Search criteria

78 vulnerabilities found for ec-cube by lockon

FKIE_CVE-2018-0564

Vulnerability from fkie_nvd - Published: 2018-04-20 13:29 - Updated: 2024-11-21 03:38
Summary
Session fixation vulnerability in EC-CUBE (EC-CUBE 3.0.0, EC-CUBE 3.0.1, EC-CUBE 3.0.2, EC-CUBE 3.0.3, EC-CUBE 3..4, EC-CUBE 3.0.5, EC-CUBE 3.0.6, EC-CUBE 3.0.7, EC-CUBE 3.0.8, EC-CUBE 3.0.9, EC-CUBE 3.0.10, EC-CUBE 3.0.11, EC-CUBE 3.0.12, EC-CUBE 3.0.12-p1, EC-CUBE 3.0.13, EC-CUBE 3.0.14, EC-CUBE 3.0.15) allows remote attackers to perform arbitrary operations via unspecified vectors.
Impacted products
Vendor Product Version
lockon ec-cube *

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:lockon:ec-cube:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "66414F66-0514-4E2A-959B-4E0A991A2A25",
              "versionEndIncluding": "3.0.15",
              "versionStartIncluding": "3.0.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Session fixation vulnerability in EC-CUBE (EC-CUBE 3.0.0, EC-CUBE 3.0.1, EC-CUBE 3.0.2, EC-CUBE 3.0.3, EC-CUBE 3..4, EC-CUBE 3.0.5, EC-CUBE 3.0.6, EC-CUBE 3.0.7, EC-CUBE 3.0.8, EC-CUBE 3.0.9, EC-CUBE 3.0.10, EC-CUBE 3.0.11, EC-CUBE 3.0.12, EC-CUBE 3.0.12-p1, EC-CUBE 3.0.13, EC-CUBE 3.0.14, EC-CUBE 3.0.15) allows remote attackers to perform arbitrary operations via unspecified vectors."
    },
    {
      "lang": "es",
      "value": "Vulnerabilidad de fijaci\u00f3n de sesi\u00f3n en EC-CUBE (EC-CUBE 3.0.0, EC-CUBE 3.0.1, EC-CUBE 3.0.2, EC-CUBE 3.0.3, EC-CUBE 3..4, EC-CUBE 3.0.5, EC-CUBE 3.0.6, EC-CUBE 3.0.7, EC-CUBE 3.0.8, EC-CUBE 3.0.9, EC-CUBE 3.0.10, EC-CUBE 3.0.11, EC-CUBE 3.0.12, EC-CUBE 3.0.12-p1, EC-CUBE 3.0.13, EC-CUBE 3.0.14 y EC-CUBE 3.0.15) permite que atacantes remotos realicen operaciones arbitrarias mediante vectores sin especificar."
    }
  ],
  "id": "CVE-2018-0564",
  "lastModified": "2024-11-21T03:38:29.270",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 5.8,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 4.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": true
      }
    ],
    "cvssMetricV30": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "NONE",
          "baseScore": 8.1,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "REQUIRED",
          "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N",
          "version": "3.0"
        },
        "exploitabilityScore": 2.8,
        "impactScore": 5.2,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2018-04-20T13:29:00.260",
  "references": [
    {
      "source": "vultures@jpcert.or.jp",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://jvn.jp/en/jp/JVN52695336/index.html"
    },
    {
      "source": "vultures@jpcert.or.jp",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://www.ec-cube.net/info/weakness/20180416/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://jvn.jp/en/jp/JVN52695336/index.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://www.ec-cube.net/info/weakness/20180416/"
    }
  ],
  "sourceIdentifier": "vultures@jpcert.or.jp",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-384"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

FKIE_CVE-2016-1201

Vulnerability from fkie_nvd - Published: 2016-04-30 10:59 - Updated: 2025-04-12 10:46

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:lockon:ec-cube:3.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "CB551616-10D8-4EF4-9FA9-E7F5986E8627",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:lockon:ec-cube:3.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "C614924A-401D-484B-96AA-87D1C071D994",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:lockon:ec-cube:3.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "D7B27593-E73B-45C9-A1BF-A3CFF97F3850",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:lockon:ec-cube:3.0.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "9272BD35-622B-40BA-8A7E-C2BFED8831AA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:lockon:ec-cube:3.0.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "72BAC75E-415C-43A6-90DA-F8DCBE8B1749",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:lockon:ec-cube:3.0.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "74022ECE-0307-4FEE-B6E8-C575B106D6A1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:lockon:ec-cube:3.0.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "225965E9-0C6C-4F16-B0DB-73C7057E0DAB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:lockon:ec-cube:3.0.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "4260F22D-636C-47A6-8A4E-89FAC3085F16",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:lockon:ec-cube:3.0.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "0603E775-3E8D-458D-B2BD-8698F6BC32D9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:lockon:ec-cube:3.0.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "38A08F69-72BD-47DF-9EF3-E3DA80FAEBBD",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Cross-site request forgery (CSRF) vulnerability in LOCKON EC-CUBE 3.0.0 through 3.0.9 allows remote attackers to hijack the authentication of administrators."
    },
    {
      "lang": "es",
      "value": "Vulnerabilidad de CSRF en LOCKON EC-CUBE 3.0.0 hasta la versi\u00f3n 3.0.9 permite a atacantes remotos secuestrar la autenticaci\u00f3n de administradores."
    }
  ],
  "id": "CVE-2016-1201",
  "lastModified": "2025-04-12T10:46:40.837",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 6.8,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": true
      }
    ],
    "cvssMetricV30": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 8.8,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "REQUIRED",
          "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
          "version": "3.0"
        },
        "exploitabilityScore": 2.8,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2016-04-30T10:59:03.457",
  "references": [
    {
      "source": "vultures@jpcert.or.jp",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://jvn.jp/en/jp/JVN73776243/index.html"
    },
    {
      "source": "vultures@jpcert.or.jp",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2016-000053"
    },
    {
      "source": "vultures@jpcert.or.jp",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.ec-cube.net/info/weakness/weakness.php?id=67"
    },
    {
      "source": "vultures@jpcert.or.jp",
      "url": "http://www.securityfocus.com/bid/90515"
    },
    {
      "source": "vultures@jpcert.or.jp",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "https://www.ec-cube.net/info/weakness/201604/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://jvn.jp/en/jp/JVN73776243/index.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2016-000053"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.ec-cube.net/info/weakness/weakness.php?id=67"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/90515"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "https://www.ec-cube.net/info/weakness/201604/"
    }
  ],
  "sourceIdentifier": "vultures@jpcert.or.jp",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-352"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

FKIE_CVE-2016-1200

Vulnerability from fkie_nvd - Published: 2016-04-30 10:59 - Updated: 2025-04-12 10:46

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:lockon:ec-cube:3.0.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "4260F22D-636C-47A6-8A4E-89FAC3085F16",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:lockon:ec-cube:3.0.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "0603E775-3E8D-458D-B2BD-8698F6BC32D9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:lockon:ec-cube:3.0.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "38A08F69-72BD-47DF-9EF3-E3DA80FAEBBD",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "The management screen in LOCKON EC-CUBE 3.0.7 through 3.0.9 allows remote authenticated users to bypass intended access restrictions via unspecified vectors, a different vulnerability than CVE-2016-1199."
    },
    {
      "lang": "es",
      "value": "La pantalla de ajustes en LOCKON EC-CUBE 3.0.7 hasta la versi\u00f3n 3.0.9 permite a usuarios remotos autenticados eludir restricciones destinadas al acceso a trav\u00e9s de vectores no especificados, una vulnerabilidad diferente a CVE-2016-1199."
    }
  ],
  "id": "CVE-2016-1200",
  "lastModified": "2025-04-12T10:46:40.837",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "SINGLE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 6.5,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 8.0,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV30": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "LOW",
          "baseScore": 6.3,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "LOW",
          "integrityImpact": "LOW",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
          "version": "3.0"
        },
        "exploitabilityScore": 2.8,
        "impactScore": 3.4,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2016-04-30T10:59:02.270",
  "references": [
    {
      "source": "vultures@jpcert.or.jp",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://jvn.jp/en/jp/JVN11458774/index.html"
    },
    {
      "source": "vultures@jpcert.or.jp",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2016-000052"
    },
    {
      "source": "vultures@jpcert.or.jp",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.ec-cube.net/info/weakness/weakness.php?id=66"
    },
    {
      "source": "vultures@jpcert.or.jp",
      "url": "http://www.securityfocus.com/bid/90503"
    },
    {
      "source": "vultures@jpcert.or.jp",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "https://www.ec-cube.net/info/weakness/201604/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://jvn.jp/en/jp/JVN11458774/index.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2016-000052"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.ec-cube.net/info/weakness/weakness.php?id=66"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/90503"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "https://www.ec-cube.net/info/weakness/201604/"
    }
  ],
  "sourceIdentifier": "vultures@jpcert.or.jp",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-284"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

FKIE_CVE-2016-1199

Vulnerability from fkie_nvd - Published: 2016-04-30 10:59 - Updated: 2025-04-12 10:46
Summary
The login page in the management screen in LOCKON EC-CUBE 3.0.0 through 3.0.9 allows remote attackers to bypass intended IP address restrictions via unspecified vectors, a different vulnerability than CVE-2016-1200.
Impacted products
Vendor Product Version
lockon ec-cube 3.0.0
lockon ec-cube 3.0.1
lockon ec-cube 3.0.2
lockon ec-cube 3.0.3
lockon ec-cube 3.0.4
lockon ec-cube 3.0.5
lockon ec-cube 3.0.6
lockon ec-cube 3.0.7
lockon ec-cube 3.0.8
lockon ec-cube 3.0.9

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:lockon:ec-cube:3.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "CB551616-10D8-4EF4-9FA9-E7F5986E8627",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:lockon:ec-cube:3.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "C614924A-401D-484B-96AA-87D1C071D994",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:lockon:ec-cube:3.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "D7B27593-E73B-45C9-A1BF-A3CFF97F3850",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:lockon:ec-cube:3.0.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "9272BD35-622B-40BA-8A7E-C2BFED8831AA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:lockon:ec-cube:3.0.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "72BAC75E-415C-43A6-90DA-F8DCBE8B1749",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:lockon:ec-cube:3.0.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "74022ECE-0307-4FEE-B6E8-C575B106D6A1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:lockon:ec-cube:3.0.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "225965E9-0C6C-4F16-B0DB-73C7057E0DAB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:lockon:ec-cube:3.0.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "4260F22D-636C-47A6-8A4E-89FAC3085F16",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:lockon:ec-cube:3.0.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "0603E775-3E8D-458D-B2BD-8698F6BC32D9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:lockon:ec-cube:3.0.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "38A08F69-72BD-47DF-9EF3-E3DA80FAEBBD",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "The login page in the management screen in LOCKON EC-CUBE 3.0.0 through 3.0.9 allows remote attackers to bypass intended IP address restrictions via unspecified vectors, a different vulnerability than CVE-2016-1200."
    },
    {
      "lang": "es",
      "value": "La p\u00e1gina de inicio de sesi\u00f3n en la pantalla de administraci\u00f3n en LOCKON EC-CUBE 3.0.0 hasta la versi\u00f3n 3.0.9 permite a atacantes remotos eludir restricciones destinadas a direcciones IP a trav\u00e9s de vectores no especificados, una vulnerabilidad diferente a CVE-2016-1200."
    }
  ],
  "id": "CVE-2016-1199",
  "lastModified": "2025-04-12T10:46:40.837",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 5.0,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV30": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "NONE",
          "baseScore": 5.3,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "LOW",
          "integrityImpact": "NONE",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
          "version": "3.0"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 1.4,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2016-04-30T10:59:01.160",
  "references": [
    {
      "source": "vultures@jpcert.or.jp",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://jvn.jp/en/jp/JVN47473944/index.html"
    },
    {
      "source": "vultures@jpcert.or.jp",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2016-000051"
    },
    {
      "source": "vultures@jpcert.or.jp",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.ec-cube.net/info/weakness/weakness.php?id=65"
    },
    {
      "source": "vultures@jpcert.or.jp",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "https://www.ec-cube.net/info/weakness/201604/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://jvn.jp/en/jp/JVN47473944/index.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2016-000051"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.ec-cube.net/info/weakness/weakness.php?id=65"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "https://www.ec-cube.net/info/weakness/201604/"
    }
  ],
  "sourceIdentifier": "vultures@jpcert.or.jp",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-200"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

FKIE_CVE-2015-5665

Vulnerability from fkie_nvd - Published: 2015-10-27 02:59 - Updated: 2025-04-12 10:46
Severity ?
Summary
Cross-site request forgery (CSRF) vulnerability in LOCKON EC-CUBE 2.11.0 through 2.13.3 allows remote attackers to hijack the authentication of arbitrary users for requests that write to PHP scripts, related to the doValidToken function.
Impacted products
Vendor Product Version
lockon ec-cube 2.11.0
lockon ec-cube 2.11.1
lockon ec-cube 2.11.2
lockon ec-cube 2.11.3
lockon ec-cube 2.11.4
lockon ec-cube 2.11.5
lockon ec-cube 2.12.0
lockon ec-cube 2.12.1
lockon ec-cube 2.12.2
lockon ec-cube 2.12.3
lockon ec-cube 2.12.5
lockon ec-cube 2.12.6
lockon ec-cube 2.13.0
lockon ec-cube 2.13.1
lockon ec-cube 2.13.2

