Description
Multiple SQL injection vulnerabilities in Gnew 2013.1 allow remote attackers to execute arbitrary SQL commands via the (1) news_id parameter to news/send.php, (2) thread_id parameter to posts/edit.php, or (3) user_email parameter to users/password.php or (4) users/register.php. NOTE: these issues were SPLIT from CVE-2013-5640 due to differences in researchers and disclosure dates.
Published: 2014-04-01
Score: 7.5 High
EPSS: 7.9% Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

No remediation available yet.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

No history.

Subscriptions

Raoul Proenca Gnew
cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2024-08-06T18:01:20.432Z

Reserved: 2014-03-31T00:00:00.000Z

Link: CVE-2013-7349

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2014-04-01T03:25:11.177

Modified: 2026-05-06T22:30:45.220

Link: CVE-2013-7349

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses