Dedecms

Dedecms

164 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
Exploit
  • EPSS 0.36%
  • Veröffentlicht 15.05.2021 00:15:07
  • Zuletzt bearbeitet 21.11.2024 05:07:12

A XSS Vulnerability in /uploads/dede/action_search.php in DedeCMS V5.7 SP2 allows an authenticated user to execute remote arbitrary code via the keyword parameter.

Exploit
  • EPSS 0.37%
  • Veröffentlicht 15.05.2021 00:15:07
  • Zuletzt bearbeitet 21.11.2024 06:06:48

DedeCMS V5.7 SP2 contains a CSRF vulnerability that allows a remote attacker to send a malicious request to to the web manager allowing remote code execution.

Exploit
  • EPSS 0.63%
  • Veröffentlicht 22.10.2020 15:15:13
  • Zuletzt bearbeitet 21.11.2024 05:21:19

A Cross Site Scripting (XSS) issue was discovered in the search feature of DedeCMS v.5.8 that allows malicious users to inject code into web pages, and other users will be affected when viewing web pages.

Exploit
  • EPSS 38.52%
  • Veröffentlicht 06.01.2020 21:15:11
  • Zuletzt bearbeitet 21.11.2024 02:31:19

A file upload issue exists in DeDeCMS before 5.7-sp1, which allows malicious users getshell.

Exploit
  • EPSS 0.11%
  • Veröffentlicht 24.03.2019 22:29:00
  • Zuletzt bearbeitet 21.11.2024 04:18:13

In DedeCMS 5.7SP2, member/resetpassword.php allows remote authenticated users to reset the passwords of arbitrary users via a modified id parameter, because the key parameter is not properly validated.

Exploit
  • EPSS 24.35%
  • Veröffentlicht 19.02.2019 02:29:00
  • Zuletzt bearbeitet 21.11.2024 04:50:41

In DedeCMS 5.7SP2, attackers can upload a .php file to the uploads/ directory (without being blocked by the Web Application Firewall), and then execute this file, via this sequence of steps: visiting the management page, clicking on the template, cli...

Exploit
  • EPSS 0.21%
  • Veröffentlicht 16.02.2019 22:29:00
  • Zuletzt bearbeitet 21.11.2024 04:49:45

DedeCMS through V5.7SP2 allows arbitrary file upload in dede/album_edit.php or dede/album_add.php, as demonstrated by a dede/album_edit.php?dopost=save&formzip=1 request with a ZIP archive that contains a file such as "1.jpg.php" (because input valid...

  • EPSS 0.91%
  • Veröffentlicht 15.01.2019 07:29:00
  • Zuletzt bearbeitet 21.11.2024 04:46:22

uploads/include/dialog/select_soft.php in DedeCMS V57_UTF8_SP2 allows remote attackers to execute arbitrary PHP code by uploading with a safe file extension and then renaming with a mixed-case variation of the .php extension, as demonstrated by the 1...

Exploit
  • EPSS 69.56%
  • Veröffentlicht 13.12.2018 08:29:00
  • Zuletzt bearbeitet 21.11.2024 04:00:54

An issue was discovered in DedeCMS V5.7 SP2. uploads/include/dialog/select_images_post.php allows remote attackers to upload and execute arbitrary PHP code via a double extension and a modified ".php" substring, in conjunction with the image/jpeg con...

Exploit
  • EPSS 0.38%
  • Veröffentlicht 07.11.2018 17:29:00
  • Zuletzt bearbeitet 21.11.2024 03:57:15

DedeCMS 5.7 SP2 has SQL Injection via the dede\co_do.php ids parameter.