Page 4 of 37 results (0.011 seconds)

CVSS: 7.5EPSS: 6%CPEs: 1EXPL: 4

classes/session/cc_admin_session.php in CubeCart 4.3.4 does not properly restrict administrative access permissions, which allows remote attackers to bypass restrictions and gain administrative access via a HTTP request that contains an empty (1) sessID (ccAdmin cookie), (2) X_CLUSTER_CLIENT_IP header, or (3) User-Agent header. classes/session/cc_admin_session.php en CubeCart v4.3.4 no maneja adecuadamente las restricciones de permiso de acceso administrativo, permitiendo a atacantes remotos saltar las restricciones y obtener acceso administrativo mediante una petición HTTP que contenga un (1) sessID (ccAdmin cookie), (2) una cabecera X_CLUSTER_CLIENT_IP , o (3) una cabecera User-Agent vacios. • https://www.exploit-db.com/exploits/9875 http://forums.cubecart.com/index.php?showtopic=39691?read=1 http://forums.cubecart.com/index.php?showtopic=39748 http://secunia.com/advisories/37197 http://www.acunetix.com/blog/websecuritynews/cubecart-4-session-management-bypass-leads-to-administrator-access http://www.securityfocus.com/archive/1/507594/100/0/threaded http://www.securityfocus.com/bid/36882 http://www.securitytracker.com/id?1023120 http://www.vupen.com/english/advisories/2009/311 • CWE-264: Permissions, Privileges, and Access Controls •

CVSS: 4.3EPSS: 0%CPEs: 1EXPL: 0

Multiple cross-site scripting (XSS) vulnerabilities in index.php in CubeCart 4.2.1 allow remote attackers to inject arbitrary web script or HTML via (1) the _a parameter in a searchStr action and the (2) Submit parameter. Múltiples vulnerabilidades de tipo cross-site scripting (XSS) en el archivo index.php en CubeCart versión 4.2.1, permiten a los atacantes remotos inyectar script web o HTML arbitrario por medio de (1) el parámetro _a en una acción searchStr y el parámetro (2) Submit. • http://holisticinfosec.org/content/view/51/45 http://secunia.com/advisories/29532 http://www.securityfocus.com/bid/28452 https://exchange.xforce.ibmcloud.com/vulnerabilities/41559 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 7.5EPSS: 0%CPEs: 1EXPL: 0

Multiple SQL injection vulnerabilities in CubeCart 3.0.16 might allow remote attackers to execute arbitrary SQL commands via an unspecified parameter to cart.inc.php and certain other files in an include directory, related to missing sanitization of the $option variable and possibly cookie modification. Múltiples vulnerabilidades de inyección SQL en el CubeCart 3.0.16 pueden permitir a atacantes remotos ejecutar comandos SQL de su elección a través de parámetros sin especificar en el cart.inc.php y otros ficheros concretos en el directorio include, relacionada con la pérdida del saneamiento de la variable $option y, posiblemente, con la modificación de cookies. • http://osvdb.org/38100 http://securityreason.com/securityalert/2730 http://www.securityfocus.com/archive/1/469301/100/0/threaded http://www.securityfocus.com/bid/24100 https://exchange.xforce.ibmcloud.com/vulnerabilities/34460 •

CVSS: 5.0EPSS: 4%CPEs: 1EXPL: 0

Multiple CRLF injection vulnerabilities in Devellion CubeCart 3.0.15 allow remote attackers to inject arbitrary HTTP headers and conduct HTTP response splitting attacks via CRLF sequences in a cookie name beginning with "ccSID" to (1) cart.php or (2) index.php. Múltiples vulnerabilidades de inyección de retorno de carro y salto de línea (CRLF) en Devellion CubeCart 3.0.15 permite a atacantes remotos inyectar cabeceras HTTP de su elección y llevar a cabo ataques de ruptura de respuestas HTTP mediante secuencias CRLF en un nombre de una cookie que empieza con "ccSID" a (1) cart.php o (2) index.php. • http://osvdb.org/36209 http://osvdb.org/36210 http://securityreason.com/securityalert/2678 http://www.cubecart.com/site/forums/index.php?s=0cbaa8a2f26fc573d1fc888285f610b1&showtopic=27418 http://www.securityfocus.com/archive/1/467828/100/0/threaded http://www.securityfocus.com/archive/1/468053/100/0/threaded http://www.securityfocus.com/bid/23852 https://exchange.xforce.ibmcloud.com/vulnerabilities/34141 •

CVSS: 5.0EPSS: 0%CPEs: 7EXPL: 1

Devellion CubeCart 2.0.x allows remote attackers to obtain sensitive information via a direct request for (1) link_navi.php or (2) spotlight.php, which reveals the path in various error messages. NOTE: the information.php, language.php, list_docs.php, popular_prod.php, sale.php, check_sum.php, and cat_navi.php vectors are already covered by CVE-2005-0607. Devellion CubeCart 2.0.x permite a atacantes remotos obtener información sensible a través de la respuesta directa para (1) link_navi.php o (2) spotlight.php, lo cual revela el camino en varios mensajes de error, NOTA: los vectores information.php, language.php, list_docs.php, popular_prod.php, sale.php, check_sum.php, y cat_navi.php están actualmente cubiertos por CVE-2005-0607. • http://securityreason.com/securityalert/1662 http://www.securityfocus.com/archive/1/447009/100/0/threaded http://www.securityfocus.com/bid/20215 https://exchange.xforce.ibmcloud.com/vulnerabilities/29178 •