CVE-2023-7181 – Muyun DedeBIZ Add Attachment unrestricted upload
https://notcve.org/view.php?id=CVE-2023-7181
A vulnerability was found in Muyun DedeBIZ up to 6.2.12 and classified as critical. Affected by this issue is some unknown functionality of the component Add Attachment Handler. The manipulation leads to unrestricted upload. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. • https://github.com/JTZ-a/SRC/blob/master/DedeBIZ/DedeBIZ%20-%20file%20upload/README.md https://vuldb.com/?ctiid.249368 https://vuldb.com/?id.249368 • CWE-434: Unrestricted Upload of File with Dangerous Type •
CVE-2023-6755 – DedeBIZ content_batchup_action.php sql injection
https://notcve.org/view.php?id=CVE-2023-6755
A vulnerability was found in DedeBIZ 6.2 and classified as critical. This issue affects some unknown processing of the file /src/admin/content_batchup_action.php. The manipulation of the argument endid leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. • https://github.com/ycwxy/test/issues/1 https://vuldb.com/?ctiid.247883 https://vuldb.com/?id.247883 • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •
CVE-2023-5268 – DedeBIZ makehtml_taglist_action.php sql injection
https://notcve.org/view.php?id=CVE-2023-5268
A vulnerability was found in DedeBIZ 6.2 and classified as critical. This issue affects some unknown processing of the file /src/admin/makehtml_taglist_action.php. The manipulation of the argument mktime leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. • https://github.com/yhy217/dedebiz--vul/issues/2 https://vuldb.com/?ctiid.240881 https://vuldb.com/?id.240881 • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •
CVE-2023-5266 – DedeBIZ tags_main.php sql injection
https://notcve.org/view.php?id=CVE-2023-5266
A vulnerability, which was classified as critical, was found in DedeBIZ 6.2. This affects an unknown part of the file /src/admin/tags_main.php. The manipulation of the argument ids leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. • https://github.com/yhy217/dedebiz--vul/blob/main/time_injection.zip https://github.com/yhy217/dedebiz--vul/issues/1 https://vuldb.com/?ctiid.240879 https://vuldb.com/?id.240879 • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •