CVE-2009-4548 – ViArt Helpdesk - 'article.php?category_id' Cross-Site Scripting
https://notcve.org/view.php?id=CVE-2009-4548
Multiple cross-site scripting (XSS) vulnerabilities in ViArt Helpdesk 3.x allow remote attackers to inject arbitrary web script or HTML via the category_id parameter to (1) products.php, (2) article.php, (3) product_details.php, or (4) reviews.php; the (5) forum_id parameter to forum.php; or the (6) search_category_id parameter to products_search.php. Múltiples vulnerabilidades de secuencias de comandos en sitios cruzados (XSS) en ViArt Helpdesk v3.x permite a atacantes remotos inyectar secuencias de comandos web o HTML a través de el parámetro category_id a (1) products.php, (2) article.php, (3) product_details.php, o (4) reviews.php; the (5) el parámetro forum_id a forum.php; o (6) el parámetro search_category_id a products_search.php. • https://www.exploit-db.com/exploits/34495 https://www.exploit-db.com/exploits/34499 https://www.exploit-db.com/exploits/34498 https://www.exploit-db.com/exploits/34494 https://www.exploit-db.com/exploits/34496 https://www.exploit-db.com/exploits/34497 http://osvdb.org/56877 http://osvdb.org/56878 http://osvdb.org/56879 http://osvdb.org/56880 http://osvdb.org/56881 http://osvdb.org/56882 http://packetstormsecurity.org/0908-exploits/viarthd-xss.txt htt • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •
CVE-2007-6347 – ViArt CMS/Shop/Helpdesk 3.3.2 - Remote File Inclusion
https://notcve.org/view.php?id=CVE-2007-6347
PHP remote file inclusion vulnerability in blocks/block_site_map.php in ViArt (1) CMS 3.3.2, (2) HelpDesk 3.3.2, (3) Shop Evaluation 3.3.2, and (4) Shop Free 3.3.2 allows remote attackers to execute arbitrary PHP code via a URL in the root_folder_path parameter. NOTE: some of these details are obtained from third party information. Vulnerabilidad de inclusión remota de archivo en PHP en blocks/block_site_map.php de ViArt (1) CMS 3.3.2, (2) HelpDesk 3.3.2, (3) Shop Evaluation 3.3.2, y (4) Shop Free 3.3.2 permite a atacantes remotos ejecutar código PHP de su elección mediante un URL en el parámetro root_folder_path. NOTA: algunos de estos detalles se han obtenido de información de terceros. • https://www.exploit-db.com/exploits/4722 http://osvdb.org/42628 http://secunia.com/advisories/28066 http://www.securityfocus.com/bid/26828 http://www.vupen.com/english/advisories/2007/4207 https://exchange.xforce.ibmcloud.com/vulnerabilities/38993 • CWE-94: Improper Control of Generation of Code ('Code Injection') •