Gitee Exploits

415 exploits tracked across all sources.

Sort: Activity Stars
CVE-2022-44849 GITEE HIGH php
Metinfo - CSRF
A Cross-Site Request Forgery (CSRF) in the Administrator List of MetInfo v7.7 allows attackers to arbitrarily add Super Administrator account.
by mituo
125 stars
CVSS 8.8
CVE-2023-2888 GITEE MEDIUM php
PHPOK 6.4.100 - Unrestricted Upload
A vulnerability, which was classified as problematic, was found in PHPOK 6.4.100. This affects an unknown part of the file /admin.php?c=upload&f=zip&_noCache=0.1683794968. The manipulation leads to unrestricted upload. It is possible to initiate the attack remotely. The identifier VDB-229953 was assigned to this vulnerability.
by phpok
110 stars
CVSS 4.7
CVE-2023-33601 GITEE HIGH php
phpok <6.4.100 - RCE
An arbitrary file upload vulnerability in /admin.php?c=upload of phpok v6.4.100 allows attackers to execute arbitrary code via a crafted PHP file.
by phpok
110 stars
CVSS 8.8
CVE-2022-42983 GITEE HIGH java
Anji-plus Aj-report - Authentication Bypass by Spoofing
anji-plus AJ-Report 0.9.8.6 allows remote attackers to bypass login authentication by spoofing JWT Tokens.
by Raod
72 stars
CVSS 8.8
CVE-2024-13022 GITEE MEDIUM java
Taisan Tarzan-cms 1.0.0 - Unrestricted Upload
A vulnerability, which was classified as critical, was found in taisan tarzan-cms 1.0.0. This affects the function UploadResponse of the file src/main/java/com/tarzan/cms/modules/admin/controller/common/UploadController.java of the component Article Management. The manipulation of the argument file leads to unrestricted upload. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.
by taisan
49 stars
CVSS 6.3
CVE-2018-18485 GITEE HIGH php
Phpshe - Path Traversal
An issue was discovered in PHPSHE 1.7. admin.php?mod=db&act=del allows remote attackers to delete arbitrary files via directory traversal sequences in the dbname parameter. This can be leveraged to reload the product by deleting install.lock.
by koyshe
48 stars
CVSS 7.5
CVE-2018-18486 GITEE CRITICAL php
Phpshe - SQL Injection
An issue was discovered in PHPSHE 1.7. SQL injection exists via the admin.php?mod=user&act=del user_id[] parameter.
by koyshe
48 stars
CVSS 9.8
CVE-2019-9626 GITEE CRITICAL php
PHPSHE 1.7 - SQL Injection
PHPSHE 1.7 allows module/index/cart.php pintuan_id SQL Injection to index.php.
by koyshe
48 stars
CVSS 9.8
CVE-2019-9761 GITEE HIGH php
PHPSHE 1.7 - XSS
An XXE issue was discovered in PHPSHE 1.7, which can be used to read any file in the system or scan the internal network without authentication. This occurs because of the call to wechat_getxml in include/plugin/payment/wechat/notify_url.php.
by koyshe
48 stars
CVSS 7.5
CVE-2019-9762 GITEE CRITICAL php
PHPSHE 1.7 - SQL Injection
A SQL Injection was discovered in PHPSHE 1.7 in include/plugin/payment/alipay/pay.php with the parameter id. The vulnerability does not need any authentication.
by koyshe
48 stars
CVSS 9.8
CVE-2020-18020 GITEE CRITICAL php
PHPSHE Mall System <1.7 - SQL Injection
SQL Injection in PHPSHE Mall System v1.7 allows remote attackers to execute arbitrary code by injecting SQL commands into the "user_phone" parameter of a crafted HTTP request to the "admin.php" component.
by koyshe
48 stars
CVSS 9.8
CVE-2020-18215 GITEE HIGH php
PHPSHE 1.7 - SQL Injection
Multiple SQL Injection vulnerabilities in PHPSHE 1.7 in phpshe/admin.php via the (1) ad_id, (2) menu_id, and (3) cashout_id parameters, which could let a remote malicious user execute arbitrary code.
by koyshe
48 stars
CVSS 8.8
CVE-2022-4401 GITEE LOW java
Pallidlight Online Course Selection System - XSS
A vulnerability was found in pallidlight online-course-selection-system. It has been classified as problematic. Affected is an unknown function. The manipulation leads to cross site scripting. It is possible to launch the attack remotely. The identifier of this vulnerability is VDB-215268.
