Filtered by vendor Dedecms
Subscribe
Total
88 CVE
CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
---|---|---|---|---|---|
CVE-2018-9174 | 1 Dedecms | 1 Dedecms | 2023-12-10 | 7.5 HIGH | 9.8 CRITICAL |
sys_verifies.php in DedeCMS 5.7 allows remote attackers to execute arbitrary PHP code via the refiles array parameter, because the contents of modifytmp.inc are under an attacker's control. | |||||
CVE-2017-17731 | 1 Dedecms | 1 Dedecms | 2023-12-10 | 7.5 HIGH | 9.8 CRITICAL |
DedeCMS through 5.7 has SQL Injection via the $_FILES superglobal to plus/recommend.php. | |||||
CVE-2017-17727 | 1 Dedecms | 1 Dedecms | 2023-12-10 | 6.8 MEDIUM | 8.8 HIGH |
DedeCMS through 5.6 allows arbitrary file upload and PHP code execution by embedding the PHP code in a .jpg file, which is used in the templet parameter to member/article_edit.php. | |||||
CVE-2017-17730 | 1 Dedecms | 1 Dedecms | 2023-12-10 | 7.5 HIGH | 9.8 CRITICAL |
DedeCMS through 5.7 has SQL Injection via the logo parameter to plus/flink_add.php. | |||||
CVE-2011-5200 | 1 Dedecms | 1 Dedecms | 2023-12-10 | 7.5 HIGH | N/A |
Multiple SQL injection vulnerabilities in DeDeCMS, possibly 5.6, allow remote attackers to execute arbitrary SQL commands via the id parameter to (1) list.php, (2) members.php, or (3) book.php. | |||||
CVE-2010-1097 | 1 Dedecms | 1 Dedecms | 2023-12-10 | 6.8 MEDIUM | N/A |
include/userlogin.class.php in DeDeCMS 5.5 GBK, when session.auto_start is enabled, allows remote attackers to bypass authentication and gain administrative access via a value of 1 for the _SESSION[dede_admin_id] parameter, as demonstrated by a request to uploads/include/dialog/select_soft_post.php. | |||||
CVE-2009-3806 | 1 Dedecms | 1 Dedecms | 2023-12-10 | 7.5 HIGH | N/A |
SQL injection vulnerability in feedback_js.php in DedeCMS 5.1 allows remote attackers to execute arbitrary SQL commands via the arcurl parameter. | |||||
CVE-2009-2270 | 1 Dedecms | 1 Dedecms | 2023-12-10 | 6.8 MEDIUM | N/A |
Unrestricted file upload vulnerability in member/uploads_edit.php in dedecms 5.3 allows remote attackers to execute arbitrary code by uploading a file with a double extension in the filename, then accessing this file via unspecified vectors, as demonstrated by a .jpg.php filename. |