Vulnerabilities
Vulnerable Software
Qdpm:  Security Vulnerabilities
qdPM 9.2 allows Directory Traversal to list files and directories by navigating to the /uploads URI.
CVSS Score
7.5
EPSS Score
0.82
Published
2023-10-14
qdPM 9.2 allows remote code execution by using the Add Attachments feature of Edit Project to upload a .php file to the /uploads URI.
CVSS Score
9.8
EPSS Score
0.066
Published
2023-10-14
qdPM 9.2 allows Cross-Site Request Forgery (CSRF) via the index.php/myAccount/update URI.
CVSS Score
8.8
EPSS Score
0.004
Published
2022-04-08
qdPM V9.1 is vulnerable to Cross Site Scripting (XSS) via qdPM\install\modules\database_config.php.
CVSS Score
6.1
EPSS Score
0.046
Published
2021-09-09
Cross Site Scripting (XSS) vulnerability exists in qdPM 9.1 in the Heading field found in the Login Page page under the General menu via a crafted website name by doing an authenticated POST HTTP request to /qdPM_9.1/index.php/configuration.
CVSS Score
5.4
EPSS Score
0.002
Published
2021-08-26
qdPM through 9.1 allows PHP Object Injection via timeReportActions::executeExport in core/apps/qdPM/modules/timeReport/actions/actions.class.php because unserialize is used.
CVSS Score
8.8
EPSS Score
0.036
Published
2020-12-31
The file upload functionality in qdPM 9.1 doesn't check the file description, which allows remote authenticated attackers to inject web script or HTML via the attachments info parameter, aka XSS. This can occur during creation of a ticket, project, or task.
CVSS Score
5.4
EPSS Score
0.003
Published
2020-10-05
In qdPM 9.1, an attacker can upload a malicious .php file to the server by exploiting the Add Profile Photo capability with a crafted content-type value. After that, the attacker can execute an arbitrary command on the server using this malicious file.
CVSS Score
9.8
EPSS Score
0.009
Published
2020-04-16
A Host Header Injection vulnerability in qdPM 9.1 may allow an attacker to spoof a particular header and redirect users to malicious websites.
CVSS Score
5.4
EPSS Score
0.002
Published
2020-04-16
A remote code execution (RCE) vulnerability exists in qdPM 9.1 and earlier. An attacker can upload a malicious PHP code file via the profile photo functionality, by leveraging a path traversal vulnerability in the users['photop_preview'] delete photo feature, allowing bypass of .htaccess protection. NOTE: this issue exists because of an incomplete fix for CVE-2015-3884.
CVSS Score
8.8
EPSS Score
0.935
Published
2020-01-21


Contact Us

Shodan ® - All rights reserved