First published: Thu Dec 03 2020(Updated: )
Improper input validation vulnerability in EC-CUBE versions from 3.0.5 to 3.0.18 allows a remote attacker to cause a denial-of-service (DoS) condition via unspecified vector.
Credit: vultures@jpcert.or.jp vultures@jpcert.or.jp
Affected Software | Affected Version | How to fix |
---|---|---|
EC-CUBE EC-CUBE | >=3.0.5<=3.0.18 | |
composer/ec-cube/ec-cube | >=3.0.5<=3.0.18 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this EC-CUBE vulnerability is CVE-2020-5680.
The severity level of CVE-2020-5680 is high with a CVSS score of 7.5.
The affected software for CVE-2020-5680 is EC-CUBE versions from 3.0.5 to 3.0.18.
CVE-2020-5680 allows a remote attacker to cause a denial-of-service (DoS) condition in EC-CUBE.
Yes, you can find references for CVE-2020-5680 at the following URLs: [https://jvn.jp/en/jp/JVN24457594/index.html](https://jvn.jp/en/jp/JVN24457594/index.html) and [https://www.ec-cube.net/info/weakness/](https://www.ec-cube.net/info/weakness/)