Page 2 of 13 results (0.005 seconds)

CVSS: 7.2EPSS: 0%CPEs: 1EXPL: 1

A vulnerability was found in DedeBIZ 6.2 and classified as critical. This issue affects some unknown processing of the file /src/admin/makehtml_taglist_action.php. The manipulation of the argument mktime leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. • https://github.com/yhy217/dedebiz--vul/issues/2 https://vuldb.com/?ctiid.240881 https://vuldb.com/?id.240881 • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •

CVSS: 8.8EPSS: 0%CPEs: 1EXPL: 2

A vulnerability, which was classified as critical, was found in DedeBIZ 6.2. This affects an unknown part of the file /src/admin/tags_main.php. The manipulation of the argument ids leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. • https://github.com/yhy217/dedebiz--vul/blob/main/time_injection.zip https://github.com/yhy217/dedebiz--vul/issues/1 https://vuldb.com/?ctiid.240879 https://vuldb.com/?id.240879 • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •

CVSS: 5.4EPSS: 0%CPEs: 1EXPL: 0

A stored cross-site scripting (XSS) vulnerability in the Website column management function of DedeBIZ v6.2.11 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the title parameter. Una vulnerabilidad de cross-site scripting (XSS) almacenadas en la función de administración de columnas del sitio web de DedeBIZ v6.2.11 permite a los atacantes ejecutar scripts web o HTML arbitrarias a través de un payload manipulado inyectado en el parámetro del título. • http://dedebiz.com https://github.com/yux1azhengye/mycve/blob/main/dedebiz_6.2.11_xss.pdf https://www.dedebiz.com/download • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 9.8EPSS: 0%CPEs: 1EXPL: 0

DedeBIZ v6.2.11 was discovered to contain multiple remote code execution (RCE) vulnerabilities at /admin/file_manage_control.php via the $activepath and $filename parameters. Se descubrió que DedeBIZ v6.2.11 contiene múltiples vulnerabilidades de Ejecución Remota de Código (RCE) en /admin/file_manage_control.php a través de los parámetros $activepath y $filename. • http://dedebiz.com https://github.com/yux1azhengye https://github.com/yux1azhengye/mycve/blob/main/DedeBIZ_v6.2.11_RCE.pdf https://www.dedebiz.com • CWE-94: Improper Control of Generation of Code ('Code Injection') •

CVSS: 4.8EPSS: 0%CPEs: 1EXPL: 1

A vulnerability was found in DedeBIZ 6.2.10. It has been rated as problematic. Affected by this issue is some unknown functionality of the component Article Handler. The manipulation leads to cross site scripting. The attack may be launched remotely. • https://github.com/Wkingxc/CVE/blob/master/dedebiz_XSS.pdf https://vuldb.com/?ctiid.236186 https://vuldb.com/?id.236186 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •