexphp-multiple.html http://secunia.com/advisories/18519 http://www.osvdb.org/22471 http://www.securityfocus.com/bid/16259 http://www.vupen.com/english/advisories/2006/0227 https://exchange.xforce.ibmcloud.com/vulnerabilities/24177 •

CVSS: 7.5EPSS: 8%CPEs: 1EXPL: 1

PHP remote file include vulnerability in includes/orderSuccess.inc.php in CubeCart allows remote attackers to execute arbitrary PHP code via a URL in the glob[rootDir] parameter. • https://www.exploit-db.com/exploits/1398 http://www.vupen.com/english/advisories/2006/0016 • CWE-94: Improper Control of Generation of Code ('Code Injection') •

CVSS: 4.3EPSS: 0%CPEs: 2EXPL: 5

Multiple cross-site scripting (XSS) vulnerabilities in CubeCart 3.0.3 allow remote attackers to inject arbitrary web script or HTML via the redir parameter to (1) cart.php or (2) index.php, or (3) the searchStr parameter in a viewCat action to index.php. Note: vectors (1) and (2) were later reported to affect 3.0.7-pl1. • https://www.exploit-db.com/exploits/26304 https://www.exploit-db.com/exploits/26303 http://bugs.cubecart.com/?do=details&id=363 http://bugs.cubecart.com/?do=details&id=459 http://lostmon.blogspot.com/2005/09/cubecart-303-multiple-variable-cross.html http://lostmon.blogspot.com/2006/01/cubecart-307-pl1-indexphp-multiple.html http://securityreason.com/securityalert/35 http://securitytracker.com/id?1014984 http://www.securityfocus.com/bid/14962 https://exchange.xforce.ibmcloud. •

CVSS: 5.0EPSS: 2%CPEs: 1EXPL: 4

CubeCart 2.0.6 allows remote attackers to obtain sensitive information via an invalid (1) language parameter to index.php, (2) PHPSESSID parameter to index.php, (3) product parameter to tellafriend.php, (4) add parameter to view_cart.php, or (5) product parameter to view_product.php, which reveals the path in a PHP error message. • https://www.exploit-db.com/exploits/25355 https://www.exploit-db.com/exploits/25356 https://www.exploit-db.com/exploits/25357 https://www.exploit-db.com/exploits/25358 http://marc.info/?l=bugtraq&m=111281457918479&w=2 http://securitytracker.com/id?1013660 http://www.osvdb.org/14064 •