Page 3 of 20 results (0.003 seconds)

CVSS: 5.1EPSS: 7%CPEs: 1EXPL: 1

PHP remote file inclusion vulnerability in index.php in Zen Cart 1.3.0.2 and earlier, when register_globals is enabled, allows remote attackers to execute arbitrary PHP code via a URL in the autoLoadConfig[999][0][loadFile] parameter. Vulnerabilidad de inclusión remota de archivo en PHP en index.php en Zen Cart 1.3.0.2 y anteriores, cuando register_globals está activado, permite a atacantes remotos ejecutar código PHP de su elección mediante una URL en el parámetro autoLoadConfig[999][0][loadFile]. • https://www.exploit-db.com/exploits/28392 http://secunia.com/advisories/21484 http://www.gulftech.org/?node=research&article_id=00109-08152006 http://www.osvdb.org/28149 http://www.securityfocus.com/bid/19543 http://www.vupen.com/english/advisories/2006/3283 https://exchange.xforce.ibmcloud.com/vulnerabilities/28394 • CWE-94: Improper Control of Generation of Code ('Code Injection') •

CVSS: 5.0EPSS: 0%CPEs: 1EXPL: 0

index.php in Zen Cart 1.3.0.2 allows remote attackers to obtain sensitive information via empty (1) _GET[], (2) _SESSION[], (3) _POST[], (4) _COOKIE[], or (5) _SESSION[] array parameters, which reveals the installation path in an error message. NOTE: this issue might be resultant from a global overwrite vulnerability. index.php en Zen Cart 1.3.0.2 permite a atacantes remotos obtener información sensible a través de parámetros de array vacios (1) _GET[], (2) _SESSION[], (3) _POST[], (4) _COOKIE[], o (5) _SESSION[], los cuales revelan la ruta de instalación en un mensaje de error. NOTA: Este asunto sería el resultado de una vulnerabilidad global sobre-escrita. • http://securityreason.com/securityalert/1253 http://www.securityfocus.com/archive/1/438805/100/200/threaded •

CVSS: 7.5EPSS: 0%CPEs: 14EXPL: 0

SQL injection vulnerability in Zen Cart before 1.2.7 allows remote attackers to execute arbitrary SQL commands via unspecified vectors. • http://secunia.com/advisories/18801 http://sourceforge.net/project/shownotes.php?release_id=392886 http://www.osvdb.org/23110 http://www.vupen.com/english/advisories/2006/0546 https://exchange.xforce.ibmcloud.com/vulnerabilities/24701 •

CVSS: 10.0EPSS: 0%CPEs: 11EXPL: 0

Zen Cart before 1.2.7 does not protect the admin/includes directory, which allows remote attackers to cause unknown impact via unspecified vectors, probably direct requests. • http://secunia.com/advisories/18801 http://sourceforge.net/project/shownotes.php?release_id=392886 http://www.vupen.com/english/advisories/2006/0546 • CWE-264: Permissions, Privileges, and Access Controls •

CVSS: 10.0EPSS: 0%CPEs: 14EXPL: 0

Unspecified vulnerabilities in Zen Cart before 1.2.7 allow remote attackers to cause unknown impact via unspecified vectors related to "other attempted exploits" other than SQL injection. • http://secunia.com/advisories/18801 http://sourceforge.net/project/shownotes.php?release_id=392886 http://www.vupen.com/english/advisories/2006/0546 https://exchange.xforce.ibmcloud.com/vulnerabilities/24701 •