Metrics
Affected Vendors & Products
No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Tue, 23 Dec 2025 23:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Projectsend
Projectsend projectsend |
|
| Vendors & Products |
Projectsend
Projectsend projectsend |
Mon, 22 Dec 2025 22:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 22 Dec 2025 21:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | ProjectSend r1605 contains a remote code execution vulnerability that allows attackers to upload malicious files by manipulating file extensions. Attackers can upload shell scripts with disguised extensions through the upload.process.php endpoint to execute arbitrary commands on the server. | |
| Title | ProjectSend r1605 Remote Code Execution via File Extension Manipulation | |
| Weaknesses | CWE-434 | |
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2025-12-22T22:04:02.619Z
Reserved: 2025-12-20T16:31:20.899Z
Link: CVE-2023-53980
Updated: 2025-12-22T21:57:25.283Z
Status : Awaiting Analysis
Published: 2025-12-22T22:16:03.710
Modified: 2025-12-23T14:51:52.650
Link: CVE-2023-53980
No data.
OpenCVE Enrichment
Updated: 2025-12-23T22:39:56Z