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:lockon:ec-cube:2.11.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "E37E68F4-EC08-4A33-8CD2-9B854E51A6E4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:lockon:ec-cube:2.11.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "AC0C6C78-3FD3-4AA3-95B0-CF798396E802",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:lockon:ec-cube:2.11.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "933ADEC5-451B-4DAA-AB23-7CD8A9A64954",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:lockon:ec-cube:2.11.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "3EFDD02C-56D4-480E-8FF3-E4B63554CB26",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:lockon:ec-cube:2.11.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "1C4BC181-D123-460C-9BF8-6B8FB800697C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:lockon:ec-cube:2.11.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "8C40A7B5-639C-4390-B91E-BEC404B5ED1B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:lockon:ec-cube:2.12.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "2D261CC2-F7E5-437E-884B-D25C72F939C6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:lockon:ec-cube:2.12.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "CA1710AF-A87A-4970-BF19-481040A7524A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:lockon:ec-cube:2.12.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "7C72DED8-1073-47A9-B089-84E3ABC96401",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:lockon:ec-cube:2.12.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "6E3D5763-00DB-4F7E-AA08-1A2AA3070B5D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:lockon:ec-cube:2.12.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "930A679D-FC06-439E-B028-1F8658FC0B73",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:lockon:ec-cube:2.12.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "8417F3B8-1A43-40DE-A429-FB29FD543FB3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:lockon:ec-cube:2.13.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "C0D9BFC7-D797-4461-870E-CF67DD28629E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:lockon:ec-cube:2.13.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "03C4728A-F728-4BBC-9998-3421070E18FB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:lockon:ec-cube:2.13.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "5C0D26FD-61EA-4D17-BE57-E70BA443F90B",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Cross-site request forgery (CSRF) vulnerability in LOCKON EC-CUBE 2.11.0 through 2.13.3 allows remote attackers to hijack the authentication of arbitrary users for requests that write to PHP scripts, related to the doValidToken function."
    },
    {
      "lang": "es",
      "value": "Vulnerabilidad de CSRF en LOCKON EC-CUBE 2.11.0 hasta la versi\u00f3n 2.13.3 permite a atacantes remotos secuestrar la autenticaci\u00f3n de usuarios arbitrarios en peticiones que escriben en scripts PHP, relacionada con la funci\u00f3n doValidToken."
    }
  ],
  "id": "CVE-2015-5665",
  "lastModified": "2025-04-12T10:46:40.837",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "HIGH",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 5.1,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 4.9,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2015-10-27T02:59:00.103",
  "references": [
    {
      "source": "vultures@jpcert.or.jp",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://jvn.jp/en/jp/JVN97278546/index.html"
    },
    {
      "source": "vultures@jpcert.or.jp",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2015-000166"
    },
    {
      "source": "vultures@jpcert.or.jp",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.ec-cube.net/info/weakness/weakness.php?id=63"
    },
    {
      "source": "vultures@jpcert.or.jp",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.ec-cube.net/info/weakness/201510_01/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://jvn.jp/en/jp/JVN97278546/index.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2015-000166"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.ec-cube.net/info/weakness/weakness.php?id=63"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.ec-cube.net/info/weakness/201510_01/"
    }
  ],
  "sourceIdentifier": "vultures@jpcert.or.jp",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-352"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

FKIE_CVE-2014-0807

Vulnerability from fkie_nvd - Published: 2014-01-22 21:55 - Updated: 2025-04-11 00:51
Severity ?
Summary
data/class/pages/shopping/LC_Page_Shopping_Deliv.php in LOCKON EC-CUBE 2.4.4 and earlier, and 2.11.0 through 2.12.2, allows remote attackers to modify data via unspecified vectors.
Impacted products
Vendor Product Version
lockon ec-cube *
lockon ec-cube 2.4.0
lockon ec-cube 2.4.0
lockon ec-cube 2.4.1
lockon ec-cube 2.4.2
lockon ec-cube 2.4.3
lockon ec-cube 2.11.0
lockon ec-cube 2.11.0
lockon ec-cube 2.11.0
lockon ec-cube 2.11.1
lockon ec-cube 2.11.2
lockon ec-cube 2.11.3
lockon ec-cube 2.11.4
lockon ec-cube 2.11.5
lockon ec-cube 2.12.0
lockon ec-cube 2.12.1
lockon ec-cube 2.12.2

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:lockon:ec-cube:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "AA9F06AA-3D2A-41B1-91DF-B19F0AEBE660",
              "versionEndIncluding": "2.4.4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:lockon:ec-cube:2.4.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "FF341A1B-2FFF-46B1-82E5-883681F3467C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:lockon:ec-cube:2.4.0:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "54999245-399B-4535-8F2C-1F19CB06A053",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:lockon:ec-cube:2.4.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "A7FEF399-9399-4F4D-B866-763695F09ADA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:lockon:ec-cube:2.4.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "2194828B-243E-49A2-8D71-B61B6C440FF3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:lockon:ec-cube:2.4.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "34B1FC17-8F5F-4B35-AB42-01A77BB87EC4",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:lockon:ec-cube:2.11.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "E37E68F4-EC08-4A33-8CD2-9B854E51A6E4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:lockon:ec-cube:2.11.0:beta:*:*:*:*:*:*",
              "matchCriteriaId": "8A85840E-73A5-411D-912A-A1CEA7852904",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:lockon:ec-cube:2.11.0:beta2:*:*:*:*:*:*",
              "matchCriteriaId": "C34FB238-1A64-4CBB-AAF6-FDE6BA90A096",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:lockon:ec-cube:2.11.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "AC0C6C78-3FD3-4AA3-95B0-CF798396E802",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:lockon:ec-cube:2.11.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "933ADEC5-451B-4DAA-AB23-7CD8A9A64954",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:lockon:ec-cube:2.11.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "3EFDD02C-56D4-480E-8FF3-E4B63554CB26",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:lockon:ec-cube:2.11.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "1C4BC181-D123-460C-9BF8-6B8FB800697C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:lockon:ec-cube:2.11.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "8C40A7B5-639C-4390-B91E-BEC404B5ED1B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:lockon:ec-cube:2.12.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "2D261CC2-F7E5-437E-884B-D25C72F939C6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:lockon:ec-cube:2.12.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "CA1710AF-A87A-4970-BF19-481040A7524A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:lockon:ec-cube:2.12.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "7C72DED8-1073-47A9-B089-84E3ABC96401",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "data/class/pages/shopping/LC_Page_Shopping_Deliv.php in LOCKON EC-CUBE 2.4.4 and earlier, and 2.11.0 through 2.12.2, allows remote attackers to modify data via unspecified vectors."
    },
    {
      "lang": "es",
      "value": "data/class/pages/shopping/LC_Page_Shopping_Deliv.php en LOCKON EC-CUBE 2.4.4 y anteriores versiones, y 2.11.0 hasta la versi\u00f3n 2.12.2, permite a atacantes remotos modificar datos a trav\u00e9s de vectores sin especificar."
    }
  ],
  "id": "CVE-2014-0807",
  "lastModified": "2025-04-11T00:51:21.963",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 6.4,
          "confidentialityImpact": "NONE",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 4.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2014-01-22T21:55:03.683",
  "references": [
    {
      "source": "vultures@jpcert.or.jp",
      "url": "http://jvn.jp/en/jp/JVN17849447/index.html"
    },
    {
      "source": "vultures@jpcert.or.jp",
      "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2014-000005"
    },
    {
      "source": "vultures@jpcert.or.jp",
      "tags": [
        "Exploit",
        "Vendor Advisory"
      ],
      "url": "http://www.ec-cube.net/info/weakness/weakness.php?id=56"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://jvn.jp/en/jp/JVN17849447/index.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2014-000005"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit",
        "Vendor Advisory"
      ],
      "url": "http://www.ec-cube.net/info/weakness/weakness.php?id=56"
    }
  ],
  "sourceIdentifier": "vultures@jpcert.or.jp",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-noinfo"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

FKIE_CVE-2014-0808

Vulnerability from fkie_nvd - Published: 2014-01-22 21:55 - Updated: 2025-04-11 00:51
Severity ?
Summary
Authorization bypass through user-controlled key issue exists in EC-CUBE 2.11.0 through 2.12.2 and EC-Orange systems deployed before June 29th, 2015. If this vulnerability is exploited, a user of the affected shopping website may obtain other users' information by sending a crafted HTTP request.
Impacted products
Vendor Product Version
lockon ec-cube 2.11.0
lockon ec-cube 2.11.0
lockon ec-cube 2.11.0
lockon ec-cube 2.11.1
lockon ec-cube 2.11.2
lockon ec-cube 2.11.3
lockon ec-cube 2.11.4
lockon ec-cube 2.11.5
lockon ec-cube 2.12.0
lockon ec-cube 2.12.1
lockon ec-cube 2.12.2

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:lockon:ec-cube:2.11.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "E37E68F4-EC08-4A33-8CD2-9B854E51A6E4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:lockon:ec-cube:2.11.0:beta:*:*:*:*:*:*",
              "matchCriteriaId": "8A85840E-73A5-411D-912A-A1CEA7852904",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:lockon:ec-cube:2.11.0:beta2:*:*:*:*:*:*",
              "matchCriteriaId": "C34FB238-1A64-4CBB-AAF6-FDE6BA90A096",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:lockon:ec-cube:2.11.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "AC0C6C78-3FD3-4AA3-95B0-CF798396E802",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:lockon:ec-cube:2.11.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "933ADEC5-451B-4DAA-AB23-7CD8A9A64954",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:lockon:ec-cube:2.11.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "3EFDD02C-56D4-480E-8FF3-E4B63554CB26",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:lockon:ec-cube:2.11.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "1C4BC181-D123-460C-9BF8-6B8FB800697C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:lockon:ec-cube:2.11.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "8C40A7B5-639C-4390-B91E-BEC404B5ED1B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:lockon:ec-cube:2.12.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "2D261CC2-F7E5-437E-884B-D25C72F939C6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:lockon:ec-cube:2.12.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "CA1710AF-A87A-4970-BF19-481040A7524A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:lockon:ec-cube:2.12.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "7C72DED8-1073-47A9-B089-84E3ABC96401",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Authorization bypass through user-controlled key issue exists in EC-CUBE 2.11.0 through 2.12.2 and EC-Orange systems deployed before June 29th, 2015. If this vulnerability is exploited, a user of the affected shopping website may obtain other users\u0027 information by sending a crafted HTTP request."
    },
    {
      "lang": "es",
      "value": "La funci\u00f3n IfCheckError en data/class/pages/shopping/LC_Page_Shopping_Multiple.php de LOCKON EC-CUBE 2.11.0 hasta la versi\u00f3n 2.12.2 permite a atacantes remotos obtener informaci\u00f3n de env\u00edo sensible a trav\u00e9s de vectores no especificados."
    }
  ],
  "id": "CVE-2014-0808",
  "lastModified": "2025-04-11T00:51:21.963",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 5.0,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "NONE",
          "baseScore": 9.1,
          "baseSeverity": "CRITICAL",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 5.2,
        "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
        "type": "Secondary"
      }
    ]
  },
  "published": "2014-01-22T21:55:03.717",
  "references": [
    {
      "source": "vultures@jpcert.or.jp",
      "url": "http://jvn.jp/en/jp/JVN51770585/"
    },
    {
      "source": "vultures@jpcert.or.jp",
      "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2014-000006"
    },
    {
      "source": "vultures@jpcert.or.jp",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.ec-cube.net/info/weakness/weakness.php?id=57"
    },
    {
      "source": "vultures@jpcert.or.jp",
      "url": "https://ec-orange.jp/"
    },
    {
      "source": "vultures@jpcert.or.jp",
      "url": "https://jvn.jp/en/jp/JVN15637138/"
    },
    {
      "source": "vultures@jpcert.or.jp",
      "url": "https://jvndb.jvn.jp/jvndb/JVNDB-2024-000054"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://jvn.jp/en/jp/JVN51770585/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2014-000006"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.ec-cube.net/info/weakness/weakness.php?id=57"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://ec-orange.jp/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://jvn.jp/en/jp/JVN15637138/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://jvndb.jvn.jp/jvndb/JVNDB-2024-000054"
    }
  ],
  "sourceIdentifier": "vultures@jpcert.or.jp",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-noinfo"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-566"
        }
      ],
      "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
      "type": "Secondary"
    }
  ]
}

FKIE_CVE-2013-5994

Vulnerability from fkie_nvd - Published: 2013-11-21 04:40 - Updated: 2025-04-11 00:51

