Vulnerabilities > Opencart
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2020-12-29 | CVE-2020-29471 | Cross-site Scripting vulnerability in Opencart 3.0.3.6 OpenCart 3.0.3.6 is affected by cross-site scripting (XSS) in the Profile Image. | 3.5 |
2020-12-29 | CVE-2020-29470 | Cross-site Scripting vulnerability in Opencart 3.0.3.6 OpenCart 3.0.3.6 is affected by cross-site scripting (XSS) in the Subject field of mail. | 3.5 |
2020-12-11 | CVE-2020-28838 | Cross-Site Request Forgery (CSRF) vulnerability in Opencart 3.0.3.6 Cross Site Request Forgery (CSRF) in CART option in OpenCart Ltd. | 3.5 |
2020-06-09 | CVE-2020-13980 | Cross-site Scripting vulnerability in Opencart 3.0.3.3 ** DISPUTED ** OpenCart 3.0.3.3 allows remote authenticated users to conduct XSS attacks via a crafted filename in the users' image upload section because of a lack of entity encoding. | 3.5 |
2020-03-17 | CVE-2020-10596 | Cross-site Scripting vulnerability in Opencart 3.0.3.2 OpenCart 3.0.3.2 allows remote authenticated users to conduct XSS attacks via a crafted filename in the users' image upload section. | 3.5 |
2019-08-15 | CVE-2019-15081 | Cross-site Scripting vulnerability in Opencart OpenCart 3.x, when the attacker has login access to the admin panel, allows stored XSS within the Source/HTML editing feature of the Categories, Product, and Information pages. | 3.5 |
2018-07-02 | CVE-2018-13067 | Cross-Site Request Forgery (CSRF) vulnerability in Opencart /upload/catalog/controller/account/password.php in OpenCart through 3.0.2.0 has CSRF via the index.php?route=account/password URI to change a user's password. | 6.8 |
2018-05-26 | CVE-2018-11495 | Path Traversal vulnerability in Opencart OpenCart through 3.0.2.0 allows directory traversal in the editDownload function in admin\model\catalog\download.php via admin/index.php?route=catalog/download/edit, related to the download_id. | 4.0 |
2018-05-26 | CVE-2018-11494 | Path Traversal vulnerability in Opencart The "program extension upload" feature in OpenCart through 3.0.2.0 has a six-step process (upload, install, unzip, move, xml, remove) that allows attackers to execute arbitrary code if the remove step is skipped, because the attacker can discover a secret temporary directory name (containing 10 random digits) via a directory traversal attack involving language_info['code']. | 6.0 |
2018-03-20 | CVE-2014-3990 | Server-Side Request Forgery (SSRF) vulnerability in Opencart The Cart::getProducts method in system/library/cart.php in OpenCart 1.5.6.4 and earlier allows remote attackers to conduct server-side request forgery (SSRF) attacks or possibly conduct XML External Entity (XXE) attacks and execute arbitrary code via a crafted serialized PHP object, related to the quantity parameter in an update request. | 7.5 |