2 results (0.003 seconds)

CVSS: 4.3EPSS: 0%CPEs: 2EXPL: 7

Multiple cross-site scripting (XSS) vulnerabilities in ViArt Helpdesk 3.x allow remote attackers to inject arbitrary web script or HTML via the category_id parameter to (1) products.php, (2) article.php, (3) product_details.php, or (4) reviews.php; the (5) forum_id parameter to forum.php; or the (6) search_category_id parameter to products_search.php. Múltiples vulnerabilidades de secuencias de comandos en sitios cruzados (XSS) en ViArt Helpdesk v3.x permite a atacantes remotos inyectar secuencias de comandos web o HTML a través de el parámetro category_id a (1) products.php, (2) article.php, (3) product_details.php, o (4) reviews.php; the (5) el parámetro forum_id a forum.php; o (6) el parámetro search_category_id a products_search.php. • https://www.exploit-db.com/exploits/34495 https://www.exploit-db.com/exploits/34499 https://www.exploit-db.com/exploits/34498 https://www.exploit-db.com/exploits/34494 https://www.exploit-db.com/exploits/34496 https://www.exploit-db.com/exploits/34497 http://osvdb.org/56877 http://osvdb.org/56878 http://osvdb.org/56879 http://osvdb.org/56880 http://osvdb.org/56881 http://osvdb.org/56882 http://packetstormsecurity.org/0908-exploits/viarthd-xss.txt htt • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 6.8EPSS: 8%CPEs: 4EXPL: 2

PHP remote file inclusion vulnerability in blocks/block_site_map.php in ViArt (1) CMS 3.3.2, (2) HelpDesk 3.3.2, (3) Shop Evaluation 3.3.2, and (4) Shop Free 3.3.2 allows remote attackers to execute arbitrary PHP code via a URL in the root_folder_path parameter. NOTE: some of these details are obtained from third party information. Vulnerabilidad de inclusión remota de archivo en PHP en blocks/block_site_map.php de ViArt (1) CMS 3.3.2, (2) HelpDesk 3.3.2, (3) Shop Evaluation 3.3.2, y (4) Shop Free 3.3.2 permite a atacantes remotos ejecutar código PHP de su elección mediante un URL en el parámetro root_folder_path. NOTA: algunos de estos detalles se han obtenido de información de terceros. • https://www.exploit-db.com/exploits/4722 http://osvdb.org/42628 http://secunia.com/advisories/28066 http://www.securityfocus.com/bid/26828 http://www.vupen.com/english/advisories/2007/4207 https://exchange.xforce.ibmcloud.com/vulnerabilities/38993 • CWE-94: Improper Control of Generation of Code ('Code Injection') •