Vulnerabilities > Sitracker > Support Incident Tracker > 3.65
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2012-05-27 | CVE-2012-2235 | Cross-Site Scripting vulnerability in Sitracker Support Incident Tracker Cross-site scripting (XSS) vulnerability in Support Incident Tracker (SiT!) 3.65 and earlier allows remote attackers to inject arbitrary web script or HTML via the id parameter to index.php, which is not properly handled in an error message. | 4.3 |
2012-01-29 | CVE-2011-5075 | Unspecified vulnerability in Sitracker Support Incident Tracker translate.php in Support Incident Tracker (aka SiT!) 3.45 through 3.65 allows remote attackers to obtain sensitive information via a direct request using the save action, which reveals the installation path. | 5.0 |
2012-01-29 | CVE-2011-4337 | Code Injection vulnerability in Sitracker Support Incident Tracker Static code injection vulnerability in translate.php in Support Incident Tracker (aka SiT!) 3.45 through 3.65 allows remote attackers to inject arbitrary PHP code into an executable language file in the i18n directory via the lang variable. | 7.5 |
2012-01-29 | CVE-2011-5070 | Cross-Site Scripting vulnerability in Sitracker Support Incident Tracker 3.65 Multiple cross-site scripting (XSS) vulnerabilities in Support Incident Tracker (aka SiT!) 3.65 allow remote attackers to inject arbitrary web script or HTML via (1) the file name to incident_attachments.php; (2) unspecified vectors in link_add.php, possibly involving origref, linkref, linktype parameters, which are not properly handled in the clean_int function in lib/base.inc.php, or the redirect parameter, which is not properly handled in the html_redirect function in lib/html.inc.php; and (3) unspecified vectors in translate.php. | 4.3 |
2012-01-29 | CVE-2011-5069 | Input Validation vulnerability in Sitracker Support Incident Tracker 3.65 Unrestricted file upload vulnerability in incident_attachments.php in Support Incident Tracker (aka SiT!) 3.65 allows remote authenticated users to execute arbitrary code by uploading a file with an executable extension, then accessing it via a direct request to the file in unspecified directory, a different program than CVE-2011-3833. network sitracker | 6.0 |
2012-01-29 | CVE-2011-5068 | Cross-Site Request Forgery (CSRF) vulnerability in Sitracker Support Incident Tracker 3.65 Multiple cross-site request forgery (CSRF) vulnerabilities in Support Incident Tracker (aka SiT!) 3.65 allow remote attackers to hijack the authentication of user for requests that delete a user via user_delete.php and other unspecified programs. | 6.8 |
2012-01-29 | CVE-2011-5067 | Information Exposure vulnerability in Sitracker Support Incident Tracker 3.65 move_uploaded_file.php in Support Incident Tracker (aka SiT!) 3.65 allows remote authenticated users to obtain sensitive information via the file name, which reveals the installation path in an error message. | 4.0 |
2012-01-29 | CVE-2011-3833 | Input Validation vulnerability in Sitracker Support Incident Tracker 3.65 Unrestricted file upload vulnerability in ftp_upload_file.php in Support Incident Tracker (aka SiT!) 3.65 allows remote authenticated users to execute arbitrary PHP code by uploading a PHP file, then accessing it via a direct request to the file in an unspecified directory. network sitracker | 6.0 |
2012-01-29 | CVE-2011-3832 | Code Injection vulnerability in Sitracker Support Incident Tracker 3.65 Eval injection vulnerability in config.php in Support Incident Tracker (aka SiT!) 3.65 allows remote authenticated administrators to execute arbitrary PHP code via the application_name parameter in a save action. | 6.5 |
2012-01-29 | CVE-2011-3831 | SQL Injection vulnerability in Sitracker Support Incident Tracker 3.65 SQL injection vulnerability in incident_attachments.php in Support Incident Tracker (aka SiT!) 3.65 allows remote attackers to execute arbitrary SQL commands via an uploaded file with a crafted file name. | 7.5 |