Vulnerabilities (CVE)

Filtered by vendor Dedecms Subscribe
Total 88 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2018-9174 1 Dedecms 1 Dedecms 2023-12-10 7.5 HIGH 9.8 CRITICAL
sys_verifies.php in DedeCMS 5.7 allows remote attackers to execute arbitrary PHP code via the refiles array parameter, because the contents of modifytmp.inc are under an attacker's control.
CVE-2017-17731 1 Dedecms 1 Dedecms 2023-12-10 7.5 HIGH 9.8 CRITICAL
DedeCMS through 5.7 has SQL Injection via the $_FILES superglobal to plus/recommend.php.
CVE-2017-17727 1 Dedecms 1 Dedecms 2023-12-10 6.8 MEDIUM 8.8 HIGH
DedeCMS through 5.6 allows arbitrary file upload and PHP code execution by embedding the PHP code in a .jpg file, which is used in the templet parameter to member/article_edit.php.
CVE-2017-17730 1 Dedecms 1 Dedecms 2023-12-10 7.5 HIGH 9.8 CRITICAL
DedeCMS through 5.7 has SQL Injection via the logo parameter to plus/flink_add.php.
CVE-2011-5200 1 Dedecms 1 Dedecms 2023-12-10 7.5 HIGH N/A
Multiple SQL injection vulnerabilities in DeDeCMS, possibly 5.6, allow remote attackers to execute arbitrary SQL commands via the id parameter to (1) list.php, (2) members.php, or (3) book.php.
CVE-2010-1097 1 Dedecms 1 Dedecms 2023-12-10 6.8 MEDIUM N/A
include/userlogin.class.php in DeDeCMS 5.5 GBK, when session.auto_start is enabled, allows remote attackers to bypass authentication and gain administrative access via a value of 1 for the _SESSION[dede_admin_id] parameter, as demonstrated by a request to uploads/include/dialog/select_soft_post.php.
CVE-2009-3806 1 Dedecms 1 Dedecms 2023-12-10 7.5 HIGH N/A
SQL injection vulnerability in feedback_js.php in DedeCMS 5.1 allows remote attackers to execute arbitrary SQL commands via the arcurl parameter.
CVE-2009-2270 1 Dedecms 1 Dedecms 2023-12-10 6.8 MEDIUM N/A
Unrestricted file upload vulnerability in member/uploads_edit.php in dedecms 5.3 allows remote attackers to execute arbitrary code by uploading a file with a double extension in the filename, then accessing this file via unspecified vectors, as demonstrated by a .jpg.php filename.