Page 11 of 85 results (0.011 seconds)

CVSS: 5.8EPSS: 0%CPEs: 1EXPL: 2

core/string_api.php in MantisBT before 1.2.18 does not properly categorize URLs when running under the web root, which allows remote attackers to conduct open redirect and phishing attacks via a crafted URL in the return parameter to login_page.php. core/string_api.php en MantisBT anterior a 1.2.18 no categoriza correctamente las URLs cuando funciona bajo el root web, lo que permite a atacantes remotos realizar ataques de redirección abierta y phishing a través de una URL manipulada en el parámetro return en login_page.php. • http://seclists.org/oss-sec/2014/q4/931 http://secunia.com/advisories/62101 http://www.debian.org/security/2015/dsa-3120 http://www.openwall.com/lists/oss-security/2014/12/03/11 http://www.securityfocus.com/bid/71478 https://exchange.xforce.ibmcloud.com/vulnerabilities/99128 https://github.com/mantisbt/mantisbt/commit/e66ecc9f https://www.mantisbt.org/bugs/view.php?id=17648 •

CVSS: 4.3EPSS: 0%CPEs: 1EXPL: 0

Cross-site scripting (XSS) vulnerability in admin/copy_field.php in MantisBT before 1.2.18 allows remote attackers to inject arbitrary web script or HTML via the dest_id field. Vulnerabilidad de XSS en admin/copy_field.php en MantisBT anterior a 1.2.18 permite a atacantes remotos inyectar secuencias de comandos web o HTML arbitrarios a través del campo dest_id. • http://seclists.org/oss-sec/2014/q4/867 http://seclists.org/oss-sec/2014/q4/913 http://seclists.org/oss-sec/2014/q4/924 http://secunia.com/advisories/62101 http://www.debian.org/security/2015/dsa-3120 http://www.securityfocus.com/bid/71371 https://exchange.xforce.ibmcloud.com/vulnerabilities/99038 https://github.com/mantisbt/mantisbt/commit/e5fc835a https://www.mantisbt.org/bugs/view.php?id=17876 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 4.3EPSS: 0%CPEs: 47EXPL: 0

Cross-site scripting (XSS) vulnerability in the projax_array_serialize_for_autocomplete function in core/projax_api.php in MantisBT 1.1.0a3 through 1.2.17 allows remote attackers to inject arbitrary web script or HTML via the "profile/Platform" field. Vulnerabilidad de XSS en la función projax_array_serialize_for_autocomplete en core/projax_api.php en MantisBT 1.1.0a3 hasta 1.2.17 permite a atacantes remotos inyectar secuencias de comandos web o HTML arbitrarios a través del campo 'profile/Platform'. • http://seclists.org/oss-sec/2014/q4/867 http://seclists.org/oss-sec/2014/q4/902 http://secunia.com/advisories/62101 http://www.debian.org/security/2015/dsa-3120 http://www.securityfocus.com/bid/71372 https://exchange.xforce.ibmcloud.com/vulnerabilities/99037 https://github.com/mantisbt/mantisbt/commit/0bff06ec https://www.mantisbt.org/bugs/view.php?id=17583 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 5.0EPSS: 0%CPEs: 47EXPL: 0

The print_test_result function in admin/upgrade_unattended.php in MantisBT 1.1.0a3 through 1.2.x before 1.2.18 allows remote attackers to obtain database credentials via a URL in the hostname parameter and reading the parameters in the response sent to the URL. La función print_test_result en admin/upgrade_unattended.php en MantisBT 1.1.0a3 hasta 1.2.x anterior a 1.2.18 permite a atacantes remotos obtener las credenciales de la base de datos a través de una URL en el parámetro hostname y la lectura de los parámetros en la respuesta enviada a la URL. • http://seclists.org/oss-sec/2014/q4/863 http://www.mantisbt.org/bugs/view.php?id=17877 http://www.securityfocus.com/bid/71359 https://exchange.xforce.ibmcloud.com/vulnerabilities/99031 https://github.com/mantisbt/mantisbt/commit/0826cef8 • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •

CVSS: 7.5EPSS: 3%CPEs: 1EXPL: 1

The current_user_get_bug_filter function in core/current_user_api.php in MantisBT before 1.2.18 allows remote attackers to execute arbitrary PHP code via the filter parameter. La función current_user_get_bug_filter en core/current_user_api.php en MantisBT anterior a 1.2.18 permite a atacantes remotos ejecutar código PHP arbitrario a través del parámetro filter. • http://seclists.org/oss-sec/2014/q4/864 http://seclists.org/oss-sec/2014/q4/923 http://secunia.com/advisories/62101 http://www.debian.org/security/2015/dsa-3120 http://www.mantisbt.org/bugs/view.php?id=17875 http://www.securityfocus.com/bid/71361 https://exchange.xforce.ibmcloud.com/vulnerabilities/99016 https://github.com/mantisbt/mantisbt/commit/599364b2 • CWE-94: Improper Control of Generation of Code ('Code Injection') •