Application/Admin/Controller/ConfigController.class.php in 74cms v5.0.1 allows remote attackers to execute arbitrary PHP code via the index.php?m=Admin&c=config&a=edit site_domain parameter.
In 74cms version 5.0.1, there is a remote code execution vulnerability in /Application/Admin/Controller/ConfigController.class.php and /ThinkPHP/Common/functions.php where attackers can obtain server permissions and control the server.
An arbitrary file upload vulnerability in the component /apiadmin/upload/attach of 74cmsSE v3.13.0 allows attackers to execute arbitrary code via a crafted PHP file.
SQL Injection in 74cms 3.2.0 via the id parameter to wap/wap-company-show.php.
SQL Injection in 74cms 3.2.0 via the x parameter to plus/ajax_street.php.
SQL Injection in 74cms 3.2.0 via the key parameter to plus/ajax_street.php.
SQL Injection in 74cms 3.2.0 via the query parameter to plus/ajax_common.php.
SQL Injection in 74cms 3.2.0 via the x parameter to ajax_officebuilding.php.