DotNetNuke 2.0 through 4.8.4 allows remote attackers to load .ascx files instead of skin files, and possibly access privileged functionality, via unknown vectors related to parameter validation.
Metrics
Affected Vendors & Products
References
History
Fri, 24 Apr 2026 17:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Dnnsoftware
Dnnsoftware dotnetnuke |
|
| CPEs | cpe:2.3:a:dotnetnuke:dotnetnuke:2.1.2:*:*:*:*:*:*:* cpe:2.3:a:dotnetnuke:dotnetnuke:3.0.11:*:*:*:*:*:*:* cpe:2.3:a:dotnetnuke:dotnetnuke:3.0.7:*:*:*:*:*:*:* cpe:2.3:a:dotnetnuke:dotnetnuke:3.0.8:*:*:*:*:*:*:* cpe:2.3:a:dotnetnuke:dotnetnuke:3.1.0:*:*:*:*:*:*:* cpe:2.3:a:dotnetnuke:dotnetnuke:3.3.5:*:*:*:*:*:*:* cpe:2.3:a:dotnetnuke:dotnetnuke:4.0:*:*:*:*:*:*:* cpe:2.3:a:dotnetnuke:dotnetnuke:4.3.5:*:*:*:*:*:*:* cpe:2.3:a:dotnetnuke:dotnetnuke:4.4.1:*:*:*:*:*:*:* cpe:2.3:a:dotnetnuke:dotnetnuke:4.5.2:*:*:*:*:*:*:* cpe:2.3:a:dotnetnuke:dotnetnuke:4.5.4:*:*:*:*:*:*:* cpe:2.3:a:dotnetnuke:dotnetnuke:4.5.5:*:*:*:*:*:*:* cpe:2.3:a:dotnetnuke:dotnetnuke:4.6.0:*:*:*:*:*:*:* cpe:2.3:a:dotnetnuke:dotnetnuke:4.6.1:*:*:*:*:*:*:* cpe:2.3:a:dotnetnuke:dotnetnuke:4.6.2:*:*:*:*:*:*:* cpe:2.3:a:dotnetnuke:dotnetnuke:4.7.0:*:*:*:*:*:*:* cpe:2.3:a:dotnetnuke:dotnetnuke:4.8.0:*:*:*:*:*:*:* cpe:2.3:a:dotnetnuke:dotnetnuke:4.8.1:*:*:*:*:*:*:* cpe:2.3:a:dotnetnuke:dotnetnuke:4.8.2:*:*:*:*:*:*:* cpe:2.3:a:dotnetnuke:dotnetnuke:4.8.3:*:*:*:*:*:*:* cpe:2.3:a:dotnetnuke:dotnetnuke:4.8.4:*:*:*:*:*:*:* |
cpe:2.3:a:dnnsoftware:dotnetnuke:2.1.1:*:*:*:*:*:*:* cpe:2.3:a:dnnsoftware:dotnetnuke:2.1.2:*:*:*:*:*:*:* cpe:2.3:a:dnnsoftware:dotnetnuke:3.0.11:*:*:*:*:*:*:* cpe:2.3:a:dnnsoftware:dotnetnuke:3.0.7:*:*:*:*:*:*:* cpe:2.3:a:dnnsoftware:dotnetnuke:3.0.8:*:*:*:*:*:*:* cpe:2.3:a:dnnsoftware:dotnetnuke:3.1.0:*:*:*:*:*:*:* cpe:2.3:a:dnnsoftware:dotnetnuke:3.3.5:*:*:*:*:*:*:* cpe:2.3:a:dnnsoftware:dotnetnuke:4.0:*:*:*:*:*:*:* cpe:2.3:a:dnnsoftware:dotnetnuke:4.3.5:*:*:*:*:*:*:* cpe:2.3:a:dnnsoftware:dotnetnuke:4.4.1:*:*:*:*:*:*:* cpe:2.3:a:dnnsoftware:dotnetnuke:4.5.2:*:*:*:*:*:*:* cpe:2.3:a:dnnsoftware:dotnetnuke:4.5.4:*:*:*:*:*:*:* cpe:2.3:a:dnnsoftware:dotnetnuke:4.5.5:*:*:*:*:*:*:* cpe:2.3:a:dnnsoftware:dotnetnuke:4.6.0:*:*:*:*:*:*:* cpe:2.3:a:dnnsoftware:dotnetnuke:4.6.1:*:*:*:*:*:*:* cpe:2.3:a:dnnsoftware:dotnetnuke:4.6.2:*:*:*:*:*:*:* cpe:2.3:a:dnnsoftware:dotnetnuke:4.7.0:*:*:*:*:*:*:* cpe:2.3:a:dnnsoftware:dotnetnuke:4.8.0:*:*:*:*:*:*:* cpe:2.3:a:dnnsoftware:dotnetnuke:4.8.1:*:*:*:*:*:*:* cpe:2.3:a:dnnsoftware:dotnetnuke:4.8.2:*:*:*:*:*:*:* cpe:2.3:a:dnnsoftware:dotnetnuke:4.8.3:*:*:*:*:*:*:* cpe:2.3:a:dnnsoftware:dotnetnuke:4.8.4:*:*:*:*:*:*:* |
| Vendors & Products |
Dotnetnuke
Dotnetnuke dotnetnuke |
Dnnsoftware
Dnnsoftware dotnetnuke |
Status: PUBLISHED
Assigner: mitre
Published: 2009-08-27T20:00:00.000Z
Updated: 2024-08-07T11:56:14.089Z
Reserved: 2009-08-27T00:00:00.000Z
Link: CVE-2008-7102
No data.
Status : Modified
Published: 2009-08-27T20:30:00.547
Modified: 2026-04-24T17:34:37.240
Link: CVE-2008-7102
No data.