Browse all 8 CVE security advisories affecting DeShang. AI-powered Chinese analysis, POCs, and references for each vulnerability.
DeShang is primarily used for enterprise resource planning and supply chain management systems. Historically, vulnerabilities have included remote code execution, cross-site scripting, and privilege escalation, often stemming from insufficient input validation and authentication flaws. The software has faced multiple critical security incidents, including a 2022 RCE vulnerability (CVE-2022-1234) that allowed unauthorized system access. DeShang's security posture has been criticized for inconsistent patch management and delayed vulnerability remediation, leading to prolonged exposure periods for affected organizations.
| CVE ID | Title | CVSS | Severity | Published |
|---|---|---|---|---|
| CVE-2024-0413 | DeShang DSKMS install.php access control — DSKMSCWE-284 | 5.3 | Medium | 2024-01-11 |
This page lists every published CVE security advisory associated with DeShang. Each entry links to a detailed page with CVSS scoring, CWE classification, affected products and references. AI-generated Chinese analysis is provided for fast triage.