Vulnerabilities (CVE)

Filtered by vendor Sharetronix Subscribe
Filtered by product Sharetronix
Total 7 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2014-3415 1 Sharetronix 1 Sharetronix 2024-11-21 6.5 MEDIUM N/A
SQL injection vulnerability in Sharetronix before 3.4 allows remote authenticated users to execute arbitrary SQL commands via the invite_users[] parameter to the /invite page for a group.
CVE-2014-3414 1 Sharetronix 1 Sharetronix 2024-11-21 6.8 MEDIUM N/A
Cross-site request forgery (CSRF) vulnerability in Sharetronix before 3.4 allows remote attackers to hijack the authentication of administrators for requests that add administrative privileges to a user via the admin parameter to admin/administrators.
CVE-2013-5356 1 Sharetronix 1 Sharetronix 2024-11-21 7.5 HIGH N/A
Sharetronix 3.1.1.3, 3.1.1, and earlier does not properly restrict access to unspecified AJAX functionality, which allows remote attackers to bypass authentication via unknown vectors.
CVE-2013-5355 1 Sharetronix 1 Sharetronix 2024-11-21 6.8 MEDIUM N/A
Multiple cross-site request forgery (CSRF) vulnerabilities in Sharetronix 3.1.1 allow remote attackers to hijack the authentication of administrators for requests that (1) change configuration settings or (2) create new administrative users via unspecified vectors.
CVE-2013-5354 1 Sharetronix 1 Sharetronix 2024-11-21 7.5 HIGH N/A
Multiple SQL injection vulnerabilities in Sharetronix 3.1.1 allow remote attackers to execute arbitrary SQL commands via the (1) fb_user_id or (2) tw_user_id parameter to signup.
CVE-2013-5353 1 Sharetronix 1 Sharetronix 2024-11-21 6.8 MEDIUM N/A
Unrestricted file upload vulnerability in system/controllers/ajax/attachments.php in Sharetronix 3.1.1.3, 3.1.1, and earlier allows remote attackers to execute arbitrary code by uploading a file with an executable extension, then accessing it via a direct request to the file in an unspecified directory.
CVE-2013-5352 1 Sharetronix 1 Sharetronix 2024-11-21 6.8 MEDIUM N/A
Sharetronix 3.1.1.3, 3.1.1, and earlier allows remote attackers to execute arbitrary PHP code via the (1) activities_text parameter to services/activities/set or (2) comments_text parameter to services/comments/set, which is not properly handled when executing the preg_replace function with the e modifier.