ProjectSend 161

CPE Details

ProjectSend 161
161
2015-01-08
13h43 +00:00
2015-01-29
15h04 +00:00
Alerte pour un CPE
Restez informé de toutes modifications pour un CPE spécifique.
Gestion des notifications

CPE Name: cpe:2.3:a:projectsend:projectsend:161:*:*:*:*:*:*:*

Informations

Vendor

projectsend

Product

projectsend

Version

161

Related CVE

Open and find in CVE List

CVE ID Publié Description Score Gravité
CVE-2024-11680 2024-11-26 09h55 +00:00 ProjectSend versions prior to r1720 are affected by an improper authentication vulnerability. Remote, unauthenticated attackers can exploit this flaw by sending crafted HTTP requests to options.php, enabling unauthorized modification of the application's configuration. Successful exploitation allows attackers to create accounts, upload webshells, and embed malicious JavaScript.
9.8
Critique
CVE-2024-7659 2024-08-11 02h31 +00:00 A vulnerability, which was classified as problematic, was found in projectsend up to r1605. Affected is the function generate_random_string of the file includes/functions.php of the component Password Reset Token Handler. The manipulation leads to insufficiently random values. It is possible to launch the attack remotely. The complexity of an attack is rather high. The exploitability is told to be difficult. Upgrading to version r1720 is able to address this issue. The name of the patch is aa27eb97edc2ff2b203f97e6675d7b5ba0a22a17. It is recommended to upgrade the affected component.
6.3
Moyen
CVE-2024-7658 2024-08-11 02h00 +00:00 A vulnerability, which was classified as problematic, has been found in projectsend up to r1605. This issue affects the function get_preview of the file process.php. The manipulation leads to improper control of resource identifiers. The attack may be initiated remotely. Upgrading to version r1720 is able to address this issue. The patch is named eb5a04774927e5855b9d0e5870a2aae5a3dc5a08. It is recommended to upgrade the affected component.
6.9
Moyen
CVE-2023-0607 2023-02-01 00h00 +00:00 Cross-site Scripting (XSS) - Stored in GitHub repository projectsend/projectsend prior to r1606.
4.8
Moyen
CVE-2020-28874 2021-01-21 14h01 +00:00 reset-password.php in ProjectSend before r1295 allows remote attackers to reset a password because of incorrect business logic. Errors are not properly considered (an invalid token parameter).
7.5
Haute
CVE-2018-7201 2019-05-22 18h03 +00:00 CSV Injection was discovered in ProjectSend before r1053, affecting victims who import the data into Microsoft Excel.
8.8
Haute
CVE-2018-7202 2019-05-22 15h31 +00:00 An issue was discovered in ProjectSend before r1053. XSS exists in the "Name" field on the My Account page.
6.1
Moyen
CVE-2019-11533 2019-04-26 18h06 +00:00 Cross-site scripting (XSS) vulnerability in ProjectSend before r1070 allows remote attackers to inject arbitrary web script or HTML.
6.1
Moyen
CVE-2019-11492 2019-04-26 18h02 +00:00 ProjectSend before r1070 writes user passwords to the server logs.
7.5
Haute
CVE-2017-9783 2018-03-06 15h00 +00:00 Cross-site scripting (XSS) vulnerability in ProjectSend (formerly cFTP) before commit 6c3710430be26feb5371cb0377e5355d6f9a27ca allows remote attackers to inject arbitrary web script or HTML via the Description field in a Site name updated.
6.1
Moyen
CVE-2017-9786 2018-03-06 15h00 +00:00 Cross-site scripting (XSS) vulnerability in ProjectSend (formerly cFTP) before commit 6c3710430be26feb5371cb0377e5355d6f9a27ca allows remote attackers to inject arbitrary web script or HTML via the Description field in My account Name updated, related to home.php and actions-log.php.
6.1
Moyen
CVE-2014-9567 2015-01-07 17h00 +00:00 Unrestricted file upload vulnerability in process-upload.php in ProjectSend (formerly cFTP) r100 through r561 allows remote attackers to execute arbitrary PHP code by uploading a file with a PHP extension, then accessing it via a direct request to the file in the upload/files/ or upload/temp/ directory.
7.5