Show filters
36 Total Results
Displaying 1-10 of 36
Sort by:
Attacker Value
Unknown
CVE-2024-13115
Disclosure Date: February 04, 2025 (last updated February 04, 2025)
The WP Projects Portfolio with Client Testimonials WordPress plugin through 3.0 does not have CSRF check in some places, and is missing sanitisation as well as escaping, which could allow attackers to make logged in admin add Stored XSS payloads via a CSRF attack.
0
Attacker Value
Unknown
CVE-2024-13114
Disclosure Date: February 04, 2025 (last updated February 04, 2025)
The WP Projects Portfolio with Client Testimonials WordPress plugin through 3.0 does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin.
0
Attacker Value
Unknown
CVE-2023-39995
Disclosure Date: December 13, 2024 (last updated February 27, 2025)
Missing Authorization vulnerability in WP OnlineSupport, Essential Plugin Portfolio and Projects allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Portfolio and Projects: from n/a through 1.3.7.
0
Attacker Value
Unknown
CVE-2024-11680
Disclosure Date: November 26, 2024 (last updated February 27, 2025)
ProjectSend versions prior to r1720 are affected by an improper authentication vulnerability. Remote, unauthenticated attackers can exploit this flaw by sending crafted HTTP requests to options.php, enabling unauthorized modification of the application's configuration. Successful exploitation allows attackers to create accounts, upload webshells, and embed malicious JavaScript.
0
Attacker Value
Unknown
CVE-2024-7659
Disclosure Date: August 12, 2024 (last updated February 26, 2025)
A vulnerability, which was classified as problematic, was found in projectsend up to r1605. Affected is the function generate_random_string of the file includes/functions.php of the component Password Reset Token Handler. The manipulation leads to insufficiently random values. It is possible to launch the attack remotely. The complexity of an attack is rather high. The exploitability is told to be difficult. Upgrading to version r1720 is able to address this issue. The name of the patch is aa27eb97edc2ff2b203f97e6675d7b5ba0a22a17. It is recommended to upgrade the affected component.
0
Attacker Value
Unknown
CVE-2024-7658
Disclosure Date: August 12, 2024 (last updated February 26, 2025)
A vulnerability, which was classified as problematic, has been found in projectsend up to r1605. This issue affects the function get_preview of the file process.php. The manipulation leads to improper control of resource identifiers. The attack may be initiated remotely. Upgrading to version r1720 is able to address this issue. The patch is named eb5a04774927e5855b9d0e5870a2aae5a3dc5a08. It is recommended to upgrade the affected component.
0
Attacker Value
Unknown
CVE-2023-0607
Disclosure Date: February 01, 2023 (last updated February 24, 2025)
Cross-site Scripting (XSS) - Stored in GitHub repository projectsend/projectsend prior to r1606.
0
Attacker Value
Unknown
CVE-2017-20101
Disclosure Date: June 27, 2022 (last updated February 24, 2025)
A vulnerability, which was classified as problematic, was found in ProjectSend r754. This affects an unknown part of the file process.php?do=zip_download. The manipulation of the argument client/file leads to information disclosure. It is possible to initiate the attack remotely.
0
Attacker Value
Unknown
CVE-2021-40887
Disclosure Date: October 11, 2021 (last updated February 23, 2025)
Projectsend version r1295 is affected by a directory traversal vulnerability. Because of lacking sanitization input for files[] parameter, an attacker can add ../ to move all PHP files or any file on the system that has permissions to /upload/files/ folder.
0
Attacker Value
Unknown
CVE-2021-40884
Disclosure Date: October 11, 2021 (last updated February 23, 2025)
Projectsend version r1295 is affected by sensitive information disclosure. Because of not checking authorization in ids parameter in files-edit.php and id parameter in process.php function, a user with uploader role can download and edit all files of users in application.
0