Note:
This project will be discontinued after December 13, 2021. [more]
Product:
Projectsend
(Projectsend)Repositories |
Unknown: This might be proprietary software. |
#Vulnerabilities | 25 |
Date | Id | Summary | Products | Score | Patch | Annotated |
---|---|---|---|---|---|---|
2021-10-11 | CVE-2021-40887 | Projectsend version r1295 is affected by a directory traversal vulnerability. Because of lacking sanitization input for files[] parameter, an attacker can add ../ to move all PHP files or any file on the system that has permissions to /upload/files/ folder. | Projectsend | 9.8 | ||
2021-10-11 | CVE-2021-40888 | Projectsend version r1295 is affected by Cross Site Scripting (XSS) due to lack of sanitization when echo output data in returnFilesIds() function. A low privilege user can call this function through process.php file and execute scripting code. | Projectsend | 5.4 | ||
2023-02-01 | CVE-2023-0607 | Cross-site Scripting (XSS) - Stored in GitHub repository projectsend/projectsend prior to r1606. | Projectsend | 4.8 | ||
2024-08-12 | CVE-2024-7659 | A vulnerability, which was classified as problematic, was found in projectsend up to r1605. Affected is the function generate_random_string of the file includes/functions.php of the component Password Reset Token Handler. The manipulation leads to insufficiently random values. It is possible to launch the attack remotely. The complexity of an attack is rather high. The exploitability is told to be difficult. Upgrading to version r1720 is able to address this issue. The name of the patch is... | Projectsend | 7.5 | ||
2022-06-27 | CVE-2017-20101 | A vulnerability, which was classified as problematic, was found in ProjectSend r754. This affects an unknown part of the file process.php?do=zip_download. The manipulation of the argument client/file leads to information disclosure. It is possible to initiate the attack remotely. | Projectsend | 5.7 | ||
2019-04-20 | CVE-2019-11378 | An issue was discovered in ProjectSend r1053. upload-process-form.php allows finished_files[]=../ directory traversal. It is possible for users to read arbitrary files and (potentially) access the supporting database, delete arbitrary files, access user passwords, or run arbitrary code. | Projectsend | 8.8 | ||
2019-05-22 | CVE-2018-7202 | An issue was discovered in ProjectSend before r1053. XSS exists in the "Name" field on the My Account page. | Projectsend | 6.1 | ||
2019-05-22 | CVE-2018-7201 | CSV Injection was discovered in ProjectSend before r1053, affecting victims who import the data into Microsoft Excel. | Projectsend | 8.8 | ||
2019-04-26 | CVE-2019-11533 | Cross-site scripting (XSS) vulnerability in ProjectSend before r1070 allows remote attackers to inject arbitrary web script or HTML. | Projectsend | 6.1 | ||
2019-04-26 | CVE-2019-11492 | ProjectSend before r1070 writes user passwords to the server logs. | Projectsend | 7.5 |