ProjectSend ProjectSend r1295

CPE Details

ProjectSend ProjectSend r1295
r1295
2021-02-05
20h10 +00:00
2021-02-05
20h10 +00:00
Alerte pour un CPE
Stay informed of any changes for a specific CPE.
Notifications manage

CPE Name: cpe:2.3:a:projectsend:projectsend:r1295:*:*:*:*:*:*:*

Informations

Vendor

projectsend

Product

projectsend

Version

r1295

Related CVE

Open and find in CVE List

CVE ID Published Description Score Severity
CVE-2024-11680 2024-11-26 09h55 +00:00 ProjectSend versions prior to r1720 are affected by an improper authentication vulnerability. Remote, unauthenticated attackers can exploit this flaw by sending crafted HTTP requests to options.php, enabling unauthorized modification of the application's configuration. Successful exploitation allows attackers to create accounts, upload webshells, and embed malicious JavaScript.
9.8
Critical
CVE-2024-7659 2024-08-11 02h31 +00:00 A vulnerability, which was classified as problematic, was found in projectsend up to r1605. Affected is the function generate_random_string of the file includes/functions.php of the component Password Reset Token Handler. The manipulation leads to insufficiently random values. It is possible to launch the attack remotely. The complexity of an attack is rather high. The exploitability is told to be difficult. Upgrading to version r1720 is able to address this issue. The name of the patch is aa27eb97edc2ff2b203f97e6675d7b5ba0a22a17. It is recommended to upgrade the affected component.
6.3
Medium
CVE-2024-7658 2024-08-11 02h00 +00:00 A vulnerability, which was classified as problematic, has been found in projectsend up to r1605. This issue affects the function get_preview of the file process.php. The manipulation leads to improper control of resource identifiers. The attack may be initiated remotely. Upgrading to version r1720 is able to address this issue. The patch is named eb5a04774927e5855b9d0e5870a2aae5a3dc5a08. It is recommended to upgrade the affected component.
6.9
Medium
CVE-2023-0607 2023-02-01 00h00 +00:00 Cross-site Scripting (XSS) - Stored in GitHub repository projectsend/projectsend prior to r1606.
4.8
Medium
CVE-2021-40884 2021-10-11 08h46 +00:00 Projectsend version r1295 is affected by sensitive information disclosure. Because of not checking authorization in ids parameter in files-edit.php and id parameter in process.php function, a user with uploader role can download and edit all files of users in application.
8.1
High
CVE-2021-40886 2021-10-11 08h24 +00:00 Projectsend version r1295 is affected by a directory traversal vulnerability. A user with Uploader role can add value `2` for `chunks` parameter to bypass `fileName` sanitization.
6.5
Medium
CVE-2021-40887 2021-10-11 08h12 +00:00 Projectsend version r1295 is affected by a directory traversal vulnerability. Because of lacking sanitization input for files[] parameter, an attacker can add ../ to move all PHP files or any file on the system that has permissions to /upload/files/ folder.
9.8
Critical
CVE-2021-40888 2021-10-11 08h04 +00:00 Projectsend version r1295 is affected by Cross Site Scripting (XSS) due to lack of sanitization when echo output data in returnFilesIds() function. A low privilege user can call this function through process.php file and execute scripting code.
5.4
Medium