Vulnerabilities > Intelliants > Subrion CMS > 2.0.3

DATE CVE VULNERABILITY TITLE RISK
2022-02-24 CVE-2021-43724 Cross-site Scripting vulnerability in Intelliants Subrion CMS
A Cross Site Scripting (XSS) vulnerability exits in Subrion CMS through 4.2.1 in the Create Page functionality of the admin Account via a SGV file.
3.5
2017-07-19 CVE-2017-11445 SQL Injection vulnerability in Intelliants Subrion CMS
Subrion CMS before 4.1.6 has a SQL injection vulnerability in /front/actions.php via the $_POST array.
network
low complexity
intelliants CWE-89
7.5
2017-07-19 CVE-2017-11444 SQL Injection vulnerability in Intelliants Subrion CMS
Subrion CMS before 4.1.5.10 has a SQL injection vulnerability in /front/search.php via the $_GET array.
network
low complexity
intelliants CWE-89
7.5
2015-07-05 CVE-2015-4129 SQL Injection vulnerability in Intelliants Subrion CMS
SQL injection vulnerability in Subrion CMS before 3.3.3 allows remote authenticated users to execute arbitrary SQL commands via modified serialized data in a salt cookie.
network
low complexity
intelliants CWE-89
6.5
2012-10-22 CVE-2012-4773 Cross-Site Request Forgery (CSRF) vulnerability in Intelliants Subrion CMS
Multiple cross-site request forgery (CSRF) vulnerabilities in Subrion CMS before 2.2.3 allow remote attackers to hijack the authentication of administrators for requests that add, delete, or modify sensitive information, as demonstrated by adding an administrator account via an add action to admin/accounts/add/.
6.8
2012-10-22 CVE-2012-4772 SQL Injection vulnerability in Intelliants Subrion CMS
SQL injection vulnerability in register/ in Subrion CMS before 2.2.3 allows remote attackers to execute arbitrary SQL commands via the plan_id parameter.
network
low complexity
intelliants CWE-89
7.5
2012-10-22 CVE-2012-4771 Cross-Site Scripting vulnerability in Intelliants Subrion CMS
Multiple cross-site scripting (XSS) vulnerabilities in Subrion CMS before 2.2.3 allow remote attackers to inject arbitrary web script or HTML via the id parameter to (1) admin/accounts/, (2) admin/manage/, or (3) admin/manage/blocks/edit/; or (4) group parameter to admin/configuration/.
4.3