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:lockon:ec-cube:2.11.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "933ADEC5-451B-4DAA-AB23-7CD8A9A64954",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:lockon:ec-cube:2.11.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "3EFDD02C-56D4-480E-8FF3-E4B63554CB26",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:lockon:ec-cube:2.11.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "1C4BC181-D123-460C-9BF8-6B8FB800697C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:lockon:ec-cube:2.11.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "8C40A7B5-639C-4390-B91E-BEC404B5ED1B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:lockon:ec-cube:2.12.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "2D261CC2-F7E5-437E-884B-D25C72F939C6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:lockon:ec-cube:2.12.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "CA1710AF-A87A-4970-BF19-481040A7524A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:lockon:ec-cube:2.12.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "7C72DED8-1073-47A9-B089-84E3ABC96401",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:lockon:ec-cube:2.12.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "6E3D5763-00DB-4F7E-AA08-1A2AA3070B5D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:lockon:ec-cube:2.12.3en:*:*:*:*:*:*:*",
              "matchCriteriaId": "95D2187D-3860-4432-9646-8F0DE41F3168",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:lockon:ec-cube:2.12.3enp1:*:*:*:*:*:*:*",
              "matchCriteriaId": "8FF41053-E778-4000-9BE5-3F538A78AA41",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:lockon:ec-cube:2.12.3enp2:*:*:*:*:*:*:*",
              "matchCriteriaId": "3E213BA2-5D21-4A58-8E32-1168A9108C94",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:lockon:ec-cube:2.12.4en:*:*:*:*:*:*:*",
              "matchCriteriaId": "C84115A8-8F65-4E6D-B77E-C14F83E5FB7F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:lockon:ec-cube:2.12.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "930A679D-FC06-439E-B028-1F8658FC0B73",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:lockon:ec-cube:2.12.5en:*:*:*:*:*:*:*",
              "matchCriteriaId": "AE0D2972-74A9-45FE-BE17-DEDD24A8B704",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:lockon:ec-cube:2.12.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "8417F3B8-1A43-40DE-A429-FB29FD543FB3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:lockon:ec-cube:2.12.6en:*:*:*:*:*:*:*",
              "matchCriteriaId": "CD60B565-5AEA-4CFA-807D-7BE1BF2CAB9D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:lockon:ec-cube:2.13.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "C0D9BFC7-D797-4461-870E-CF67DD28629E",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "data/class/pages/mypage/LC_Page_Mypage_DeliveryAddr.php in LOCKON EC-CUBE 2.11.2 through 2.13.0 allows remote attackers to obtain sensitive information via a direct request, which reveals the full path in an error message."
    },
    {
      "lang": "es",
      "value": "data/class/pages/mypage/LC_Page_Mypage_DeliveryAddr.php en LOCKON EC-CUBE 2.11.2 hasta la versi\u00f3n 2.13.0 permite a atacantes remotos obtener informaci\u00f3n sensible a trav\u00e9s de peticiones directas, lo que revela la ruta de directorio en un mensaje de error."
    }
  ],
  "id": "CVE-2013-5994",
  "lastModified": "2025-04-11T00:51:21.963",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 5.0,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2013-11-21T04:40:59.033",
  "references": [
    {
      "source": "vultures@jpcert.or.jp",
      "url": "http://jvn.jp/en/jp/JVN06870202/index.html"
    },
    {
      "source": "vultures@jpcert.or.jp",
      "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2013-000098"
    },
    {
      "source": "vultures@jpcert.or.jp",
      "tags": [
        "Exploit",
        "Patch"
      ],
      "url": "http://svn.ec-cube.net/open_trac/changeset/23278"
    },
    {
      "source": "vultures@jpcert.or.jp",
      "tags": [
        "Exploit",
        "Patch"
      ],
      "url": "http://www.ec-cube.net/info/weakness/weakness.php?id=52"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://jvn.jp/en/jp/JVN06870202/index.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2013-000098"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit",
        "Patch"
      ],
      "url": "http://svn.ec-cube.net/open_trac/changeset/23278"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit",
        "Patch"
      ],
      "url": "http://www.ec-cube.net/info/weakness/weakness.php?id=52"
    }
  ],
  "sourceIdentifier": "vultures@jpcert.or.jp",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-200"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

FKIE_CVE-2013-5996

Vulnerability from fkie_nvd - Published: 2013-11-21 04:40 - Updated: 2025-04-11 00:51

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:lockon:ec-cube:2.11.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "E37E68F4-EC08-4A33-8CD2-9B854E51A6E4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:lockon:ec-cube:2.11.0:beta:*:*:*:*:*:*",
              "matchCriteriaId": "8A85840E-73A5-411D-912A-A1CEA7852904",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:lockon:ec-cube:2.11.0:beta2:*:*:*:*:*:*",
              "matchCriteriaId": "C34FB238-1A64-4CBB-AAF6-FDE6BA90A096",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:lockon:ec-cube:2.11.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "AC0C6C78-3FD3-4AA3-95B0-CF798396E802",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:lockon:ec-cube:2.11.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "933ADEC5-451B-4DAA-AB23-7CD8A9A64954",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:lockon:ec-cube:2.11.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "3EFDD02C-56D4-480E-8FF3-E4B63554CB26",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:lockon:ec-cube:2.11.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "1C4BC181-D123-460C-9BF8-6B8FB800697C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:lockon:ec-cube:2.11.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "8C40A7B5-639C-4390-B91E-BEC404B5ED1B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:lockon:ec-cube:2.12.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "2D261CC2-F7E5-437E-884B-D25C72F939C6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:lockon:ec-cube:2.12.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "CA1710AF-A87A-4970-BF19-481040A7524A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:lockon:ec-cube:2.12.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "7C72DED8-1073-47A9-B089-84E3ABC96401",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:lockon:ec-cube:2.12.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "6E3D5763-00DB-4F7E-AA08-1A2AA3070B5D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:lockon:ec-cube:2.12.3en:*:*:*:*:*:*:*",
              "matchCriteriaId": "95D2187D-3860-4432-9646-8F0DE41F3168",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:lockon:ec-cube:2.12.3enp1:*:*:*:*:*:*:*",
              "matchCriteriaId": "8FF41053-E778-4000-9BE5-3F538A78AA41",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:lockon:ec-cube:2.12.3enp2:*:*:*:*:*:*:*",
              "matchCriteriaId": "3E213BA2-5D21-4A58-8E32-1168A9108C94",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:lockon:ec-cube:2.12.4en:*:*:*:*:*:*:*",
              "matchCriteriaId": "C84115A8-8F65-4E6D-B77E-C14F83E5FB7F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:lockon:ec-cube:2.12.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "930A679D-FC06-439E-B028-1F8658FC0B73",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:lockon:ec-cube:2.12.5en:*:*:*:*:*:*:*",
              "matchCriteriaId": "AE0D2972-74A9-45FE-BE17-DEDD24A8B704",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:lockon:ec-cube:2.12.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "8417F3B8-1A43-40DE-A429-FB29FD543FB3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:lockon:ec-cube:2.12.6en:*:*:*:*:*:*:*",
              "matchCriteriaId": "CD60B565-5AEA-4CFA-807D-7BE1BF2CAB9D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:lockon:ec-cube:2.13.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "C0D9BFC7-D797-4461-870E-CF67DD28629E",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Multiple cross-site scripting (XSS) vulnerabilities in shopping/payment.tpl components in LOCKON EC-CUBE 2.11.0 through 2.13.0 allow remote attackers to inject arbitrary web script or HTML via crafted values."
    },
    {
      "lang": "es",
      "value": "M\u00faltiples vulnerabilidades de XSS en componentes shopping/payment.tpl de LOCKON EC-CUBE 2.11.0 hasta la versi\u00f3n 2.13.0 permite a atacantes remotos inyectar script web o HTML arbitrario a trav\u00e9s de valores manipulados."
    }
  ],
  "id": "CVE-2013-5996",
  "lastModified": "2025-04-11T00:51:21.963",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 4.3,
          "confidentialityImpact": "NONE",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": true
      }
    ]
  },
  "published": "2013-11-21T04:40:59.080",
  "references": [
    {
      "source": "vultures@jpcert.or.jp",
      "url": "http://jvn.jp/en/jp/JVN06377589/index.html"
    },
    {
      "source": "vultures@jpcert.or.jp",
      "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2013-000107"
    },
    {
      "source": "vultures@jpcert.or.jp",
      "tags": [
        "Exploit",
        "Patch"
      ],
      "url": "http://svn.ec-cube.net/open_trac/changeset/23275"
    },
    {
      "source": "vultures@jpcert.or.jp",
      "tags": [
        "Exploit",
        "Patch"
      ],
      "url": "http://www.ec-cube.net/info/weakness/weakness.php?id=55"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://jvn.jp/en/jp/JVN06377589/index.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2013-000107"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit",
        "Patch"
      ],
      "url": "http://svn.ec-cube.net/open_trac/changeset/23275"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit",
        "Patch"
      ],
      "url": "http://www.ec-cube.net/info/weakness/weakness.php?id=55"
    }
  ],
  "sourceIdentifier": "vultures@jpcert.or.jp",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-79"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

FKIE_CVE-2013-5993

Vulnerability from fkie_nvd - Published: 2013-11-21 04:40 - Updated: 2025-04-11 00:51

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:lockon:ec-cube:2.11.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "E37E68F4-EC08-4A33-8CD2-9B854E51A6E4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:lockon:ec-cube:2.11.0:beta:*:*:*:*:*:*",
              "matchCriteriaId": "8A85840E-73A5-411D-912A-A1CEA7852904",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:lockon:ec-cube:2.11.0:beta2:*:*:*:*:*:*",
              "matchCriteriaId": "C34FB238-1A64-4CBB-AAF6-FDE6BA90A096",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:lockon:ec-cube:2.11.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "AC0C6C78-3FD3-4AA3-95B0-CF798396E802",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:lockon:ec-cube:2.11.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "933ADEC5-451B-4DAA-AB23-7CD8A9A64954",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:lockon:ec-cube:2.11.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "3EFDD02C-56D4-480E-8FF3-E4B63554CB26",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:lockon:ec-cube:2.11.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "1C4BC181-D123-460C-9BF8-6B8FB800697C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:lockon:ec-cube:2.11.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "8C40A7B5-639C-4390-B91E-BEC404B5ED1B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:lockon:ec-cube:2.12.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "2D261CC2-F7E5-437E-884B-D25C72F939C6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:lockon:ec-cube:2.12.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "CA1710AF-A87A-4970-BF19-481040A7524A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:lockon:ec-cube:2.12.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "7C72DED8-1073-47A9-B089-84E3ABC96401",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:lockon:ec-cube:2.12.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "6E3D5763-00DB-4F7E-AA08-1A2AA3070B5D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:lockon:ec-cube:2.12.3en:*:*:*:*:*:*:*",
              "matchCriteriaId": "95D2187D-3860-4432-9646-8F0DE41F3168",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:lockon:ec-cube:2.12.3enp1:*:*:*:*:*:*:*",
              "matchCriteriaId": "8FF41053-E778-4000-9BE5-3F538A78AA41",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:lockon:ec-cube:2.12.3enp2:*:*:*:*:*:*:*",
              "matchCriteriaId": "3E213BA2-5D21-4A58-8E32-1168A9108C94",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:lockon:ec-cube:2.12.4en:*:*:*:*:*:*:*",
              "matchCriteriaId": "C84115A8-8F65-4E6D-B77E-C14F83E5FB7F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:lockon:ec-cube:2.12.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "930A679D-FC06-439E-B028-1F8658FC0B73",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:lockon:ec-cube:2.12.5en:*:*:*:*:*:*:*",
              "matchCriteriaId": "AE0D2972-74A9-45FE-BE17-DEDD24A8B704",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:lockon:ec-cube:2.12.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "8417F3B8-1A43-40DE-A429-FB29FD543FB3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:lockon:ec-cube:2.12.6en:*:*:*:*:*:*:*",
              "matchCriteriaId": "CD60B565-5AEA-4CFA-807D-7BE1BF2CAB9D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:lockon:ec-cube:2.13.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "C0D9BFC7-D797-4461-870E-CF67DD28629E",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Cross-site request forgery (CSRF) vulnerability in LOCKON EC-CUBE 2.11.0 through 2.13.0 allows remote attackers to hijack the authentication of arbitrary users via unspecified vectors related to refusals."
    },
    {
      "lang": "es",
      "value": "Vulnerabilidad de CSRF en LOCKON EC-CUBE 2.11.0 hasta la versi\u00f3n 2.13.0 permite a atacantes remotos secuestrar la autenticaci\u00f3n de usuarios arbitrarios a trav\u00e9s de vectores sin especificar relacionadas con denegaciones."
    }
  ],
  "id": "CVE-2013-5993",
  "lastModified": "2025-04-11T00:51:21.963",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 6.8,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": true
      }
    ]
  },
  "published": "2013-11-21T04:40:59.017",
  "references": [
    {
      "source": "vultures@jpcert.or.jp",
      "url": "http://jvn.jp/en/jp/JVN11221613/index.html"
    },
    {
      "source": "vultures@jpcert.or.jp",
      "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2013-000097"
    },
    {
      "source": "vultures@jpcert.or.jp",
      "tags": [
        "Patch"
      ],
      "url": "http://svn.ec-cube.net/open_trac/changeset/23277"
    },
    {
      "source": "vultures@jpcert.or.jp",
      "tags": [
        "Exploit",
        "Patch"
      ],
      "url": "http://www.ec-cube.net/info/weakness/weakness.php?id=53"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://jvn.jp/en/jp/JVN11221613/index.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2013-000097"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://svn.ec-cube.net/open_trac/changeset/23277"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit",
        "Patch"
      ],
      "url": "http://www.ec-cube.net/info/weakness/weakness.php?id=53"
    }
  ],
  "sourceIdentifier": "vultures@jpcert.or.jp",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-352"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

FKIE_CVE-2013-5995

Vulnerability from fkie_nvd - Published: 2013-11-21 04:40 - Updated: 2025-04-11 00:51

