Qdpm

Qdpm

16 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
Exploit
  • EPSS 77.64%
  • Veröffentlicht 14.10.2023 05:15:55
  • Zuletzt bearbeitet 21.11.2024 08:27:29

qdPM 9.2 allows Directory Traversal to list files and directories by navigating to the /uploads URI.

Exploit
  • EPSS 6.59%
  • Veröffentlicht 14.10.2023 05:15:55
  • Zuletzt bearbeitet 21.11.2024 08:27:29

qdPM 9.2 allows remote code execution by using the Add Attachments feature of Edit Project to upload a .php file to the /uploads URI.

Exploit
  • EPSS 0.45%
  • Veröffentlicht 08.04.2022 21:15:08
  • Zuletzt bearbeitet 21.11.2024 06:53:33

qdPM 9.2 allows Cross-Site Request Forgery (CSRF) via the index.php/myAccount/update URI.

Exploit
  • EPSS 4.53%
  • Veröffentlicht 09.09.2021 15:15:08
  • Zuletzt bearbeitet 21.11.2024 05:09:14

qdPM V9.1 is vulnerable to Cross Site Scripting (XSS) via qdPM\install\modules\database_config.php.

Exploit
  • EPSS 0.35%
  • Veröffentlicht 26.08.2021 18:15:07
  • Zuletzt bearbeitet 21.11.2024 05:08:38

Cross Site Scripting (XSS) vulnerability exists in qdPM 9.1 in the Heading field found in the Login Page page under the General menu via a crafted website name by doing an authenticated POST HTTP request to /qdPM_9.1/index.php/configuration.

Exploit
  • EPSS 1.13%
  • Veröffentlicht 31.12.2020 21:15:12
  • Zuletzt bearbeitet 21.11.2024 05:19:25

qdPM through 9.1 allows PHP Object Injection via timeReportActions::executeExport in core/apps/qdPM/modules/timeReport/actions/actions.class.php because unserialize is used.

  • EPSS 0.26%
  • Veröffentlicht 05.10.2020 12:15:12
  • Zuletzt bearbeitet 21.11.2024 05:19:25

The file upload functionality in qdPM 9.1 doesn't check the file description, which allows remote authenticated attackers to inject web script or HTML via the attachments info parameter, aka XSS. This can occur during creation of a ticket, project, o...

Exploit
  • EPSS 0.94%
  • Veröffentlicht 16.04.2020 19:15:27
  • Zuletzt bearbeitet 21.11.2024 04:58:40

In qdPM 9.1, an attacker can upload a malicious .php file to the server by exploiting the Add Profile Photo capability with a crafted content-type value. After that, the attacker can execute an arbitrary command on the server using this malicious fil...

Exploit
  • EPSS 0.29%
  • Veröffentlicht 16.04.2020 19:15:27
  • Zuletzt bearbeitet 21.11.2024 04:58:41

A Host Header Injection vulnerability in qdPM 9.1 may allow an attacker to spoof a particular header and redirect users to malicious websites.

Exploit
  • EPSS 90.59%
  • Veröffentlicht 21.01.2020 14:15:13
  • Zuletzt bearbeitet 21.11.2024 05:36:54

A remote code execution (RCE) vulnerability exists in qdPM 9.1 and earlier. An attacker can upload a malicious PHP code file via the profile photo functionality, by leveraging a path traversal vulnerability in the users['photop_preview'] delete photo...