3 results (0.031 seconds)

CVSS: 7.2EPSS: 0%CPEs: 1EXPL: 1

A vulnerability was found in Muyun DedeBIZ up to 6.2.12 and classified as critical. Affected by this issue is some unknown functionality of the component Add Attachment Handler. The manipulation leads to unrestricted upload. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. • https://github.com/JTZ-a/SRC/blob/master/DedeBIZ/DedeBIZ%20-%20file%20upload/README.md https://vuldb.com/?ctiid.249368 https://vuldb.com/?id.249368 • CWE-434: Unrestricted Upload of File with Dangerous Type •

CVSS: 5.4EPSS: 0%CPEs: 1EXPL: 0

A stored cross-site scripting (XSS) vulnerability in the Website column management function of DedeBIZ v6.2.11 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the title parameter. Una vulnerabilidad de cross-site scripting (XSS) almacenadas en la función de administración de columnas del sitio web de DedeBIZ v6.2.11 permite a los atacantes ejecutar scripts web o HTML arbitrarias a través de un payload manipulado inyectado en el parámetro del título. • http://dedebiz.com https://github.com/yux1azhengye/mycve/blob/main/dedebiz_6.2.11_xss.pdf https://www.dedebiz.com/download • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 9.8EPSS: 0%CPEs: 1EXPL: 0

DedeBIZ v6.2.11 was discovered to contain multiple remote code execution (RCE) vulnerabilities at /admin/file_manage_control.php via the $activepath and $filename parameters. Se descubrió que DedeBIZ v6.2.11 contiene múltiples vulnerabilidades de Ejecución Remota de Código (RCE) en /admin/file_manage_control.php a través de los parámetros $activepath y $filename. • http://dedebiz.com https://github.com/yux1azhengye https://github.com/yux1azhengye/mycve/blob/main/DedeBIZ_v6.2.11_RCE.pdf https://www.dedebiz.com • CWE-94: Improper Control of Generation of Code ('Code Injection') •