Page 7 of 36 results (0.014 seconds)

CVSS: 5.8EPSS: 0%CPEs: 2EXPL: 1

The PayPal Pro PayFlow EC module in osCommerce does not verify that the server hostname matches a domain name in the subject's Common Name (CN) or subjectAltName field of the X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via an arbitrary valid certificate. El módulo PayPal Pro PayFlow EC en osCommerce no comprueba si el nombre del servidor coincide con un nombre de dominio en el Common Name (CN) del asunto o el campo subjectAltName del certificado X.509, lo que permite a atacantes man-in-the-middle falsificar servidores SSL a través de un certificado válido de su elección. • http://www.cs.utexas.edu/~shmat/shmat_ccs12.pdf • CWE-20: Improper Input Validation •

CVSS: 5.8EPSS: 0%CPEs: 1EXPL: 1

PayPal Payments Standard PHP Library 20120427 does not verify that the server hostname matches a domain name in the subject's Common Name (CN) or subjectAltName field of the X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via an arbitrary valid certificate, related to misinterpretation of a certain TRUE value. La librería PHP PayPal Payments Standard 20120427 no comprueba si el nombre del servidor coincide con un nombre de dominio en el Common Name (CN) del asunto o el campo subjectAltName del certificado X.509, lo que permite a atacantes man-in-the-middle falsificar servidores SSL a través de un certificado válido arbitrario, relacionado con la mala interpretación de un determinado valor TRUE. • http://www.cs.utexas.edu/~shmat/shmat_ccs12.pdf https://exchange.xforce.ibmcloud.com/vulnerabilities/79981 • CWE-20: Improper Input Validation •

CVSS: 5.0EPSS: 0%CPEs: 5EXPL: 0

The PayPal (aka MODULE_PAYMENT_PAYPAL_STANDARD) module before 1.1 in osCommerce Online Merchant before 2.3.4 allows remote attackers to set the payment recipient via a modified value of the merchant's e-mail address, as demonstrated by setting the recipient to one's self. El módulo PayPal (también conocido como MODULE_PAYMENT_PAYPAL_STANDARD)anterior a v1.1 en osCommerce Online Merchant anteriores a v2.3.4 permite a atacantes remotos, fijar el receptor de pago a través de un valor modificado en la dirección de correo electrónico del comerciante, como se demostró fijando el valor del receptor a uno mismo. • http://secunia.com/advisories/50640 http://www.kb.cert.org/vuls/id/459446 •

CVSS: 5.0EPSS: 0%CPEs: 2EXPL: 0

The Ubercart Payflow module for Drupal does not use a secure token, which allows remote attackers to forge payments via unspecified vectors. El módulo Payflow Ubercart para Drupal no utiliza un token seguro, lo que permite a atacantes remotos falsificar pagos a través de vectores no especificados. • http://drupal.org/node/1482126 http://www.openwall.com/lists/oss-security/2012/04/07/1 http://www.securityfocus.com/bid/52502 https://exchange.xforce.ibmcloud.com/vulnerabilities/74055 • CWE-264: Permissions, Privileges, and Access Controls •

CVSS: 3.6EPSS: 0%CPEs: 1EXPL: 0

Dave Nielsen and Patrick Breitenbach PayPal Web Services (aka PHP Toolkit) 0.50 and possibly earlier has (1) world-readable permissions for ipn/logs/ipn_success.txt, which allows local users to view sensitive information (payment data), and (2) world-writable permissions for ipn/logs, which allows local users to delete or replace payment data. • http://secunia.com/advisories/18444 http://www.osvdb.org/22379 http://www.securityfocus.com/archive/1/421739 http://www.securityfocus.com/bid/16218 http://www.uinc.ru/articles/vuln/ptpaypal050.shtml http://www.vupen.com/english/advisories/2006/0183 •