Page 3 of 14 results (0.005 seconds)

CVSS: 5.0EPSS: 0%CPEs: 1EXPL: 0

ideal_process.php in the iDEAL payment module in ViArt Shop 3.3 beta and earlier might allow remote attackers to obtain the pathname for certificate and key files via an "iDEAL transaction", possibly involving fopen error messages for nonexistent files, a different issue than CVE-2007-5364. NOTE: this can be leveraged for reading certificate or key files if an installation places these files under the web document root. ideal_process.php en el módulo de pago iDEAL de ViArt Shop 3.3 beta y versiones anteriores podría permitir a atacantes remotos obtener el nombre de ruta de un certificado y ficheros de clave mediante una "transacción iDEAL", posiblemente involucrando mensajes de error fopen para ficheros no existentes, asunto diferente de CVE-2007-5364. NOTA: esto podría ser utilizado para leer certificados o ficheros de clave si una instalación sitúa estos ficheros bajo la raíz de documentos web. • http://osvdb.org/40151 http://secunia.com/advisories/27199 http://securityreason.com/securityalert/3233 http://www.securityfocus.com/archive/1/481978/100/0/threaded http://www.securityfocus.com/bid/25998 http://www.viart.com/ideal_process_script_fix_for_release_32_and_33_beta.html https://exchange.xforce.ibmcloud.com/vulnerabilities/37048 • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •

CVSS: 10.0EPSS: 0%CPEs: 1EXPL: 0

Directory traversal vulnerability in payments/ideal_process.php in the iDEAL transaction handler in ViArt Shopping Cart allows remote attackers to have an unknown impact via directory traversal sequences in the filename parameter to the createCertFingerprint function. NOTE: this issue is disputed by CVE because PHP encounters a fatal function-call error on a direct request for payments/ideal_process.php ** IMPUGNADA ** Vulnerabilidad de salto de directorio en payments/ideal_process.php en el manejador de transacciones iDEAL de ViArt Shopping Cart permite a atacantes remotos tener un impacto desconocido mediante secuencias de salto de directorio en el parámetro filename de la función createCertFingerprint. NOTA: CVE niega este problema porque PHP encuentra un error fatal de llamada a función en una petición directa de payments/ideal_process.php. • http://securityreason.com/securityalert/3212 http://www.securityfocus.com/archive/1/481658/100/0/threaded http://www.securityfocus.com/archive/1/481848 http://www.securityfocus.com/bid/25998 • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •

CVSS: 2.6EPSS: 0%CPEs: 1EXPL: 0

Multiple cross-site scripting (XSS) vulnerabilities in ViArt Shop Free 2.5.5, and possibly other distributions including Light, Standard, and Enterprise, allow remote attackers to inject arbitrary web script or HTML via the (1) forum_id parameter in forum.php, which is not properly handled in block_forum_topics.php, and (2) item_id parameter in reviews.php, which is not properly handled in block_reviews.php. • http://secunia.com/advisories/20538 http://securityreason.com/securityalert/1087 http://www.attrition.org/pipermail/vim/2006-June/000846.html http://www.codetosell.com/downloads/xss_fix.zip http://www.securityfocus.com/archive/1/436415/100/0/threaded http://www.securityfocus.com/bid/18369 http://www.vupen.com/english/advisories/2006/2253 https://exchange.xforce.ibmcloud.com/vulnerabilities/27112 •

CVSS: 7.5EPSS: 0%CPEs: 3EXPL: 0

SQL injection vulnerability in block_forum_topic_new.php in ViArt Shop Free 2.5.5, and possibly other distributions including Light, Standard, and Enterprise, might allow remote attackers to execute arbitrary SQL commands via unknown vectors, probably involving the forum_id parameter. • http://www.attrition.org/pipermail/vim/2006-June/000846.html http://www.codetosell.com/downloads/xss_fix.zip https://exchange.xforce.ibmcloud.com/vulnerabilities/27684 •