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:lockon:ec-cube:2.12.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "6E3D5763-00DB-4F7E-AA08-1A2AA3070B5D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:lockon:ec-cube:2.12.3en:*:*:*:*:*:*:*",
              "matchCriteriaId": "95D2187D-3860-4432-9646-8F0DE41F3168",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:lockon:ec-cube:2.12.3enp1:*:*:*:*:*:*:*",
              "matchCriteriaId": "8FF41053-E778-4000-9BE5-3F538A78AA41",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:lockon:ec-cube:2.12.3enp2:*:*:*:*:*:*:*",
              "matchCriteriaId": "3E213BA2-5D21-4A58-8E32-1168A9108C94",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:lockon:ec-cube:2.12.4en:*:*:*:*:*:*:*",
              "matchCriteriaId": "C84115A8-8F65-4E6D-B77E-C14F83E5FB7F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:lockon:ec-cube:2.12.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "930A679D-FC06-439E-B028-1F8658FC0B73",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:lockon:ec-cube:2.12.5en:*:*:*:*:*:*:*",
              "matchCriteriaId": "AE0D2972-74A9-45FE-BE17-DEDD24A8B704",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:lockon:ec-cube:2.12.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "8417F3B8-1A43-40DE-A429-FB29FD543FB3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:lockon:ec-cube:2.12.6en:*:*:*:*:*:*:*",
              "matchCriteriaId": "CD60B565-5AEA-4CFA-807D-7BE1BF2CAB9D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:lockon:ec-cube:2.13.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "C0D9BFC7-D797-4461-870E-CF67DD28629E",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "data/class/helper/SC_Helper_Address.php in the front-features implementation in LOCKON EC-CUBE 2.12.3 through 2.13.0 allows remote authenticated users to obtain sensitive information via unspecified vectors related to addresses."
    },
    {
      "lang": "es",
      "value": "data/class/helper/SC_Helper_Address.php en la implementaci\u00f3n front-features de LOCKON EC-CUBE 2.12.3 permite a usuarios remotos autenticados obtener informaci\u00f3n sensible a trav\u00e9s de vectores sin especificar relacionados con las direcciones."
    }
  ],
  "evaluatorComment": "Per: http://jvndb.jvn.jp/en/contents/2013/JVNDB-2013-000106.html\n\n\"User\u0027s information may be obtained or altered by other user who visits the shopping site\"",
  "id": "CVE-2013-5995",
  "lastModified": "2025-04-11T00:51:21.963",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "SINGLE",
          "availabilityImpact": "NONE",
          "baseScore": 5.5,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 8.0,
        "impactScore": 4.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2013-11-21T04:40:59.047",
  "references": [
    {
      "source": "vultures@jpcert.or.jp",
      "url": "http://jvn.jp/en/jp/JVN55630933/index.html"
    },
    {
      "source": "vultures@jpcert.or.jp",
      "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2013-000106"
    },
    {
      "source": "vultures@jpcert.or.jp",
      "tags": [
        "Exploit",
        "Patch"
      ],
      "url": "http://svn.ec-cube.net/open_trac/changeset/23274"
    },
    {
      "source": "vultures@jpcert.or.jp",
      "tags": [
        "Exploit",
        "Patch"
      ],
      "url": "http://www.ec-cube.net/info/weakness/weakness.php?id=51"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://jvn.jp/en/jp/JVN55630933/index.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2013-000106"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit",
        "Patch"
      ],
      "url": "http://svn.ec-cube.net/open_trac/changeset/23274"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit",
        "Patch"
      ],
      "url": "http://www.ec-cube.net/info/weakness/weakness.php?id=51"
    }
  ],
  "sourceIdentifier": "vultures@jpcert.or.jp",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-200"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

FKIE_CVE-2013-5991

Vulnerability from fkie_nvd - Published: 2013-11-21 04:40 - Updated: 2025-04-11 00:51
Severity ?
Summary
The displaySystemError function in html/handle_error.php in LOCKON EC-CUBE 2.11.0 through 2.11.5 allows remote attackers to obtain sensitive information by leveraging incorrect handling of error-log output.
Impacted products
Vendor Product Version
lockon ec-cube 2.11.0
lockon ec-cube 2.11.0
lockon ec-cube 2.11.0
lockon ec-cube 2.11.1
lockon ec-cube 2.11.2
lockon ec-cube 2.11.3
lockon ec-cube 2.11.4
lockon ec-cube 2.11.5

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:lockon:ec-cube:2.11.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "E37E68F4-EC08-4A33-8CD2-9B854E51A6E4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:lockon:ec-cube:2.11.0:beta:*:*:*:*:*:*",
              "matchCriteriaId": "8A85840E-73A5-411D-912A-A1CEA7852904",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:lockon:ec-cube:2.11.0:beta2:*:*:*:*:*:*",
              "matchCriteriaId": "C34FB238-1A64-4CBB-AAF6-FDE6BA90A096",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:lockon:ec-cube:2.11.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "AC0C6C78-3FD3-4AA3-95B0-CF798396E802",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:lockon:ec-cube:2.11.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "933ADEC5-451B-4DAA-AB23-7CD8A9A64954",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:lockon:ec-cube:2.11.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "3EFDD02C-56D4-480E-8FF3-E4B63554CB26",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:lockon:ec-cube:2.11.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "1C4BC181-D123-460C-9BF8-6B8FB800697C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:lockon:ec-cube:2.11.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "8C40A7B5-639C-4390-B91E-BEC404B5ED1B",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "The displaySystemError function in html/handle_error.php in LOCKON EC-CUBE 2.11.0 through 2.11.5 allows remote attackers to obtain sensitive information by leveraging incorrect handling of error-log output."
    },
    {
      "lang": "es",
      "value": "La funci\u00f3n displaySystemError en html/handle_error.php de LOCKON EC-CUBE 2.11.0 hasta la versi\u00f3n 2.11.5 permite a atacantes remotos obtener informaci\u00f3n sensible mediante el aprovechamiento de un manejo incorrecto en la salida del log de errores."
    }
  ],
  "id": "CVE-2013-5991",
  "lastModified": "2025-04-11T00:51:21.963",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 4.3,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2013-11-21T04:40:58.953",
  "references": [
    {
      "source": "vultures@jpcert.or.jp",
      "url": "http://jvn.jp/en/jp/JVN61077110/index.html"
    },
    {
      "source": "vultures@jpcert.or.jp",
      "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2013-000104"
    },
    {
      "source": "vultures@jpcert.or.jp",
      "tags": [
        "Exploit",
        "Patch"
      ],
      "url": "http://www.ec-cube.net/info/weakness/weakness.php?id=54"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://jvn.jp/en/jp/JVN61077110/index.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2013-000104"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit",
        "Patch"
      ],
      "url": "http://www.ec-cube.net/info/weakness/weakness.php?id=54"
    }
  ],
  "sourceIdentifier": "vultures@jpcert.or.jp",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-200"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

FKIE_CVE-2013-5992

Vulnerability from fkie_nvd - Published: 2013-11-21 04:40 - Updated: 2025-04-11 00:51
Severity ?
Summary
Cross-site scripting (XSS) vulnerability in the displaySystemError function in html/handle_error.php in LOCKON EC-CUBE 2.11.0 through 2.11.5 allows remote attackers to inject arbitrary web script or HTML by leveraging incorrect handling of error-message output.
Impacted products
Vendor Product Version
lockon ec-cube 2.11.0
lockon ec-cube 2.11.0
lockon ec-cube 2.11.0
lockon ec-cube 2.11.1
lockon ec-cube 2.11.2
lockon ec-cube 2.11.3
lockon ec-cube 2.11.4
lockon ec-cube 2.11.5

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:lockon:ec-cube:2.11.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "E37E68F4-EC08-4A33-8CD2-9B854E51A6E4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:lockon:ec-cube:2.11.0:beta:*:*:*:*:*:*",
              "matchCriteriaId": "8A85840E-73A5-411D-912A-A1CEA7852904",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:lockon:ec-cube:2.11.0:beta2:*:*:*:*:*:*",
              "matchCriteriaId": "C34FB238-1A64-4CBB-AAF6-FDE6BA90A096",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:lockon:ec-cube:2.11.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "AC0C6C78-3FD3-4AA3-95B0-CF798396E802",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:lockon:ec-cube:2.11.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "933ADEC5-451B-4DAA-AB23-7CD8A9A64954",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:lockon:ec-cube:2.11.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "3EFDD02C-56D4-480E-8FF3-E4B63554CB26",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:lockon:ec-cube:2.11.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "1C4BC181-D123-460C-9BF8-6B8FB800697C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:lockon:ec-cube:2.11.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "8C40A7B5-639C-4390-B91E-BEC404B5ED1B",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Cross-site scripting (XSS) vulnerability in the displaySystemError function in html/handle_error.php in LOCKON EC-CUBE 2.11.0 through 2.11.5 allows remote attackers to inject arbitrary web script or HTML by leveraging incorrect handling of error-message output."
    },
    {
      "lang": "es",
      "value": "Vulnerabilidad de XSS en la funci\u00f3n displaySystemError en html/handle_error.php de LOCKON EC-CUBE 2.11.0 hasta la versi\u00f3n 2.11.5 permite a atacantes remotos inyectar script web o HTML arbitrario mediante el aprovechamiento de un manejo incorrecto en la salida de los mensajes de error."
    }
  ],
  "id": "CVE-2013-5992",
  "lastModified": "2025-04-11T00:51:21.963",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 4.3,
          "confidentialityImpact": "NONE",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": true
      }
    ]
  },
  "published": "2013-11-21T04:40:58.987",
  "references": [
    {
      "source": "vultures@jpcert.or.jp",
      "url": "http://jvn.jp/en/jp/JVN38790987/index.html"
    },
    {
      "source": "vultures@jpcert.or.jp",
      "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2013-000105"
    },
    {
      "source": "vultures@jpcert.or.jp",
      "tags": [
        "Exploit",
        "Patch"
      ],
      "url": "http://www.ec-cube.net/info/weakness/weakness.php?id=54"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://jvn.jp/en/jp/JVN38790987/index.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2013-000105"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit",
        "Patch"
      ],
      "url": "http://www.ec-cube.net/info/weakness/weakness.php?id=54"
    }
  ],
  "sourceIdentifier": "vultures@jpcert.or.jp",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-79"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

CVE-2018-0564 (GCVE-0-2018-0564)

Vulnerability from cvelistv5 – Published: 2018-04-20 13:00 – Updated: 2024-08-05 03:28
VLAI?
Summary
Session fixation vulnerability in EC-CUBE (EC-CUBE 3.0.0, EC-CUBE 3.0.1, EC-CUBE 3.0.2, EC-CUBE 3.0.3, EC-CUBE 3..4, EC-CUBE 3.0.5, EC-CUBE 3.0.6, EC-CUBE 3.0.7, EC-CUBE 3.0.8, EC-CUBE 3.0.9, EC-CUBE 3.0.10, EC-CUBE 3.0.11, EC-CUBE 3.0.12, EC-CUBE 3.0.12-p1, EC-CUBE 3.0.13, EC-CUBE 3.0.14, EC-CUBE 3.0.15) allows remote attackers to perform arbitrary operations via unspecified vectors.
Severity ?
No CVSS data available.
CWE
  • Session fixation
Assigner
References
Impacted products
Vendor Product Version
LOCKON CO.,LTD. EC-CUBE Affected: (EC-CUBE 3.0.0, EC-CUBE 3.0.1, EC-CUBE 3.0.2, EC-CUBE 3.0.3, EC-CUBE 3..4, EC-CUBE 3.0.5, EC-CUBE 3.0.6, EC-CUBE 3.0.7, EC-CUBE 3.0.8, EC-CUBE 3.0.9, EC-CUBE 3.0.10, EC-CUBE 3.0.11, EC-CUBE 3.0.12, EC-CUBE 3.0.12-p1, EC-CUBE 3.0.13, EC-CUBE 3.0.14, EC-CUBE 3.0.15)
Create a notification for this product.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-05T03:28:11.120Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://www.ec-cube.net/info/weakness/20180416/"
          },
          {
            "name": "JVN#52695336",
            "tags": [
              "third-party-advisory",
              "x_refsource_JVN",
              "x_transferred"
            ],
            "url": "http://jvn.jp/en/jp/JVN52695336/index.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "EC-CUBE",
          "vendor": "LOCKON CO.,LTD.",
          "versions": [
            {
              "status": "affected",
              "version": "(EC-CUBE 3.0.0, EC-CUBE 3.0.1, EC-CUBE 3.0.2, EC-CUBE 3.0.3, EC-CUBE 3..4, EC-CUBE 3.0.5, EC-CUBE 3.0.6, EC-CUBE 3.0.7, EC-CUBE 3.0.8, EC-CUBE 3.0.9, EC-CUBE 3.0.10, EC-CUBE 3.0.11, EC-CUBE 3.0.12, EC-CUBE 3.0.12-p1, EC-CUBE 3.0.13, EC-CUBE 3.0.14, EC-CUBE 3.0.15)"
            }
          ]
        }
      ],
      "datePublic": "2018-04-16T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Session fixation vulnerability in EC-CUBE (EC-CUBE 3.0.0, EC-CUBE 3.0.1, EC-CUBE 3.0.2, EC-CUBE 3.0.3, EC-CUBE 3..4, EC-CUBE 3.0.5, EC-CUBE 3.0.6, EC-CUBE 3.0.7, EC-CUBE 3.0.8, EC-CUBE 3.0.9, EC-CUBE 3.0.10, EC-CUBE 3.0.11, EC-CUBE 3.0.12, EC-CUBE 3.0.12-p1, EC-CUBE 3.0.13, EC-CUBE 3.0.14, EC-CUBE 3.0.15) allows remote attackers to perform arbitrary operations via unspecified vectors."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "Session fixation",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2018-04-20T12:57:01",
        "orgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
        "shortName": "jpcert"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://www.ec-cube.net/info/weakness/20180416/"
        },
        {
          "name": "JVN#52695336",
          "tags": [
            "third-party-advisory",
            "x_refsource_JVN"
          ],
          "url": "http://jvn.jp/en/jp/JVN52695336/index.html"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "vultures@jpcert.or.jp",
          "ID": "CVE-2018-0564",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "EC-CUBE",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "(EC-CUBE 3.0.0, EC-CUBE 3.0.1, EC-CUBE 3.0.2, EC-CUBE 3.0.3, EC-CUBE 3..4, EC-CUBE 3.0.5, EC-CUBE 3.0.6, EC-CUBE 3.0.7, EC-CUBE 3.0.8, EC-CUBE 3.0.9, EC-CUBE 3.0.10, EC-CUBE 3.0.11, EC-CUBE 3.0.12, EC-CUBE 3.0.12-p1, EC-CUBE 3.0.13, EC-CUBE 3.0.14, EC-CUBE 3.0.15)"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "LOCKON CO.,LTD."
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Session fixation vulnerability in EC-CUBE (EC-CUBE 3.0.0, EC-CUBE 3.0.1, EC-CUBE 3.0.2, EC-CUBE 3.0.3, EC-CUBE 3..4, EC-CUBE 3.0.5, EC-CUBE 3.0.6, EC-CUBE 3.0.7, EC-CUBE 3.0.8, EC-CUBE 3.0.9, EC-CUBE 3.0.10, EC-CUBE 3.0.11, EC-CUBE 3.0.12, EC-CUBE 3.0.12-p1, EC-CUBE 3.0.13, EC-CUBE 3.0.14, EC-CUBE 3.0.15) allows remote attackers to perform arbitrary operations via unspecified vectors."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "Session fixation"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://www.ec-cube.net/info/weakness/20180416/",
              "refsource": "CONFIRM",
              "url": "https://www.ec-cube.net/info/weakness/20180416/"
            },
            {
              "name": "JVN#52695336",
              "refsource": "JVN",
              "url": "http://jvn.jp/en/jp/JVN52695336/index.html"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
    "assignerShortName": "jpcert",
    "cveId": "CVE-2018-0564",
    "datePublished": "2018-04-20T13:00:00",
    "dateReserved": "2017-11-27T00:00:00",
    "dateUpdated": "2024-08-05T03:28:11.120Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2016-1201 (GCVE-0-2016-1201)

