qdPM version 9.1 suffers from multiple cross site scripting vulnerabilities.
695024bcdea254b0592b99bd9b63b1eec7e0fc742b5f5644d8bfef42062983ec
A remote code execution vulnerability exists in qdPM versions 9.1 and below. An attacker can upload a malicious PHP code file via the profile photo functionality by leveraging a path traversal vulnerability in the users['photop_preview'] delete photo feature thus allowing bypass of .htaccess protection. NOTE: this issue exists because of an incomplete fix for CVE-2015-3884.
41d2d18aa9196d7f57810fe954d8362f8c6f3662e5ba2a143d334cd07ac9b371
qdPM version 9.1 authenticated remote code execution exploit that leverages a path traversal.
3232c57ac453b2620e024f66156e77f94a31f69956a38912a194df206d7de228
qdPM version 9.2 suffers from a cross site request forgery vulnerability.
64ddbfaa1da0cb1473febe63a28eecb79a7e8e8d82ebad0f32c44475dadf890f
qdPM version 9.2 discloses the password and connection string for the database in an internet-accessible file.
2f92d8ee5b5ad7b418516bd80f8b207e00cf4ae67d21b04fe4031646a20b325f
qdPM versions 9.1 and below suffer from an executeExport PHP object injection vulnerability.
b112518046e2d985fa9df4e1d428c12274ab5e4bf070ee7383978e0a73695f45
qdPM version 9.1 suffers from a persistent cross site scripting vulnerability.
243f9d8a4adf78bf32f1e9eaf0c07a5a16b6a774dae63a376acae6ef2be8a21c
qdPM version 9.1 suffers from an arbitrary file upload vulnerability.
29677c9aeba89af9fcf295f75937caccf52029e7fa9463e55173aedd624ed875
qdPM versions prior to 9.1 suffer from a remote shell upload vulnerability that allows for remote code execution.
7378aebe88336076527073b99083cdd137d3c12ddaf2cf587f30f8479d285a3d
qdPM version 9.1 suffers from a remote code execution vulnerability.
7e38839c57fb28f501a4b08fba6935a0fba1a06153b69a44056f7c139d22ed77
qdPM version 9.1 suffers from a remote SQL injection vulnerability.
e81be54e975ddb9efc4ef78b705ee0e474bff1089a5a48aed1d455217623fec4
qdPM version 9.1 suffers from a remote SQL injection vulnerability.
be69d3f7d431d0964e2a89d2816659a6ff6ada3a67cd1457bb1166a6bd28d33d
Secunia Security Advisory - loneferret has discovered a vulnerability in qdPM, which can be exploited by malicious users to compromise a vulnerable system.
716e5c3365715b07a16c4023a4789e688901cbad253c9df6b7dbf9d0d98cd190
This Metasploit module exploits a vulnerability found in qdPM - a web-based project management software. The user profile's photo upload feature can be abused to upload any arbitrary file onto the victim server machine, which allows remote code execution. Please note in order to use this module, you must have a valid credential to sign in.
f5f6ba93d6feeeed1d320115b76b89c669688a7089990888c0aafa5f2993314c
qdPM version 7 suffers from a remote shell upload vulnerability.
de7d737317088da35d6c5415b3002cc2704e760c0485eed4b429a49321a72e9c