Show filters
114 Total Results
Displaying 81-90 of 114
Sort by:
Attacker Value
Unknown
CVE-2020-16632
Disclosure Date: May 15, 2021 (last updated February 22, 2025)
A XSS Vulnerability in /uploads/dede/action_search.php in DedeCMS V5.7 SP2 allows an authenticated user to execute remote arbitrary code via the keyword parameter.
0
Attacker Value
Unknown
CVE-2021-32073
Disclosure Date: May 15, 2021 (last updated February 22, 2025)
DedeCMS V5.7 SP2 contains a CSRF vulnerability that allows a remote attacker to send a malicious request to to the web manager allowing remote code execution.
0
Attacker Value
Unknown
CVE-2020-27533
Disclosure Date: October 22, 2020 (last updated February 22, 2025)
A Cross Site Scripting (XSS) issue was discovered in the search feature of DedeCMS v.5.8 that allows malicious users to inject code into web pages, and other users will be affected when viewing web pages.
0
Attacker Value
Unknown
CVE-2015-4553
Disclosure Date: January 06, 2020 (last updated February 21, 2025)
A file upload issue exists in DeDeCMS before 5.7-sp1, which allows malicious users getshell.
0
Attacker Value
Unknown
CVE-2019-10014
Disclosure Date: March 24, 2019 (last updated November 27, 2024)
In DedeCMS 5.7SP2, member/resetpassword.php allows remote authenticated users to reset the passwords of arbitrary users via a modified id parameter, because the key parameter is not properly validated.
0
Attacker Value
Unknown
CVE-2019-8933
Disclosure Date: February 19, 2019 (last updated November 27, 2024)
In DedeCMS 5.7SP2, attackers can upload a .php file to the uploads/ directory (without being blocked by the Web Application Firewall), and then execute this file, via this sequence of steps: visiting the management page, clicking on the template, clicking on Default Template Management, clicking on New Template, and modifying the filename from ../index.html to ../index.php.
0
Attacker Value
Unknown
CVE-2019-8362
Disclosure Date: February 16, 2019 (last updated November 27, 2024)
DedeCMS through V5.7SP2 allows arbitrary file upload in dede/album_edit.php or dede/album_add.php, as demonstrated by a dede/album_edit.php?dopost=save&formzip=1 request with a ZIP archive that contains a file such as "1.jpg.php" (because input validation only checks that .jpg, .png, or .gif is present as a substring, and does not otherwise check the file name or content).
0
Attacker Value
Unknown
CVE-2019-6289
Disclosure Date: January 15, 2019 (last updated November 27, 2024)
uploads/include/dialog/select_soft.php in DedeCMS V57_UTF8_SP2 allows remote attackers to execute arbitrary PHP code by uploading with a safe file extension and then renaming with a mixed-case variation of the .php extension, as demonstrated by the 1.pHP filename.
0
Attacker Value
Unknown
CVE-2018-20129
Disclosure Date: December 13, 2018 (last updated November 27, 2024)
An issue was discovered in DedeCMS V5.7 SP2. uploads/include/dialog/select_images_post.php allows remote attackers to upload and execute arbitrary PHP code via a double extension and a modified ".php" substring, in conjunction with the image/jpeg content type, as demonstrated by the filename=1.jpg.p*hp value.
0
Attacker Value
Unknown
CVE-2018-19061
Disclosure Date: November 07, 2018 (last updated November 27, 2024)
DedeCMS 5.7 SP2 has SQL Injection via the dede\co_do.php ids parameter.
0