Vulnerability from cvelistv5 – Published: 2016-04-30 10:00 – Updated: 2024-08-05 22:48
VLAI?
Summary
Cross-site request forgery (CSRF) vulnerability in LOCKON EC-CUBE 3.0.0 through 3.0.9 allows remote attackers to hijack the authentication of administrators.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-05T22:48:13.554Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "90515",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/90515"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.ec-cube.net/info/weakness/weakness.php?id=67"
          },
          {
            "name": "JVNDB-2016-000053",
            "tags": [
              "third-party-advisory",
              "x_refsource_JVNDB",
              "x_transferred"
            ],
            "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2016-000053"
          },
          {
            "name": "JVN#73776243",
            "tags": [
              "third-party-advisory",
              "x_refsource_JVN",
              "x_transferred"
            ],
            "url": "http://jvn.jp/en/jp/JVN73776243/index.html"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://www.ec-cube.net/info/weakness/201604/"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2016-04-26T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Cross-site request forgery (CSRF) vulnerability in LOCKON EC-CUBE 3.0.0 through 3.0.9 allows remote attackers to hijack the authentication of administrators."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2016-11-25T19:57:01",
        "orgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
        "shortName": "jpcert"
      },
      "references": [
        {
          "name": "90515",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/90515"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.ec-cube.net/info/weakness/weakness.php?id=67"
        },
        {
          "name": "JVNDB-2016-000053",
          "tags": [
            "third-party-advisory",
            "x_refsource_JVNDB"
          ],
          "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2016-000053"
        },
        {
          "name": "JVN#73776243",
          "tags": [
            "third-party-advisory",
            "x_refsource_JVN"
          ],
          "url": "http://jvn.jp/en/jp/JVN73776243/index.html"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://www.ec-cube.net/info/weakness/201604/"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "vultures@jpcert.or.jp",
          "ID": "CVE-2016-1201",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Cross-site request forgery (CSRF) vulnerability in LOCKON EC-CUBE 3.0.0 through 3.0.9 allows remote attackers to hijack the authentication of administrators."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "90515",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/90515"
            },
            {
              "name": "http://www.ec-cube.net/info/weakness/weakness.php?id=67",
              "refsource": "CONFIRM",
              "url": "http://www.ec-cube.net/info/weakness/weakness.php?id=67"
            },
            {
              "name": "JVNDB-2016-000053",
              "refsource": "JVNDB",
              "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2016-000053"
            },
            {
              "name": "JVN#73776243",
              "refsource": "JVN",
              "url": "http://jvn.jp/en/jp/JVN73776243/index.html"
            },
            {
              "name": "https://www.ec-cube.net/info/weakness/201604/",
              "refsource": "CONFIRM",
              "url": "https://www.ec-cube.net/info/weakness/201604/"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
    "assignerShortName": "jpcert",
    "cveId": "CVE-2016-1201",
    "datePublished": "2016-04-30T10:00:00",
    "dateReserved": "2015-12-26T00:00:00",
    "dateUpdated": "2024-08-05T22:48:13.554Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2016-1200 (GCVE-0-2016-1200)

Vulnerability from cvelistv5 – Published: 2016-04-30 10:00 – Updated: 2024-08-05 22:48
VLAI?
Summary
The management screen in LOCKON EC-CUBE 3.0.7 through 3.0.9 allows remote authenticated users to bypass intended access restrictions via unspecified vectors, a different vulnerability than CVE-2016-1199.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-05T22:48:13.542Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "90503",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/90503"
          },
          {
            "name": "JVN#11458774",
            "tags": [
              "third-party-advisory",
              "x_refsource_JVN",
              "x_transferred"
            ],
            "url": "http://jvn.jp/en/jp/JVN11458774/index.html"
          },
          {
            "name": "JVNDB-2016-000052",
            "tags": [
              "third-party-advisory",
              "x_refsource_JVNDB",
              "x_transferred"
            ],
            "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2016-000052"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://www.ec-cube.net/info/weakness/201604/"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.ec-cube.net/info/weakness/weakness.php?id=66"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2016-04-26T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "The management screen in LOCKON EC-CUBE 3.0.7 through 3.0.9 allows remote authenticated users to bypass intended access restrictions via unspecified vectors, a different vulnerability than CVE-2016-1199."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2016-11-25T19:57:01",
        "orgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
        "shortName": "jpcert"
      },
      "references": [
        {
          "name": "90503",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/90503"
        },
        {
          "name": "JVN#11458774",
          "tags": [
            "third-party-advisory",
            "x_refsource_JVN"
          ],
          "url": "http://jvn.jp/en/jp/JVN11458774/index.html"
        },
        {
          "name": "JVNDB-2016-000052",
          "tags": [
            "third-party-advisory",
            "x_refsource_JVNDB"
          ],
          "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2016-000052"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://www.ec-cube.net/info/weakness/201604/"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.ec-cube.net/info/weakness/weakness.php?id=66"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "vultures@jpcert.or.jp",
          "ID": "CVE-2016-1200",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "The management screen in LOCKON EC-CUBE 3.0.7 through 3.0.9 allows remote authenticated users to bypass intended access restrictions via unspecified vectors, a different vulnerability than CVE-2016-1199."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "90503",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/90503"
            },
            {
              "name": "JVN#11458774",
              "refsource": "JVN",
              "url": "http://jvn.jp/en/jp/JVN11458774/index.html"
            },
            {
              "name": "JVNDB-2016-000052",
              "refsource": "JVNDB",
              "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2016-000052"
            },
            {
              "name": "https://www.ec-cube.net/info/weakness/201604/",
              "refsource": "CONFIRM",
              "url": "https://www.ec-cube.net/info/weakness/201604/"
            },
            {
              "name": "http://www.ec-cube.net/info/weakness/weakness.php?id=66",
              "refsource": "CONFIRM",
              "url": "http://www.ec-cube.net/info/weakness/weakness.php?id=66"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
    "assignerShortName": "jpcert",
    "cveId": "CVE-2016-1200",
    "datePublished": "2016-04-30T10:00:00",
    "dateReserved": "2015-12-26T00:00:00",
    "dateUpdated": "2024-08-05T22:48:13.542Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2016-1199 (GCVE-0-2016-1199)

Vulnerability from cvelistv5 – Published: 2016-04-30 10:00 – Updated: 2024-08-05 22:48
VLAI?
Summary
The login page in the management screen in LOCKON EC-CUBE 3.0.0 through 3.0.9 allows remote attackers to bypass intended IP address restrictions via unspecified vectors, a different vulnerability than CVE-2016-1200.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-05T22:48:13.513Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "JVN#47473944",
            "tags": [
              "third-party-advisory",
              "x_refsource_JVN",
              "x_transferred"
            ],
            "url": "http://jvn.jp/en/jp/JVN47473944/index.html"
          },
          {
            "name": "JVNDB-2016-000051",
            "tags": [
              "third-party-advisory",
              "x_refsource_JVNDB",
              "x_transferred"
            ],
            "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2016-000051"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.ec-cube.net/info/weakness/weakness.php?id=65"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://www.ec-cube.net/info/weakness/201604/"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2016-04-26T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "The login page in the management screen in LOCKON EC-CUBE 3.0.0 through 3.0.9 allows remote attackers to bypass intended IP address restrictions via unspecified vectors, a different vulnerability than CVE-2016-1200."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2016-04-30T01:57:01",
        "orgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
        "shortName": "jpcert"
      },
      "references": [
        {
          "name": "JVN#47473944",
          "tags": [
            "third-party-advisory",
            "x_refsource_JVN"
          ],
          "url": "http://jvn.jp/en/jp/JVN47473944/index.html"
        },
        {
          "name": "JVNDB-2016-000051",
          "tags": [
            "third-party-advisory",
            "x_refsource_JVNDB"
          ],
          "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2016-000051"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.ec-cube.net/info/weakness/weakness.php?id=65"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://www.ec-cube.net/info/weakness/201604/"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "vultures@jpcert.or.jp",
          "ID": "CVE-2016-1199",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "The login page in the management screen in LOCKON EC-CUBE 3.0.0 through 3.0.9 allows remote attackers to bypass intended IP address restrictions via unspecified vectors, a different vulnerability than CVE-2016-1200."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "JVN#47473944",
              "refsource": "JVN",
              "url": "http://jvn.jp/en/jp/JVN47473944/index.html"
            },
            {
              "name": "JVNDB-2016-000051",
              "refsource": "JVNDB",
              "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2016-000051"
            },
            {
              "name": "http://www.ec-cube.net/info/weakness/weakness.php?id=65",
              "refsource": "CONFIRM",
              "url": "http://www.ec-cube.net/info/weakness/weakness.php?id=65"
            },
            {
              "name": "https://www.ec-cube.net/info/weakness/201604/",
              "refsource": "CONFIRM",
              "url": "https://www.ec-cube.net/info/weakness/201604/"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
    "assignerShortName": "jpcert",
    "cveId": "CVE-2016-1199",
    "datePublished": "2016-04-30T10:00:00",
    "dateReserved": "2015-12-26T00:00:00",
    "dateUpdated": "2024-08-05T22:48:13.513Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2015-5665 (GCVE-0-2015-5665)

Vulnerability from cvelistv5 – Published: 2015-10-27 01:00 – Updated: 2024-08-06 06:59
VLAI?
Summary
Cross-site request forgery (CSRF) vulnerability in LOCKON EC-CUBE 2.11.0 through 2.13.3 allows remote attackers to hijack the authentication of arbitrary users for requests that write to PHP scripts, related to the doValidToken function.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T06:59:03.541Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.ec-cube.net/info/weakness/weakness.php?id=63"
          },
          {
            "name": "JVNDB-2015-000166",
            "tags": [
              "third-party-advisory",
              "x_refsource_JVNDB",
              "x_transferred"
            ],
            "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2015-000166"
          },
          {
            "name": "JVN#97278546",
            "tags": [
              "third-party-advisory",
              "x_refsource_JVN",
              "x_transferred"
            ],
            "url": "http://jvn.jp/en/jp/JVN97278546/index.html"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://www.ec-cube.net/info/weakness/201510_01/"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2015-10-26T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Cross-site request forgery (CSRF) vulnerability in LOCKON EC-CUBE 2.11.0 through 2.13.3 allows remote attackers to hijack the authentication of arbitrary users for requests that write to PHP scripts, related to the doValidToken function."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2015-10-27T01:57:01",
        "orgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
        "shortName": "jpcert"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.ec-cube.net/info/weakness/weakness.php?id=63"
        },
        {
          "name": "JVNDB-2015-000166",
          "tags": [
            "third-party-advisory",
            "x_refsource_JVNDB"
          ],
          "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2015-000166"
        },
        {
          "name": "JVN#97278546",
          "tags": [
            "third-party-advisory",
            "x_refsource_JVN"
          ],
          "url": "http://jvn.jp/en/jp/JVN97278546/index.html"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://www.ec-cube.net/info/weakness/201510_01/"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "vultures@jpcert.or.jp",
          "ID": "CVE-2015-5665",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Cross-site request forgery (CSRF) vulnerability in LOCKON EC-CUBE 2.11.0 through 2.13.3 allows remote attackers to hijack the authentication of arbitrary users for requests that write to PHP scripts, related to the doValidToken function."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "http://www.ec-cube.net/info/weakness/weakness.php?id=63",
              "refsource": "CONFIRM",
              "url": "http://www.ec-cube.net/info/weakness/weakness.php?id=63"
            },
            {
              "name": "JVNDB-2015-000166",
              "refsource": "JVNDB",
              "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2015-000166"
            },
            {
              "name": "JVN#97278546",
              "refsource": "JVN",
              "url": "http://jvn.jp/en/jp/JVN97278546/index.html"
            },
            {
              "name": "https://www.ec-cube.net/info/weakness/201510_01/",
              "refsource": "CONFIRM",
              "url": "https://www.ec-cube.net/info/weakness/201510_01/"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
    "assignerShortName": "jpcert",
    "cveId": "CVE-2015-5665",
    "datePublished": "2015-10-27T01:00:00",
    "dateReserved": "2015-07-24T00:00:00",
    "dateUpdated": "2024-08-06T06:59:03.541Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2014-0807 (GCVE-0-2014-0807)

