Filtered by vendor Dedecms
Subscribe
Total
88 CVE
CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
---|---|---|---|---|---|
CVE-2018-9174 | 1 Dedecms | 1 Dedecms | 2018-05-02 | 7.5 HIGH | 9.8 CRITICAL |
sys_verifies.php in DedeCMS 5.7 allows remote attackers to execute arbitrary PHP code via the refiles array parameter, because the contents of modifytmp.inc are under an attacker's control. | |||||
CVE-2018-9134 | 1 Dedecms | 1 Dedecms | 2018-04-23 | 6.8 MEDIUM | 8.8 HIGH |
file_manage_control.php in DedeCMS 5.7 has CSRF in an fmdo=rename action, as demonstrated by renaming an arbitrary file under uploads/userup to a .php file under the web root to achieve PHP code execution. This uses the oldfilename and newfilename parameters. | |||||
CVE-2018-7700 | 1 Dedecms | 1 Dedecms | 2018-04-19 | 6.8 MEDIUM | 8.8 HIGH |
DedeCMS 5.7 has CSRF with an impact of arbitrary code execution, because the partcode parameter in a tag_test_action.php request can specify a runphp field in conjunction with PHP code. | |||||
CVE-2017-17731 | 1 Dedecms | 1 Dedecms | 2018-01-04 | 7.5 HIGH | 9.8 CRITICAL |
DedeCMS through 5.7 has SQL Injection via the $_FILES superglobal to plus/recommend.php. | |||||
CVE-2017-17727 | 1 Dedecms | 1 Dedecms | 2018-01-04 | 6.8 MEDIUM | 8.8 HIGH |
DedeCMS through 5.6 allows arbitrary file upload and PHP code execution by embedding the PHP code in a .jpg file, which is used in the templet parameter to member/article_edit.php. | |||||
CVE-2017-17730 | 1 Dedecms | 1 Dedecms | 2018-01-04 | 7.5 HIGH | 9.8 CRITICAL |
DedeCMS through 5.7 has SQL Injection via the logo parameter to plus/flink_add.php. | |||||
CVE-2011-5200 | 1 Dedecms | 1 Dedecms | 2017-08-29 | 7.5 HIGH | N/A |
Multiple SQL injection vulnerabilities in DeDeCMS, possibly 5.6, allow remote attackers to execute arbitrary SQL commands via the id parameter to (1) list.php, (2) members.php, or (3) book.php. | |||||
CVE-2010-1097 | 1 Dedecms | 1 Dedecms | 2010-12-14 | 6.8 MEDIUM | N/A |
include/userlogin.class.php in DeDeCMS 5.5 GBK, when session.auto_start is enabled, allows remote attackers to bypass authentication and gain administrative access via a value of 1 for the _SESSION[dede_admin_id] parameter, as demonstrated by a request to uploads/include/dialog/select_soft_post.php. |