Page 2 of 20 results (0.005 seconds)

CVSS: 6.5EPSS: 3%CPEs: 95EXPL: 1

Eval injection vulnerability in adm_config_set.php in Mantis before 1.1.2 allows remote authenticated administrators to execute arbitrary code via the value parameter. Vulnerabilidad de inyección "Eval" en adm_config_set.php en Mantis anterior a 1.1.2, permite a administradores autenticados remotamente ejecutar código de su elección a través del parámetro "value". • https://www.exploit-db.com/exploits/5657 http://marc.info/?l=bugtraq&m=121130774617956&w=4 http://secunia.com/advisories/30270 http://secunia.com/advisories/31972 http://securityreason.com/securityalert/4044 http://www.gentoo.org/security/en/glsa/glsa-200809-10.xml http://www.mantisbt.org/bugs/changelog_page.php http://www.securityfocus.com/bid/29297 http://www.vupen.com/english/advisories/2008/1598/references https://exchange.xforce.ibmcloud.com/vulnerabilities/42550 • CWE-94: Improper Control of Generation of Code ('Code Injection') •

CVSS: 7.5EPSS: 10%CPEs: 95EXPL: 0

Directory traversal vulnerability in core/lang_api.php in Mantis before 1.1.2 allows remote attackers to include and execute arbitrary files via the language parameter to the user preferences page (account_prefs_update.php). Una vulnerabilidad de salto de directorio en el archivo core/lang_api.php en Mantis anterior a versión 1.1.2, permite a los atacantes remotos incluir y ejecutar archivos arbitrarios por medio del parámetro language en la página de preferencias del usuario (archivo account_prefs_update.php). • http://secunia.com/advisories/30270 http://secunia.com/advisories/31972 http://www.gentoo.org/security/en/glsa/glsa-200809-10.xml http://www.mantisbt.org/bugs/changelog_page.php http://www.mantisbt.org/bugs/view.php?id=9154 http://www.securityfocus.com/bid/29297 http://www.securityfocus.com/bid/30354 https://bugzilla.redhat.com/show_bug.cgi?id=456044 https://exchange.xforce.ibmcloud.com/vulnerabilities/43984 • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •

CVSS: 4.3EPSS: 2%CPEs: 73EXPL: 0

Cross-site scripting (XSS) vulnerability in Mantis before 1.1.1 allows remote attackers to inject arbitrary web script or HTML via vectors related to the "Most active bugs" summary. Una vulnerabilidad de tipo cross-site scripting (XSS) en Mantis versiones anteriores a 1.1.1, permite a atacantes remotos inyectar script web o HTML arbitrario por medio de vectores relacionados con el resumen de "Most active bugs". • http://secunia.com/advisories/28577 http://secunia.com/advisories/28591 http://sourceforge.net/project/shownotes.php?release_id=569765 http://www.securityfocus.com/bid/27367 http://www.vupen.com/english/advisories/2008/0232 https://bugzilla.redhat.com/show_bug.cgi?id=429552 https://exchange.xforce.ibmcloud.com/vulnerabilities/39801 https://www.redhat.com/archives/fedora-package-announce/2008-January/msg00676.html https://www.redhat.com/archives/fedora-package-announce/2008-January/msg00734.html • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 4.3EPSS: 5%CPEs: 1EXPL: 0

Cross-site scripting (XSS) vulnerability in view.php in Mantis before 1.1.0 allows remote attackers to inject arbitrary web script or HTML via a filename, related to bug_report.php. Una vulnerabilidad de tipo cross-site scripting (XSS) en el archivo view.php en Mantis versiones anteriores a 1.1.0, permite a los atacantes remotos inyectar script web o HTML arbitrario por medio del filename, relacionado con el archivo bug_report.php. • http://osvdb.org/39873 http://secunia.com/advisories/28185 http://secunia.com/advisories/28352 http://secunia.com/advisories/28551 http://secunia.com/advisories/29198 http://security.gentoo.org/glsa/glsa-200803-04.xml http://sourceforge.net/project/shownotes.php?release_id=562940 http://www.debian.org/security/2008/dsa-1467 http://www.mantisbt.org/bugs/view.php?id=8679 http://www.securityfocus.com/bid/27045 https://bugzilla.redhat.com/show_bug.cgi?id=427277 https:& • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 5.0EPSS: 0%CPEs: 16EXPL: 0

Mantis before 1.1.0a2 does not implement per-item access control for Issue History (Bug History), which allows remote attackers to obtain sensitive information by reading the Change column, as demonstrated by the Change column of a custom field. Mantis anterior a 1.1.0a2 no implementa el control de acceso del por artículo para Issue History (Bug History), lo cual permite a un atacante remoto obtener información sensible a través de la lectura de la columna Change, como se demostró por la columna Change de un campo cliente. • http://bugs.mantisbugtracker.com/view.php?id=3375 http://bugs.mantisbugtracker.com/view.php?id=7364 http://mantisbt.cvs.sourceforge.net/mantisbt/mantisbt/core/history_api.php?r1=1.34&r2=1.35 http://mantisbt.cvs.sourceforge.net/mantisbt/mantisbt/core/history_api.php?view=log http://secunia.com/advisories/23258 http://secunia.com/advisories/28551 http://sourceforge.net/project/shownotes.php? •