Vulnerability from cvelistv5 – Published: 2014-01-22 21:00 – Updated: 2024-08-06 09:27
VLAI?
Summary
data/class/pages/shopping/LC_Page_Shopping_Deliv.php in LOCKON EC-CUBE 2.4.4 and earlier, and 2.11.0 through 2.12.2, allows remote attackers to modify data via unspecified vectors.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
http://www.ec-cube.net/info/weakness/weakness.php?id=56 x_refsource_CONFIRM
http://jvn.jp/en/jp/JVN17849447/index.html third-party-advisoryx_refsource_JVN
http://jvndb.jvn.jp/jvndb/JVNDB-2014-000005 third-party-advisoryx_refsource_JVNDB
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T09:27:20.061Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.ec-cube.net/info/weakness/weakness.php?id=56"
          },
          {
            "name": "JVN#17849447",
            "tags": [
              "third-party-advisory",
              "x_refsource_JVN",
              "x_transferred"
            ],
            "url": "http://jvn.jp/en/jp/JVN17849447/index.html"
          },
          {
            "name": "JVNDB-2014-000005",
            "tags": [
              "third-party-advisory",
              "x_refsource_JVNDB",
              "x_transferred"
            ],
            "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2014-000005"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2014-01-22T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "data/class/pages/shopping/LC_Page_Shopping_Deliv.php in LOCKON EC-CUBE 2.4.4 and earlier, and 2.11.0 through 2.12.2, allows remote attackers to modify data via unspecified vectors."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2014-01-22T21:57:00",
        "orgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
        "shortName": "jpcert"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.ec-cube.net/info/weakness/weakness.php?id=56"
        },
        {
          "name": "JVN#17849447",
          "tags": [
            "third-party-advisory",
            "x_refsource_JVN"
          ],
          "url": "http://jvn.jp/en/jp/JVN17849447/index.html"
        },
        {
          "name": "JVNDB-2014-000005",
          "tags": [
            "third-party-advisory",
            "x_refsource_JVNDB"
          ],
          "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2014-000005"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "vultures@jpcert.or.jp",
          "ID": "CVE-2014-0807",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "data/class/pages/shopping/LC_Page_Shopping_Deliv.php in LOCKON EC-CUBE 2.4.4 and earlier, and 2.11.0 through 2.12.2, allows remote attackers to modify data via unspecified vectors."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "http://www.ec-cube.net/info/weakness/weakness.php?id=56",
              "refsource": "CONFIRM",
              "url": "http://www.ec-cube.net/info/weakness/weakness.php?id=56"
            },
            {
              "name": "JVN#17849447",
              "refsource": "JVN",
              "url": "http://jvn.jp/en/jp/JVN17849447/index.html"
            },
            {
              "name": "JVNDB-2014-000005",
              "refsource": "JVNDB",
              "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2014-000005"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
    "assignerShortName": "jpcert",
    "cveId": "CVE-2014-0807",
    "datePublished": "2014-01-22T21:00:00",
    "dateReserved": "2014-01-06T00:00:00",
    "dateUpdated": "2024-08-06T09:27:20.061Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2014-0808 (GCVE-0-2014-0808)

Vulnerability from cvelistv5 – Published: 2014-01-22 21:00 – Updated: 2024-08-06 09:27
VLAI?
Summary
Authorization bypass through user-controlled key issue exists in EC-CUBE 2.11.0 through 2.12.2 and EC-Orange systems deployed before June 29th, 2015. If this vulnerability is exploited, a user of the affected shopping website may obtain other users' information by sending a crafted HTTP request.
CWE
  • Authorization Bypass Through User-Controlled Key
Assigner
Impacted products
Vendor Product Version
EC-CUBE CO.,LTD. EC-CUBE Affected: 2.11.0 through 2.12.2
Create a notification for this product.
    S‑cubism Inc. EC-Orange Affected: systems deployed before June 29th
Affected: 2015
Create a notification for this product.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "cvssV3_1": {
              "attackComplexity": "LOW",
              "attackVector": "NETWORK",
              "availabilityImpact": "NONE",
              "baseScore": 9.1,
              "baseSeverity": "CRITICAL",
              "confidentialityImpact": "HIGH",
              "integrityImpact": "HIGH",
              "privilegesRequired": "NONE",
              "scope": "UNCHANGED",
              "userInteraction": "NONE",
              "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N",
              "version": "3.1"
            }
          },
          {
            "other": {
              "content": {
                "id": "CVE-2014-0808",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "yes"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-06-11T14:04:20.266694Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "problemTypes": [
          {
            "descriptions": [
              {
                "cweId": "CWE-566",
                "description": "CWE-566 Authorization Bypass Through User-Controlled SQL Primary Key",
                "lang": "en",
                "type": "CWE"
              }
            ]
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-06-11T14:07:16.517Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      },
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T09:27:20.153Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "http://www.ec-cube.net/info/weakness/weakness.php?id=57"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "http://jvn.jp/en/jp/JVN51770585/"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2014-000006"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://ec-orange.jp/"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://jvn.jp/en/jp/JVN15637138/"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://jvndb.jvn.jp/jvndb/JVNDB-2024-000054"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "EC-CUBE",
          "vendor": "EC-CUBE CO.,LTD.",
          "versions": [
            {
              "status": "affected",
              "version": "2.11.0 through 2.12.2"
            }
          ]
        },
        {
          "product": "EC-Orange",
          "vendor": "S\u2011cubism Inc.",
          "versions": [
            {
              "status": "affected",
              "version": "systems deployed before June 29th"
            },
            {
              "status": "affected",
              "version": " 2015"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Authorization bypass through user-controlled key issue exists in EC-CUBE 2.11.0 through 2.12.2 and EC-Orange systems deployed before June 29th, 2015. If this vulnerability is exploited, a user of the affected shopping website may obtain other users\u0027 information by sending a crafted HTTP request."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "Authorization Bypass Through User-Controlled Key",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-06-11T05:17:08.940Z",
        "orgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
        "shortName": "jpcert"
      },
      "references": [
        {
          "url": "http://www.ec-cube.net/info/weakness/weakness.php?id=57"
        },
        {
          "url": "http://jvn.jp/en/jp/JVN51770585/"
        },
        {
          "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2014-000006"
        },
        {
          "url": "https://ec-orange.jp/"
        },
        {
          "url": "https://jvn.jp/en/jp/JVN15637138/"
        },
        {
          "url": "https://jvndb.jvn.jp/jvndb/JVNDB-2024-000054"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
    "assignerShortName": "jpcert",
    "cveId": "CVE-2014-0808",
    "datePublished": "2014-01-22T21:00:00",
    "dateReserved": "2014-01-06T00:00:00",
    "dateUpdated": "2024-08-06T09:27:20.153Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2013-5991 (GCVE-0-2013-5991)

Vulnerability from cvelistv5 – Published: 2013-11-21 02:00 – Updated: 2024-08-06 17:29
VLAI?
Summary
The displaySystemError function in html/handle_error.php in LOCKON EC-CUBE 2.11.0 through 2.11.5 allows remote attackers to obtain sensitive information by leveraging incorrect handling of error-log output.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
http://jvn.jp/en/jp/JVN61077110/index.html third-party-advisoryx_refsource_JVN
http://www.ec-cube.net/info/weakness/weakness.php?id=54 x_refsource_CONFIRM
http://jvndb.jvn.jp/jvndb/JVNDB-2013-000104 third-party-advisoryx_refsource_JVNDB
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T17:29:41.712Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "JVN#61077110",
            "tags": [
              "third-party-advisory",
              "x_refsource_JVN",
              "x_transferred"
            ],
            "url": "http://jvn.jp/en/jp/JVN61077110/index.html"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.ec-cube.net/info/weakness/weakness.php?id=54"
          },
          {
            "name": "JVNDB-2013-000104",
            "tags": [
              "third-party-advisory",
              "x_refsource_JVNDB",
              "x_transferred"
            ],
            "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2013-000104"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2013-11-20T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "The displaySystemError function in html/handle_error.php in LOCKON EC-CUBE 2.11.0 through 2.11.5 allows remote attackers to obtain sensitive information by leveraging incorrect handling of error-log output."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2013-11-23T18:10:04",
        "orgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
        "shortName": "jpcert"
      },
      "references": [
        {
          "name": "JVN#61077110",
          "tags": [
            "third-party-advisory",
            "x_refsource_JVN"
          ],
          "url": "http://jvn.jp/en/jp/JVN61077110/index.html"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.ec-cube.net/info/weakness/weakness.php?id=54"
        },
        {
          "name": "JVNDB-2013-000104",
          "tags": [
            "third-party-advisory",
            "x_refsource_JVNDB"
          ],
          "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2013-000104"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "vultures@jpcert.or.jp",
          "ID": "CVE-2013-5991",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "The displaySystemError function in html/handle_error.php in LOCKON EC-CUBE 2.11.0 through 2.11.5 allows remote attackers to obtain sensitive information by leveraging incorrect handling of error-log output."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "JVN#61077110",
              "refsource": "JVN",
              "url": "http://jvn.jp/en/jp/JVN61077110/index.html"
            },
            {
              "name": "http://www.ec-cube.net/info/weakness/weakness.php?id=54",
              "refsource": "CONFIRM",
              "url": "http://www.ec-cube.net/info/weakness/weakness.php?id=54"
            },
            {
              "name": "JVNDB-2013-000104",
              "refsource": "JVNDB",
              "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2013-000104"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
    "assignerShortName": "jpcert",
    "cveId": "CVE-2013-5991",
    "datePublished": "2013-11-21T02:00:00",
    "dateReserved": "2013-10-03T00:00:00",
    "dateUpdated": "2024-08-06T17:29:41.712Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2013-5994 (GCVE-0-2013-5994)

Vulnerability from cvelistv5 – Published: 2013-11-21 02:00 – Updated: 2024-08-06 17:29
VLAI?
Summary
data/class/pages/mypage/LC_Page_Mypage_DeliveryAddr.php in LOCKON EC-CUBE 2.11.2 through 2.13.0 allows remote attackers to obtain sensitive information via a direct request, which reveals the full path in an error message.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T17:29:42.907Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "JVN#06870202",
            "tags": [
              "third-party-advisory",
              "x_refsource_JVN",
              "x_transferred"
            ],
            "url": "http://jvn.jp/en/jp/JVN06870202/index.html"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://svn.ec-cube.net/open_trac/changeset/23278"
          },
          {
            "name": "JVNDB-2013-000098",
            "tags": [
              "third-party-advisory",
              "x_refsource_JVNDB",
              "x_transferred"
            ],
            "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2013-000098"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.ec-cube.net/info/weakness/weakness.php?id=52"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2013-11-20T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "data/class/pages/mypage/LC_Page_Mypage_DeliveryAddr.php in LOCKON EC-CUBE 2.11.2 through 2.13.0 allows remote attackers to obtain sensitive information via a direct request, which reveals the full path in an error message."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2013-11-23T18:10:04",
        "orgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
        "shortName": "jpcert"
      },
      "references": [
        {
          "name": "JVN#06870202",
          "tags": [
            "third-party-advisory",
            "x_refsource_JVN"
          ],
          "url": "http://jvn.jp/en/jp/JVN06870202/index.html"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://svn.ec-cube.net/open_trac/changeset/23278"
        },
        {
          "name": "JVNDB-2013-000098",
          "tags": [
            "third-party-advisory",
            "x_refsource_JVNDB"
          ],
          "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2013-000098"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.ec-cube.net/info/weakness/weakness.php?id=52"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "vultures@jpcert.or.jp",
          "ID": "CVE-2013-5994",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "data/class/pages/mypage/LC_Page_Mypage_DeliveryAddr.php in LOCKON EC-CUBE 2.11.2 through 2.13.0 allows remote attackers to obtain sensitive information via a direct request, which reveals the full path in an error message."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "JVN#06870202",
              "refsource": "JVN",
              "url": "http://jvn.jp/en/jp/JVN06870202/index.html"
            },
            {
              "name": "http://svn.ec-cube.net/open_trac/changeset/23278",
              "refsource": "CONFIRM",
              "url": "http://svn.ec-cube.net/open_trac/changeset/23278"
            },
            {
              "name": "JVNDB-2013-000098",
              "refsource": "JVNDB",
              "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2013-000098"
            },
            {
              "name": "http://www.ec-cube.net/info/weakness/weakness.php?id=52",
              "refsource": "CONFIRM",
              "url": "http://www.ec-cube.net/info/weakness/weakness.php?id=52"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
    "assignerShortName": "jpcert",
    "cveId": "CVE-2013-5994",
    "datePublished": "2013-11-21T02:00:00",
    "dateReserved": "2013-10-03T00:00:00",
    "dateUpdated": "2024-08-06T17:29:42.907Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2018-0564 (GCVE-0-2018-0564)

