0day.today - Biggest Exploit Database in the World.
Things you should know about 0day.today:
Administration of this site uses the official contacts. Beware of impostors!
- We use one main domain: http://0day.today
- Most of the materials is completely FREE
- If you want to purchase the exploit / get V.I.P. access or pay for any other service,
you need to buy or earn GOLD
Administration of this site uses the official contacts. Beware of impostors!
We DO NOT use Telegram or any messengers / social networks!
Please, beware of scammers!
Please, beware of scammers!
- Read the [ agreement ]
- Read the [ Submit ] rules
- Visit the [ faq ] page
- [ Register ] profile
- Get [ GOLD ]
- If you want to [ sell ]
- If you want to [ buy ]
- If you lost [ Account ]
- Any questions [ admin@0day.today ]
- Authorisation page
- Registration page
- Restore account page
- FAQ page
- Contacts page
- Publishing rules
- Agreement page
Mail:
Facebook:
Twitter:
Telegram:
We DO NOT use Telegram or any messengers / social networks!
You can contact us by:
Mail:
Facebook:
Twitter:
Telegram:
We DO NOT use Telegram or any messengers / social networks!
ViArt SHOP 4.0.5 Multiple Vulnerabilities
========================================= ViArt SHOP 4.0.5 Multiple Vulnerabilities ========================================= # Title: [ViArt SHOP multiple vulnerabilities] # Date: [18.11.2010] # Author: [Ariko-Security] # Software Link: [http://www.viart.com] # Version: [4.0.5] ============ { Ariko-Security - Advisory #2/11/2010 } ============= ViArt SHOP multiple vulnerabilities Vendor's Description of Software and demo: # http://demo-shop.viart.com/ & http://www.viart.com Dork: # N/A Application Info: # ViArt SHOP # version last 4.0.5 Vulnerability Info: # Type: multiple SQL injections, multiple XSS, multiple iFrame injections, multiple link injections , redirector abuse. Time Table: # 10/11/2010 - Vendor notified. # 18/11/2010 - Vendor released fix (partial) Fix: # http://www.viart.com/update_logic_to_increase_site_security_and_fix_xss-compatibility_issues.html SQL injections: Input passed via the "rnd" parameter to products_search.php is not properly sanitised before being used in a SQL query. Input passed via the "filter" parameter to products.php is not properly sanitised before being used in a SQL query. XSS, iFrame Injections, Link injections: Input passed to the "search_category_id" and "category_id" parameters in ads.php is not properly sanitised before being returned to the user. Input passed to the "category_id" parameter in article.php and articles.php is not properly sanitised before being returned to the user. Input passed to the "rp" parameter in basket.php and product_details.php is not properly sanitised before being returned to the user. Input passed to the "postal_code" parameter in shipping_calculator.php is not properly sanitised before being returned to the user. Input passed to the "s_fds" , "s_tit" ,"s_cod" parameters in search.php is not properly sanitised before being returned to the user. Input passed to the "s_sds" parameter in ads_search.php is not properly sanitised before being returned to the user. URL redirector ABUSE: user_profile.php vulnerable parameter "return_page" Solution: # Input validation of all vulnerable parameters should be corrected. # 0day.today [2024-12-24] #