Page 7 of 37 results (0.003 seconds)

CVSS: 5.0EPSS: 2%CPEs: 1EXPL: 4

CubeCart 2.0.6 allows remote attackers to obtain sensitive information via an invalid (1) language parameter to index.php, (2) PHPSESSID parameter to index.php, (3) product parameter to tellafriend.php, (4) add parameter to view_cart.php, or (5) product parameter to view_product.php, which reveals the path in a PHP error message. • https://www.exploit-db.com/exploits/25355 https://www.exploit-db.com/exploits/25356 https://www.exploit-db.com/exploits/25357 https://www.exploit-db.com/exploits/25358 http://marc.info/?l=bugtraq&m=111281457918479&w=2 http://securitytracker.com/id?1013660 http://www.osvdb.org/14064 •

CVSS: 4.3EPSS: 0%CPEs: 5EXPL: 4

Cross-site scripting (XSS) vulnerability in settings.inc.php for CubeCart 2.0.0 through 2.0.5, as used in multiple PHP files, allows remote attackers to inject arbitrary HTML or web script via the (1) cat_id, (2) PHPSESSID, (3) view_doc, (4) product, (5) session, (6) catname, (7) search, or (8) page parameters. • https://www.exploit-db.com/exploits/25162 http://lostmon.blogspot.com/2005/02/cubecart-20x-multiple-variable-xss.html http://secunia.com/advisories/14416 http://securitytracker.com/id?1013304 http://www.cubecart.com/site/forums/index.php?showtopic=6032 http://www.securityfocus.com/bid/12658 https://exchange.xforce.ibmcloud.com/vulnerabilities/20637 •

CVSS: 5.0EPSS: 0%CPEs: 5EXPL: 0

CubeCart 2.0.0 through 2.0.5 allows remote attackers to determine the full path of the server via direct calls without parameters to (1) information.php, (2) language.php, (3) list_docs.php, (4) popular_prod.php, (5) sale.php, (6) subfooter.inc.php, (7) subheader.inc.php, (8) cat_navi.php, or (9) check_sum.php, which reveals the path in a PHP error message. • http://lostmon.blogspot.com/2005/02/cubecart-20x-multiple-variable-xss.html http://securitytracker.com/id?1013304 http://www.cubecart.com/site/forums/index.php?showtopic=6032 https://exchange.xforce.ibmcloud.com/vulnerabilities/20638 •

CVSS: 4.3EPSS: 0%CPEs: 2EXPL: 2

index.php in CubeCart 2.0.4 allows remote attackers to (1) obtain the full path for the web server or (2) conduct cross-site scripting (XSS) attacks via an invalid language parameter, which echoes the parameter in a PHP error message. • https://www.exploit-db.com/exploits/25097 http://marc.info/?l=bugtraq&m=110842125901191&w=2 http://www.cubecart.com/site/forums/index.php?showtopic=5741 http://www.osvdb.org/14064 http://www.securityfocus.com/bid/12549 https://exchange.xforce.ibmcloud.com/vulnerabilities/19328 •

CVSS: 5.0EPSS: 2%CPEs: 2EXPL: 2

Directory traversal vulnerability in index.php for CubeCart 2.0.4 allows remote attackers to read arbitrary files via the language parameter. • https://www.exploit-db.com/exploits/25098 http://marc.info/?l=bugtraq&m=110842125901191&w=2 http://marc.info/?l=bugtraq&m=111281888605580&w=2 http://secunia.com/advisories/14272 http://www.cubecart.com/site/forums/index.php?showtopic=5741 http://www.securityfocus.com/bid/12549 https://exchange.xforce.ibmcloud.com/vulnerabilities/19322 •