Vulnerability from nvd – Published: 2018-04-20 13:00 – Updated: 2024-08-05 03:28
VLAI?
Summary
Session fixation vulnerability in EC-CUBE (EC-CUBE 3.0.0, EC-CUBE 3.0.1, EC-CUBE 3.0.2, EC-CUBE 3.0.3, EC-CUBE 3..4, EC-CUBE 3.0.5, EC-CUBE 3.0.6, EC-CUBE 3.0.7, EC-CUBE 3.0.8, EC-CUBE 3.0.9, EC-CUBE 3.0.10, EC-CUBE 3.0.11, EC-CUBE 3.0.12, EC-CUBE 3.0.12-p1, EC-CUBE 3.0.13, EC-CUBE 3.0.14, EC-CUBE 3.0.15) allows remote attackers to perform arbitrary operations via unspecified vectors.
Severity ?
No CVSS data available.
CWE
  • Session fixation
Assigner
References
Impacted products
Vendor Product Version
LOCKON CO.,LTD. EC-CUBE Affected: (EC-CUBE 3.0.0, EC-CUBE 3.0.1, EC-CUBE 3.0.2, EC-CUBE 3.0.3, EC-CUBE 3..4, EC-CUBE 3.0.5, EC-CUBE 3.0.6, EC-CUBE 3.0.7, EC-CUBE 3.0.8, EC-CUBE 3.0.9, EC-CUBE 3.0.10, EC-CUBE 3.0.11, EC-CUBE 3.0.12, EC-CUBE 3.0.12-p1, EC-CUBE 3.0.13, EC-CUBE 3.0.14, EC-CUBE 3.0.15)
Create a notification for this product.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-05T03:28:11.120Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://www.ec-cube.net/info/weakness/20180416/"
          },
          {
            "name": "JVN#52695336",
            "tags": [
              "third-party-advisory",
              "x_refsource_JVN",
              "x_transferred"
            ],
            "url": "http://jvn.jp/en/jp/JVN52695336/index.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "EC-CUBE",
          "vendor": "LOCKON CO.,LTD.",
          "versions": [
            {
              "status": "affected",
              "version": "(EC-CUBE 3.0.0, EC-CUBE 3.0.1, EC-CUBE 3.0.2, EC-CUBE 3.0.3, EC-CUBE 3..4, EC-CUBE 3.0.5, EC-CUBE 3.0.6, EC-CUBE 3.0.7, EC-CUBE 3.0.8, EC-CUBE 3.0.9, EC-CUBE 3.0.10, EC-CUBE 3.0.11, EC-CUBE 3.0.12, EC-CUBE 3.0.12-p1, EC-CUBE 3.0.13, EC-CUBE 3.0.14, EC-CUBE 3.0.15)"
            }
          ]
        }
      ],
      "datePublic": "2018-04-16T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Session fixation vulnerability in EC-CUBE (EC-CUBE 3.0.0, EC-CUBE 3.0.1, EC-CUBE 3.0.2, EC-CUBE 3.0.3, EC-CUBE 3..4, EC-CUBE 3.0.5, EC-CUBE 3.0.6, EC-CUBE 3.0.7, EC-CUBE 3.0.8, EC-CUBE 3.0.9, EC-CUBE 3.0.10, EC-CUBE 3.0.11, EC-CUBE 3.0.12, EC-CUBE 3.0.12-p1, EC-CUBE 3.0.13, EC-CUBE 3.0.14, EC-CUBE 3.0.15) allows remote attackers to perform arbitrary operations via unspecified vectors."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "Session fixation",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2018-04-20T12:57:01",
        "orgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
        "shortName": "jpcert"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://www.ec-cube.net/info/weakness/20180416/"
        },
        {
          "name": "JVN#52695336",
          "tags": [
            "third-party-advisory",
            "x_refsource_JVN"
          ],
          "url": "http://jvn.jp/en/jp/JVN52695336/index.html"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "vultures@jpcert.or.jp",
          "ID": "CVE-2018-0564",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "EC-CUBE",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "(EC-CUBE 3.0.0, EC-CUBE 3.0.1, EC-CUBE 3.0.2, EC-CUBE 3.0.3, EC-CUBE 3..4, EC-CUBE 3.0.5, EC-CUBE 3.0.6, EC-CUBE 3.0.7, EC-CUBE 3.0.8, EC-CUBE 3.0.9, EC-CUBE 3.0.10, EC-CUBE 3.0.11, EC-CUBE 3.0.12, EC-CUBE 3.0.12-p1, EC-CUBE 3.0.13, EC-CUBE 3.0.14, EC-CUBE 3.0.15)"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "LOCKON CO.,LTD."
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Session fixation vulnerability in EC-CUBE (EC-CUBE 3.0.0, EC-CUBE 3.0.1, EC-CUBE 3.0.2, EC-CUBE 3.0.3, EC-CUBE 3..4, EC-CUBE 3.0.5, EC-CUBE 3.0.6, EC-CUBE 3.0.7, EC-CUBE 3.0.8, EC-CUBE 3.0.9, EC-CUBE 3.0.10, EC-CUBE 3.0.11, EC-CUBE 3.0.12, EC-CUBE 3.0.12-p1, EC-CUBE 3.0.13, EC-CUBE 3.0.14, EC-CUBE 3.0.15) allows remote attackers to perform arbitrary operations via unspecified vectors."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "Session fixation"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://www.ec-cube.net/info/weakness/20180416/",
              "refsource": "CONFIRM",
              "url": "https://www.ec-cube.net/info/weakness/20180416/"
            },
            {
              "name": "JVN#52695336",
              "refsource": "JVN",
              "url": "http://jvn.jp/en/jp/JVN52695336/index.html"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
    "assignerShortName": "jpcert",
    "cveId": "CVE-2018-0564",
    "datePublished": "2018-04-20T13:00:00",
    "dateReserved": "2017-11-27T00:00:00",
    "dateUpdated": "2024-08-05T03:28:11.120Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2016-1201 (GCVE-0-2016-1201)

Vulnerability from nvd – Published: 2016-04-30 10:00 – Updated: 2024-08-05 22:48
VLAI?
Summary
Cross-site request forgery (CSRF) vulnerability in LOCKON EC-CUBE 3.0.0 through 3.0.9 allows remote attackers to hijack the authentication of administrators.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-05T22:48:13.554Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "90515",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/90515"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.ec-cube.net/info/weakness/weakness.php?id=67"
          },
          {
            "name": "JVNDB-2016-000053",
            "tags": [
              "third-party-advisory",
              "x_refsource_JVNDB",
              "x_transferred"
            ],
            "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2016-000053"
          },
          {
            "name": "JVN#73776243",
            "tags": [
              "third-party-advisory",
              "x_refsource_JVN",
              "x_transferred"
            ],
            "url": "http://jvn.jp/en/jp/JVN73776243/index.html"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://www.ec-cube.net/info/weakness/201604/"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2016-04-26T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Cross-site request forgery (CSRF) vulnerability in LOCKON EC-CUBE 3.0.0 through 3.0.9 allows remote attackers to hijack the authentication of administrators."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2016-11-25T19:57:01",
        "orgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
        "shortName": "jpcert"
      },
      "references": [
        {
          "name": "90515",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/90515"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.ec-cube.net/info/weakness/weakness.php?id=67"
        },
        {
          "name": "JVNDB-2016-000053",
          "tags": [
            "third-party-advisory",
            "x_refsource_JVNDB"
          ],
          "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2016-000053"
        },
        {
          "name": "JVN#73776243",
          "tags": [
            "third-party-advisory",
            "x_refsource_JVN"
          ],
          "url": "http://jvn.jp/en/jp/JVN73776243/index.html"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://www.ec-cube.net/info/weakness/201604/"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "vultures@jpcert.or.jp",
          "ID": "CVE-2016-1201",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Cross-site request forgery (CSRF) vulnerability in LOCKON EC-CUBE 3.0.0 through 3.0.9 allows remote attackers to hijack the authentication of administrators."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "90515",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/90515"
            },
            {
              "name": "http://www.ec-cube.net/info/weakness/weakness.php?id=67",
              "refsource": "CONFIRM",
              "url": "http://www.ec-cube.net/info/weakness/weakness.php?id=67"
            },
            {
              "name": "JVNDB-2016-000053",
              "refsource": "JVNDB",
              "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2016-000053"
            },
            {
              "name": "JVN#73776243",
              "refsource": "JVN",
              "url": "http://jvn.jp/en/jp/JVN73776243/index.html"
            },
            {
              "name": "https://www.ec-cube.net/info/weakness/201604/",
              "refsource": "CONFIRM",
              "url": "https://www.ec-cube.net/info/weakness/201604/"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
    "assignerShortName": "jpcert",
    "cveId": "CVE-2016-1201",
    "datePublished": "2016-04-30T10:00:00",
    "dateReserved": "2015-12-26T00:00:00",
    "dateUpdated": "2024-08-05T22:48:13.554Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2016-1200 (GCVE-0-2016-1200)

Vulnerability from nvd – Published: 2016-04-30 10:00 – Updated: 2024-08-05 22:48
VLAI?
Summary
The management screen in LOCKON EC-CUBE 3.0.7 through 3.0.9 allows remote authenticated users to bypass intended access restrictions via unspecified vectors, a different vulnerability than CVE-2016-1199.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-05T22:48:13.542Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "90503",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/90503"
          },
          {
            "name": "JVN#11458774",
            "tags": [
              "third-party-advisory",
              "x_refsource_JVN",
              "x_transferred"
            ],
            "url": "http://jvn.jp/en/jp/JVN11458774/index.html"
          },
          {
            "name": "JVNDB-2016-000052",
            "tags": [
              "third-party-advisory",
              "x_refsource_JVNDB",
              "x_transferred"
            ],
            "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2016-000052"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://www.ec-cube.net/info/weakness/201604/"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.ec-cube.net/info/weakness/weakness.php?id=66"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2016-04-26T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "The management screen in LOCKON EC-CUBE 3.0.7 through 3.0.9 allows remote authenticated users to bypass intended access restrictions via unspecified vectors, a different vulnerability than CVE-2016-1199."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2016-11-25T19:57:01",
        "orgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
        "shortName": "jpcert"
      },
      "references": [
        {
          "name": "90503",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/90503"
        },
        {
          "name": "JVN#11458774",
          "tags": [
            "third-party-advisory",
            "x_refsource_JVN"
          ],
          "url": "http://jvn.jp/en/jp/JVN11458774/index.html"
        },
        {
          "name": "JVNDB-2016-000052",
          "tags": [
            "third-party-advisory",
            "x_refsource_JVNDB"
          ],
          "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2016-000052"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://www.ec-cube.net/info/weakness/201604/"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.ec-cube.net/info/weakness/weakness.php?id=66"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "vultures@jpcert.or.jp",
          "ID": "CVE-2016-1200",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "The management screen in LOCKON EC-CUBE 3.0.7 through 3.0.9 allows remote authenticated users to bypass intended access restrictions via unspecified vectors, a different vulnerability than CVE-2016-1199."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "90503",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/90503"
            },
            {
              "name": "JVN#11458774",
              "refsource": "JVN",
              "url": "http://jvn.jp/en/jp/JVN11458774/index.html"
            },
            {
              "name": "JVNDB-2016-000052",
              "refsource": "JVNDB",
              "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2016-000052"
            },
            {
              "name": "https://www.ec-cube.net/info/weakness/201604/",
              "refsource": "CONFIRM",
              "url": "https://www.ec-cube.net/info/weakness/201604/"
            },
            {
              "name": "http://www.ec-cube.net/info/weakness/weakness.php?id=66",
              "refsource": "CONFIRM",
              "url": "http://www.ec-cube.net/info/weakness/weakness.php?id=66"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
    "assignerShortName": "jpcert",
    "cveId": "CVE-2016-1200",
    "datePublished": "2016-04-30T10:00:00",
    "dateReserved": "2015-12-26T00:00:00",
    "dateUpdated": "2024-08-05T22:48:13.542Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2016-1199 (GCVE-0-2016-1199)

Vulnerability from nvd – Published: 2016-04-30 10:00 – Updated: 2024-08-05 22:48
VLAI?
Summary
The login page in the management screen in LOCKON EC-CUBE 3.0.0 through 3.0.9 allows remote attackers to bypass intended IP address restrictions via unspecified vectors, a different vulnerability than CVE-2016-1200.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-05T22:48:13.513Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "JVN#47473944",
            "tags": [
              "third-party-advisory",
              "x_refsource_JVN",
              "x_transferred"
            ],
            "url": "http://jvn.jp/en/jp/JVN47473944/index.html"
          },
          {
            "name": "JVNDB-2016-000051",
            "tags": [
              "third-party-advisory",
              "x_refsource_JVNDB",
              "x_transferred"
            ],
            "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2016-000051"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.ec-cube.net/info/weakness/weakness.php?id=65"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://www.ec-cube.net/info/weakness/201604/"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2016-04-26T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "The login page in the management screen in LOCKON EC-CUBE 3.0.0 through 3.0.9 allows remote attackers to bypass intended IP address restrictions via unspecified vectors, a different vulnerability than CVE-2016-1200."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2016-04-30T01:57:01",
        "orgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
        "shortName": "jpcert"
      },
      "references": [
        {
          "name": "JVN#47473944",
          "tags": [
            "third-party-advisory",
            "x_refsource_JVN"
          ],
          "url": "http://jvn.jp/en/jp/JVN47473944/index.html"
        },
        {
          "name": "JVNDB-2016-000051",
          "tags": [
            "third-party-advisory",
            "x_refsource_JVNDB"
          ],
          "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2016-000051"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.ec-cube.net/info/weakness/weakness.php?id=65"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://www.ec-cube.net/info/weakness/201604/"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "vultures@jpcert.or.jp",
          "ID": "CVE-2016-1199",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "The login page in the management screen in LOCKON EC-CUBE 3.0.0 through 3.0.9 allows remote attackers to bypass intended IP address restrictions via unspecified vectors, a different vulnerability than CVE-2016-1200."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "JVN#47473944",
              "refsource": "JVN",
              "url": "http://jvn.jp/en/jp/JVN47473944/index.html"
            },
            {
              "name": "JVNDB-2016-000051",
              "refsource": "JVNDB",
              "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2016-000051"
            },
            {
              "name": "http://www.ec-cube.net/info/weakness/weakness.php?id=65",
              "refsource": "CONFIRM",
              "url": "http://www.ec-cube.net/info/weakness/weakness.php?id=65"
            },
            {
              "name": "https://www.ec-cube.net/info/weakness/201604/",
              "refsource": "CONFIRM",
              "url": "https://www.ec-cube.net/info/weakness/201604/"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
    "assignerShortName": "jpcert",
    "cveId": "CVE-2016-1199",
    "datePublished": "2016-04-30T10:00:00",
    "dateReserved": "2015-12-26T00:00:00",
    "dateUpdated": "2024-08-05T22:48:13.513Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2015-5665 (GCVE-0-2015-5665)