by pallidlight
42 stars
CVSS 3.5
CVE-2018-20422 GITEE HIGH
Comsenz Discuzx - Authentication Bypass
Discuz! DiscuzX 3.4, when WeChat login is enabled, allows remote attackers to bypass authentication by leveraging a non-empty #wechat#common_member_wechatmp to gain login access to an account via a plugin.php ac=wxregister request (the attacker does not have control over which account will be accessed).
by ComsenzDiscuz
25 stars
CVSS 8.1
CVE-2018-20423 GITEE HIGH
Discuz! DiscuzX <3.4 - Auth Bypass
Discuz! DiscuzX 3.4, when WeChat login is enabled, allows remote attackers to bypass a "disabled registration" setting by adding a non-existing wxopenid value to the plugin.php ac=wxregister query string.
by ComsenzDiscuz
25 stars
CVSS 8.1
CVE-2018-20424 GITEE MEDIUM
Comsenz Discuzx - Improper Input Validation
Discuz! DiscuzX 3.4, when WeChat login is enabled, allows remote attackers to delete the common_member_wechatmp data structure via an ac=unbindmp request to plugin.php.
by ComsenzDiscuz
25 stars
CVSS 5.9
CVE-2018-5259 GITEE HIGH
Discuz! DiscuzX X3.4 - Auth Bypass
Discuz! DiscuzX X3.4 allows remote authenticated users to bypass intended attachment-deletion restrictions via a modified aid parameter.
by ComsenzDiscuz
25 stars
CVSS 8.8
CVE-2023-1001 GITEE LOW javascript
NPM Vxe-table < 3.7.10 - XSS
A vulnerability, which was classified as problematic, has been found in xuliangzhan vxe-table up to 3.7.9. This issue affects the function export of the file packages/textarea/src/textarea.js of the component vxe-textarea. The manipulation of the argument inputValue leads to cross site scripting. The attack may be initiated remotely. Upgrading to version 3.7.10 is able to address this issue. The patch is named d70b0e089740b65a22c89c106ebc4627ac48a22d. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-266123.
by xuliangzhan
24 stars
CVSS 3.5
CVE-2023-1001 GITEE LOW javascript
NPM Vxe-table < 3.7.10 - XSS
A vulnerability, which was classified as problematic, has been found in xuliangzhan vxe-table up to 3.7.9. This issue affects the function export of the file packages/textarea/src/textarea.js of the component vxe-textarea. The manipulation of the argument inputValue leads to cross site scripting. The attack may be initiated remotely. Upgrading to version 3.7.10 is able to address this issue. The patch is named d70b0e089740b65a22c89c106ebc4627ac48a22d. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-266123.
by xuliangzhan
24 stars
CVSS 3.5
CVE-2020-21377 GITEE CRITICAL php
Yunyecms - SQL Injection
SQL injection vulnerability in yunyecms V2.0.1 via the selcart parameter.
by yunyecms_admin
18 stars
CVSS 9.8
CVE-2022-44087 GITEE CRITICAL php
ESPCMS <P8.21120101 - RCE
ESPCMS P8.21120101 was discovered to contain a remote code execution (RCE) vulnerability in the component UPFILE_PIC_ZOOM_HIGHT.
by earclink
11 stars
CVSS 9.8
CVE-2022-44088 GITEE CRITICAL php
ESPCMS <P8.21120101 - RCE
ESPCMS P8.21120101 was discovered to contain a remote code execution (RCE) vulnerability in the component INPUT_ISDESCRIPTION.
by earclink
11 stars
CVSS 9.8
CVE-2022-44089 GITEE CRITICAL php
ESPCMS P8.21120101 - RCE
ESPCMS P8.21120101 was discovered to contain a remote code execution (RCE) vulnerability in the component IS_GETCACHE.
by earclink
11 stars
CVSS 9.8
CVE-2023-0246 GITEE LOW php
earclink ESPCMS P8.21120101 - XSS
A vulnerability, which was classified as problematic, was found in earclink ESPCMS P8.21120101. Affected is an unknown function of the component Content Handler. The manipulation leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. VDB-218154 is the identifier assigned to this vulnerability.
by earclink
11 stars
CVSS 3.5
CVE-2023-23007 GITEE HIGH php
Ecisp Espcms - SQL Injection
An issue was discovered in ESPCMS P8.21120101 after logging in to the background, there is a SQL injection vulnerability in the function node where members are added.
by earclink
11 stars
CVSS 7.2