Projectsend

Projectsend

32 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
Exploit
  • EPSS 0.37%
  • Veröffentlicht 01.02.2023 04:15:09
  • Zuletzt bearbeitet 21.11.2024 07:37:28

Cross-site Scripting (XSS) - Stored in GitHub repository projectsend/projectsend prior to r1606.

Exploit
  • EPSS 0.14%
  • Veröffentlicht 27.06.2022 14:15:07
  • Zuletzt bearbeitet 21.11.2024 03:22:38

A vulnerability, which was classified as problematic, was found in ProjectSend r754. This affects an unknown part of the file process.php?do=zip_download. The manipulation of the argument client/file leads to information disclosure. It is possible to...

Exploit
  • EPSS 0.22%
  • Veröffentlicht 11.10.2021 11:15:09
  • Zuletzt bearbeitet 21.11.2024 06:25:00

Projectsend version r1295 is affected by sensitive information disclosure. Because of not checking authorization in ids parameter in files-edit.php and id parameter in process.php function, a user with uploader role can download and edit all files of...

Exploit
  • EPSS 0.28%
  • Veröffentlicht 11.10.2021 11:15:09
  • Zuletzt bearbeitet 21.11.2024 06:25:01

Projectsend version r1295 is affected by Cross Site Scripting (XSS) due to lack of sanitization when echo output data in returnFilesIds() function. A low privilege user can call this function through process.php file and execute scripting code.

Exploit
  • EPSS 0.85%
  • Veröffentlicht 11.10.2021 11:15:09
  • Zuletzt bearbeitet 21.11.2024 06:25:00

Projectsend version r1295 is affected by a directory traversal vulnerability. Because of lacking sanitization input for files[] parameter, an attacker can add ../ to move all PHP files or any file on the system that has permissions to /upload/files/ ...

Exploit
  • EPSS 0.6%
  • Veröffentlicht 11.10.2021 11:15:09
  • Zuletzt bearbeitet 21.11.2024 06:25:00

Projectsend version r1295 is affected by a directory traversal vulnerability. A user with Uploader role can add value `2` for `chunks` parameter to bypass `fileName` sanitization.

Exploit
  • EPSS 1.12%
  • Veröffentlicht 26.01.2021 18:15:51
  • Zuletzt bearbeitet 21.11.2024 05:23:13

reset-password.php in ProjectSend before r1295 allows remote attackers to reset a password because of incorrect business logic. Errors are not properly considered (an invalid token parameter).

  • EPSS 0.42%
  • Veröffentlicht 22.05.2019 21:29:00
  • Zuletzt bearbeitet 21.11.2024 04:11:46

CSV Injection was discovered in ProjectSend before r1053, affecting victims who import the data into Microsoft Excel.

  • EPSS 0.24%
  • Veröffentlicht 22.05.2019 18:29:00
  • Zuletzt bearbeitet 21.11.2024 04:11:46

An issue was discovered in ProjectSend before r1053. XSS exists in the "Name" field on the My Account page.

  • EPSS 0.23%
  • Veröffentlicht 26.04.2019 21:29:00
  • Zuletzt bearbeitet 21.11.2024 04:21:17

Cross-site scripting (XSS) vulnerability in ProjectSend before r1070 allows remote attackers to inject arbitrary web script or HTML.