Vulnerability from nvd – Published: 2015-10-27 01:00 – Updated: 2024-08-06 06:59
VLAI?
Summary
Cross-site request forgery (CSRF) vulnerability in LOCKON EC-CUBE 2.11.0 through 2.13.3 allows remote attackers to hijack the authentication of arbitrary users for requests that write to PHP scripts, related to the doValidToken function.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T06:59:03.541Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.ec-cube.net/info/weakness/weakness.php?id=63"
          },
          {
            "name": "JVNDB-2015-000166",
            "tags": [
              "third-party-advisory",
              "x_refsource_JVNDB",
              "x_transferred"
            ],
            "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2015-000166"
          },
          {
            "name": "JVN#97278546",
            "tags": [
              "third-party-advisory",
              "x_refsource_JVN",
              "x_transferred"
            ],
            "url": "http://jvn.jp/en/jp/JVN97278546/index.html"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://www.ec-cube.net/info/weakness/201510_01/"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2015-10-26T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Cross-site request forgery (CSRF) vulnerability in LOCKON EC-CUBE 2.11.0 through 2.13.3 allows remote attackers to hijack the authentication of arbitrary users for requests that write to PHP scripts, related to the doValidToken function."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2015-10-27T01:57:01",
        "orgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
        "shortName": "jpcert"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.ec-cube.net/info/weakness/weakness.php?id=63"
        },
        {
          "name": "JVNDB-2015-000166",
          "tags": [
            "third-party-advisory",
            "x_refsource_JVNDB"
          ],
          "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2015-000166"
        },
        {
          "name": "JVN#97278546",
          "tags": [
            "third-party-advisory",
            "x_refsource_JVN"
          ],
          "url": "http://jvn.jp/en/jp/JVN97278546/index.html"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://www.ec-cube.net/info/weakness/201510_01/"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "vultures@jpcert.or.jp",
          "ID": "CVE-2015-5665",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Cross-site request forgery (CSRF) vulnerability in LOCKON EC-CUBE 2.11.0 through 2.13.3 allows remote attackers to hijack the authentication of arbitrary users for requests that write to PHP scripts, related to the doValidToken function."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "http://www.ec-cube.net/info/weakness/weakness.php?id=63",
              "refsource": "CONFIRM",
              "url": "http://www.ec-cube.net/info/weakness/weakness.php?id=63"
            },
            {
              "name": "JVNDB-2015-000166",
              "refsource": "JVNDB",
              "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2015-000166"
            },
            {
              "name": "JVN#97278546",
              "refsource": "JVN",
              "url": "http://jvn.jp/en/jp/JVN97278546/index.html"
            },
            {
              "name": "https://www.ec-cube.net/info/weakness/201510_01/",
              "refsource": "CONFIRM",
              "url": "https://www.ec-cube.net/info/weakness/201510_01/"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
    "assignerShortName": "jpcert",
    "cveId": "CVE-2015-5665",
    "datePublished": "2015-10-27T01:00:00",
    "dateReserved": "2015-07-24T00:00:00",
    "dateUpdated": "2024-08-06T06:59:03.541Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2014-0807 (GCVE-0-2014-0807)

Vulnerability from nvd – Published: 2014-01-22 21:00 – Updated: 2024-08-06 09:27
VLAI?
Summary
data/class/pages/shopping/LC_Page_Shopping_Deliv.php in LOCKON EC-CUBE 2.4.4 and earlier, and 2.11.0 through 2.12.2, allows remote attackers to modify data via unspecified vectors.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
http://www.ec-cube.net/info/weakness/weakness.php?id=56 x_refsource_CONFIRM
http://jvn.jp/en/jp/JVN17849447/index.html third-party-advisoryx_refsource_JVN
http://jvndb.jvn.jp/jvndb/JVNDB-2014-000005 third-party-advisoryx_refsource_JVNDB
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T09:27:20.061Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.ec-cube.net/info/weakness/weakness.php?id=56"
          },
          {
            "name": "JVN#17849447",
            "tags": [
              "third-party-advisory",
              "x_refsource_JVN",
              "x_transferred"
            ],
            "url": "http://jvn.jp/en/jp/JVN17849447/index.html"
          },
          {
            "name": "JVNDB-2014-000005",
            "tags": [
              "third-party-advisory",
              "x_refsource_JVNDB",
              "x_transferred"
            ],
            "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2014-000005"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2014-01-22T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "data/class/pages/shopping/LC_Page_Shopping_Deliv.php in LOCKON EC-CUBE 2.4.4 and earlier, and 2.11.0 through 2.12.2, allows remote attackers to modify data via unspecified vectors."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2014-01-22T21:57:00",
        "orgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
        "shortName": "jpcert"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.ec-cube.net/info/weakness/weakness.php?id=56"
        },
        {
          "name": "JVN#17849447",
          "tags": [
            "third-party-advisory",
            "x_refsource_JVN"
          ],
          "url": "http://jvn.jp/en/jp/JVN17849447/index.html"
        },
        {
          "name": "JVNDB-2014-000005",
          "tags": [
            "third-party-advisory",
            "x_refsource_JVNDB"
          ],
          "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2014-000005"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "vultures@jpcert.or.jp",
          "ID": "CVE-2014-0807",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "data/class/pages/shopping/LC_Page_Shopping_Deliv.php in LOCKON EC-CUBE 2.4.4 and earlier, and 2.11.0 through 2.12.2, allows remote attackers to modify data via unspecified vectors."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "http://www.ec-cube.net/info/weakness/weakness.php?id=56",
              "refsource": "CONFIRM",
              "url": "http://www.ec-cube.net/info/weakness/weakness.php?id=56"
            },
            {
              "name": "JVN#17849447",
              "refsource": "JVN",
              "url": "http://jvn.jp/en/jp/JVN17849447/index.html"
            },
            {
              "name": "JVNDB-2014-000005",
              "refsource": "JVNDB",
              "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2014-000005"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
    "assignerShortName": "jpcert",
    "cveId": "CVE-2014-0807",
    "datePublished": "2014-01-22T21:00:00",
    "dateReserved": "2014-01-06T00:00:00",
    "dateUpdated": "2024-08-06T09:27:20.061Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2014-0808 (GCVE-0-2014-0808)

Vulnerability from nvd – Published: 2014-01-22 21:00 – Updated: 2024-08-06 09:27
VLAI?
Summary
Authorization bypass through user-controlled key issue exists in EC-CUBE 2.11.0 through 2.12.2 and EC-Orange systems deployed before June 29th, 2015. If this vulnerability is exploited, a user of the affected shopping website may obtain other users' information by sending a crafted HTTP request.
CWE
  • Authorization Bypass Through User-Controlled Key
Assigner
Impacted products
Vendor Product Version
EC-CUBE CO.,LTD. EC-CUBE Affected: 2.11.0 through 2.12.2
Create a notification for this product.
    S‑cubism Inc. EC-Orange Affected: systems deployed before June 29th
Affected: 2015
Create a notification for this product.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "cvssV3_1": {
              "attackComplexity": "LOW",
              "attackVector": "NETWORK",
              "availabilityImpact": "NONE",
              "baseScore": 9.1,
              "baseSeverity": "CRITICAL",
              "confidentialityImpact": "HIGH",
              "integrityImpact": "HIGH",
              "privilegesRequired": "NONE",
              "scope": "UNCHANGED",
              "userInteraction": "NONE",
              "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N",
              "version": "3.1"
            }
          },
          {
            "other": {
              "content": {
                "id": "CVE-2014-0808",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "yes"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-06-11T14:04:20.266694Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "problemTypes": [
          {
            "descriptions": [
              {
                "cweId": "CWE-566",
                "description": "CWE-566 Authorization Bypass Through User-Controlled SQL Primary Key",
                "lang": "en",
                "type": "CWE"
              }
            ]
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-06-11T14:07:16.517Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      },
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T09:27:20.153Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "http://www.ec-cube.net/info/weakness/weakness.php?id=57"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "http://jvn.jp/en/jp/JVN51770585/"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2014-000006"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://ec-orange.jp/"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://jvn.jp/en/jp/JVN15637138/"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://jvndb.jvn.jp/jvndb/JVNDB-2024-000054"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "EC-CUBE",
          "vendor": "EC-CUBE CO.,LTD.",
          "versions": [
            {
              "status": "affected",
              "version": "2.11.0 through 2.12.2"
            }
          ]
        },
        {
          "product": "EC-Orange",
          "vendor": "S\u2011cubism Inc.",
          "versions": [
            {
              "status": "affected",
              "version": "systems deployed before June 29th"
            },
            {
              "status": "affected",
              "version": " 2015"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Authorization bypass through user-controlled key issue exists in EC-CUBE 2.11.0 through 2.12.2 and EC-Orange systems deployed before June 29th, 2015. If this vulnerability is exploited, a user of the affected shopping website may obtain other users\u0027 information by sending a crafted HTTP request."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "Authorization Bypass Through User-Controlled Key",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-06-11T05:17:08.940Z",
        "orgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
        "shortName": "jpcert"
      },
      "references": [
        {
          "url": "http://www.ec-cube.net/info/weakness/weakness.php?id=57"
        },
        {
          "url": "http://jvn.jp/en/jp/JVN51770585/"
        },
        {
          "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2014-000006"
        },
        {
          "url": "https://ec-orange.jp/"
        },
        {
          "url": "https://jvn.jp/en/jp/JVN15637138/"
        },
        {
          "url": "https://jvndb.jvn.jp/jvndb/JVNDB-2024-000054"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
    "assignerShortName": "jpcert",
    "cveId": "CVE-2014-0808",
    "datePublished": "2014-01-22T21:00:00",
    "dateReserved": "2014-01-06T00:00:00",
    "dateUpdated": "2024-08-06T09:27:20.153Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2013-5991 (GCVE-0-2013-5991)

Vulnerability from nvd – Published: 2013-11-21 02:00 – Updated: 2024-08-06 17:29
VLAI?
Summary
The displaySystemError function in html/handle_error.php in LOCKON EC-CUBE 2.11.0 through 2.11.5 allows remote attackers to obtain sensitive information by leveraging incorrect handling of error-log output.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
http://jvn.jp/en/jp/JVN61077110/index.html third-party-advisoryx_refsource_JVN
http://www.ec-cube.net/info/weakness/weakness.php?id=54 x_refsource_CONFIRM
http://jvndb.jvn.jp/jvndb/JVNDB-2013-000104 third-party-advisoryx_refsource_JVNDB
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T17:29:41.712Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "JVN#61077110",
            "tags": [
              "third-party-advisory",
              "x_refsource_JVN",
              "x_transferred"
            ],
            "url": "http://jvn.jp/en/jp/JVN61077110/index.html"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.ec-cube.net/info/weakness/weakness.php?id=54"
          },
          {
            "name": "JVNDB-2013-000104",
            "tags": [
              "third-party-advisory",
              "x_refsource_JVNDB",
              "x_transferred"
            ],
            "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2013-000104"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2013-11-20T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "The displaySystemError function in html/handle_error.php in LOCKON EC-CUBE 2.11.0 through 2.11.5 allows remote attackers to obtain sensitive information by leveraging incorrect handling of error-log output."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2013-11-23T18:10:04",
        "orgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
        "shortName": "jpcert"
      },
      "references": [
        {
          "name": "JVN#61077110",
          "tags": [
            "third-party-advisory",
            "x_refsource_JVN"
          ],
          "url": "http://jvn.jp/en/jp/JVN61077110/index.html"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.ec-cube.net/info/weakness/weakness.php?id=54"
        },
        {
          "name": "JVNDB-2013-000104",
          "tags": [
            "third-party-advisory",
            "x_refsource_JVNDB"
          ],
          "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2013-000104"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "vultures@jpcert.or.jp",
          "ID": "CVE-2013-5991",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "The displaySystemError function in html/handle_error.php in LOCKON EC-CUBE 2.11.0 through 2.11.5 allows remote attackers to obtain sensitive information by leveraging incorrect handling of error-log output."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "JVN#61077110",
              "refsource": "JVN",
              "url": "http://jvn.jp/en/jp/JVN61077110/index.html"
            },
            {
              "name": "http://www.ec-cube.net/info/weakness/weakness.php?id=54",
              "refsource": "CONFIRM",
              "url": "http://www.ec-cube.net/info/weakness/weakness.php?id=54"
            },
            {
              "name": "JVNDB-2013-000104",
              "refsource": "JVNDB",
              "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2013-000104"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
    "assignerShortName": "jpcert",
    "cveId": "CVE-2013-5991",
    "datePublished": "2013-11-21T02:00:00",
    "dateReserved": "2013-10-03T00:00:00",
    "dateUpdated": "2024-08-06T17:29:41.712Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}