Filtered by vendor Sharetronix
Subscriptions
Filtered by product Sharetronix
Subscriptions
Total
7 CVE
CVE | Vendors | Products | Updated | CVSS v3.1 |
---|---|---|---|---|
CVE-2014-3415 | 1 Sharetronix | 1 Sharetronix | 2024-11-21 | N/A |
SQL injection vulnerability in Sharetronix before 3.4 allows remote authenticated users to execute arbitrary SQL commands via the invite_users[] parameter to the /invite page for a group. | ||||
CVE-2014-3414 | 1 Sharetronix | 1 Sharetronix | 2024-11-21 | N/A |
Cross-site request forgery (CSRF) vulnerability in Sharetronix before 3.4 allows remote attackers to hijack the authentication of administrators for requests that add administrative privileges to a user via the admin parameter to admin/administrators. | ||||
CVE-2013-5356 | 1 Sharetronix | 1 Sharetronix | 2024-11-21 | N/A |
Sharetronix 3.1.1.3, 3.1.1, and earlier does not properly restrict access to unspecified AJAX functionality, which allows remote attackers to bypass authentication via unknown vectors. | ||||
CVE-2013-5355 | 1 Sharetronix | 1 Sharetronix | 2024-11-21 | N/A |
Multiple cross-site request forgery (CSRF) vulnerabilities in Sharetronix 3.1.1 allow remote attackers to hijack the authentication of administrators for requests that (1) change configuration settings or (2) create new administrative users via unspecified vectors. | ||||
CVE-2013-5354 | 1 Sharetronix | 1 Sharetronix | 2024-11-21 | N/A |
Multiple SQL injection vulnerabilities in Sharetronix 3.1.1 allow remote attackers to execute arbitrary SQL commands via the (1) fb_user_id or (2) tw_user_id parameter to signup. | ||||
CVE-2013-5353 | 1 Sharetronix | 1 Sharetronix | 2024-11-21 | N/A |
Unrestricted file upload vulnerability in system/controllers/ajax/attachments.php in Sharetronix 3.1.1.3, 3.1.1, and earlier allows remote attackers to execute arbitrary code by uploading a file with an executable extension, then accessing it via a direct request to the file in an unspecified directory. | ||||
CVE-2013-5352 | 1 Sharetronix | 1 Sharetronix | 2024-11-21 | N/A |
Sharetronix 3.1.1.3, 3.1.1, and earlier allows remote attackers to execute arbitrary PHP code via the (1) activities_text parameter to services/activities/set or (2) comments_text parameter to services/comments/set, which is not properly handled when executing the preg_replace function with the e modifier. |
Page 1 of 1.