Vulnerabilities (CVE)

Filtered by vendor Projectsend Subscribe
Filtered by product Projectsend
Total 25 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2024-7658 1 Projectsend 1 Projectsend 2025-01-13 N/A 5.3 MEDIUM
A vulnerability, which was classified as problematic, has been found in projectsend up to r1605. This issue affects the function get_preview of the file process.php. The manipulation leads to improper control of resource identifiers. The attack may be initiated remotely. Upgrading to version r1720 is able to address this issue. The patch is named eb5a04774927e5855b9d0e5870a2aae5a3dc5a08. It is recommended to upgrade the affected component.
CVE-2024-11680 1 Projectsend 1 Projectsend 2024-12-06 N/A 9.8 CRITICAL
ProjectSend versions prior to r1720 are affected by an improper authentication vulnerability. Remote, unauthenticated attackers can exploit this flaw by sending crafted HTTP requests to options.php, enabling unauthorized modification of the application's configuration. Successful exploitation allows attackers to create accounts, upload webshells, and embed malicious JavaScript.
CVE-2024-7659 1 Projectsend 1 Projectsend 2024-08-15 N/A 7.5 HIGH
A vulnerability, which was classified as problematic, was found in projectsend up to r1605. Affected is the function generate_random_string of the file includes/functions.php of the component Password Reset Token Handler. The manipulation leads to insufficiently random values. It is possible to launch the attack remotely. The complexity of an attack is rather high. The exploitability is told to be difficult. Upgrading to version r1720 is able to address this issue. The name of the patch is aa27eb97edc2ff2b203f97e6675d7b5ba0a22a17. It is recommended to upgrade the affected component.
CVE-2023-0607 1 Projectsend 1 Projectsend 2023-02-08 N/A 4.8 MEDIUM
Cross-site Scripting (XSS) - Stored in GitHub repository projectsend/projectsend prior to r1606.
CVE-2021-40884 1 Projectsend 1 Projectsend 2022-07-12 5.5 MEDIUM 8.1 HIGH
Projectsend version r1295 is affected by sensitive information disclosure. Because of not checking authorization in ids parameter in files-edit.php and id parameter in process.php function, a user with uploader role can download and edit all files of users in application.
CVE-2017-20101 1 Projectsend 1 Projectsend 2022-07-07 3.5 LOW 5.7 MEDIUM
A vulnerability, which was classified as problematic, was found in ProjectSend r754. This affects an unknown part of the file process.php?do=zip_download. The manipulation of the argument client/file leads to information disclosure. It is possible to initiate the attack remotely.
CVE-2021-40888 1 Projectsend 1 Projectsend 2021-10-18 3.5 LOW 5.4 MEDIUM
Projectsend version r1295 is affected by Cross Site Scripting (XSS) due to lack of sanitization when echo output data in returnFilesIds() function. A low privilege user can call this function through process.php file and execute scripting code.
CVE-2021-40887 1 Projectsend 1 Projectsend 2021-10-18 10.0 HIGH 9.8 CRITICAL
Projectsend version r1295 is affected by a directory traversal vulnerability. Because of lacking sanitization input for files[] parameter, an attacker can add ../ to move all PHP files or any file on the system that has permissions to /upload/files/ folder.
CVE-2021-40886 1 Projectsend 1 Projectsend 2021-10-16 4.0 MEDIUM 6.5 MEDIUM
Projectsend version r1295 is affected by a directory traversal vulnerability. A user with Uploader role can add value `2` for `chunks` parameter to bypass `fileName` sanitization.
CVE-2020-28874 1 Projectsend 1 Projectsend 2021-07-21 5.0 MEDIUM 7.5 HIGH
reset-password.php in ProjectSend before r1295 allows remote attackers to reset a password because of incorrect business logic. Errors are not properly considered (an invalid token parameter).
CVE-2019-11378 1 Projectsend 1 Projectsend 2021-07-21 6.5 MEDIUM 8.8 HIGH
An issue was discovered in ProjectSend r1053. upload-process-form.php allows finished_files[]=../ directory traversal. It is possible for users to read arbitrary files and (potentially) access the supporting database, delete arbitrary files, access user passwords, or run arbitrary code.
CVE-2018-7201 1 Projectsend 1 Projectsend 2020-08-24 6.8 MEDIUM 8.8 HIGH
CSV Injection was discovered in ProjectSend before r1053, affecting victims who import the data into Microsoft Excel.
CVE-2018-7202 1 Projectsend 1 Projectsend 2019-05-23 4.3 MEDIUM 6.1 MEDIUM
An issue was discovered in ProjectSend before r1053. XSS exists in the "Name" field on the My Account page.
CVE-2019-11533 1 Projectsend 1 Projectsend 2019-05-01 4.3 MEDIUM 6.1 MEDIUM
Cross-site scripting (XSS) vulnerability in ProjectSend before r1070 allows remote attackers to inject arbitrary web script or HTML.
CVE-2019-11492 1 Projectsend 1 Projectsend 2019-04-30 5.0 MEDIUM 7.5 HIGH
ProjectSend before r1070 writes user passwords to the server logs.
CVE-2016-10731 1 Projectsend 1 Projectsend 2018-12-18 7.5 HIGH 9.8 CRITICAL
ProjectSend (formerly cFTP) r582 allows SQL injection via manage-files.php with the request parameter status, manage-files.php with the request parameter files, clients.php with the request parameter selected_clients, clients.php with the request parameter status, process-zip-download.php with the request parameter file, or home-log.php with the request parameter action.
CVE-2016-10732 1 Projectsend 1 Projectsend 2018-12-06 7.5 HIGH 9.8 CRITICAL
ProjectSend (formerly cFTP) r582 allows authentication bypass via a direct request for users.php, home.php, edit-file.php?file_id=1, or process-zip-download.php, or add_user_form_* parameters to users-add.php.
CVE-2016-10734 1 Projectsend 1 Projectsend 2018-12-06 7.5 HIGH 9.8 CRITICAL
ProjectSend (formerly cFTP) r582 allows Insecure Direct Object Reference via includes/actions.log.export.php.
CVE-2016-10733 1 Projectsend 1 Projectsend 2018-12-06 7.5 HIGH 9.8 CRITICAL
ProjectSend (formerly cFTP) r582 allows directory traversal via file=../ in the process-zip-download.php query string.
CVE-2015-2564 1 Projectsend 1 Projectsend 2018-10-09 6.5 MEDIUM N/A
SQL injection vulnerability in client-edit.php in ProjectSend (formerly cFTP) r561 allows remote authenticated users to execute arbitrary SQL commands via the id parameter to users-edit.php.