Page 21 of 115 results (0.012 seconds)

CVSS: 7.5EPSS: 1%CPEs: 60EXPL: 2

The mc_issue_note_update function in the SOAP API in MantisBT before 1.2.11 does not properly check privileges, which allows remote attackers with bug reporting privileges to edit arbitrary bugnotes via a SOAP request. La función de mc_issue_note_update en la API SOAP en MantisBT anterior a v1.2.11 no comprueba correctamente los privilegios, lo que permite a atacantes remotos con privilegios de reporte de informes de errores editar bugnotes arbitrarios a través de una solicitud SOAP. • http://lists.fedoraproject.org/pipermail/package-announce/2012-November/092926.html http://lists.fedoraproject.org/pipermail/package-announce/2012-November/093063.html http://lists.fedoraproject.org/pipermail/package-announce/2012-November/093064.html http://secunia.com/advisories/49414 http://secunia.com/advisories/51199 http://security.gentoo.org/glsa/glsa-201211-01.xml http://www.mantisbt.org/bugs/changelog_page.php?version_id=148 http://www.mantisbt.org/bugs/view.php?id=14340 http://www& • CWE-264: Permissions, Privileges, and Access Controls •

CVSS: 5.0EPSS: 0%CPEs: 1EXPL: 1

MantisBT 1.2.4 allows remote attackers to obtain sensitive information via a direct request to a .php file, which reveals the installation path in an error message, as demonstrated by view_all_inc.php and certain other files. MantisBT v1.2.4 permite a atacantes remotos obtener información sensible a través de una petición directa a un archivo .php, lo que revela la ruta de instalación en un mensaje de error, como se demostró con view_all_inc.php y algunos otros archivos. • http://code.google.com/p/inspathx/source/browse/trunk/paths_vuln/%21_README http://code.google.com/p/inspathx/source/browse/trunk/paths_vuln/mantisbt-1.2.4 http://secunia.com/advisories/51199 http://security.gentoo.org/glsa/glsa-201211-01.xml http://www.openwall.com/lists/oss-security/2011/06/27/6 • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •

CVSS: 4.3EPSS: 2%CPEs: 26EXPL: 10

Multiple cross-site scripting (XSS) vulnerabilities in filter_api.php in MantisBT before 1.2.7 allow remote attackers to inject arbitrary web script or HTML via a parameter, as demonstrated by the project_id parameter to search.php. Varias vulnerabilidades de ejecución de comandos en sitios cruzados (XSS) en filter_api.php en MantisBT antes de la versión v1.2.7 permite a atacantes remotos inyectar secuencias de comandos web o HTML a través de un parámetro, tal y como se demuestra por el parámetro project_id a search.php. • https://www.exploit-db.com/exploits/36068 http://lists.fedoraproject.org/pipermail/package-announce/2011-September/066061.html http://packetstormsecurity.org/files/104149 http://secunia.com/advisories/51199 http://security.gentoo.org/glsa/glsa-201211-01.xml http://securityreason.com/securityalert/8391 http://www.mantisbt.org/bugs/view.php?id=13245 http://www.openwall.com/lists/oss-security/2011/08/18/7 http://www.openwall.com/lists/oss-security/2011/08/19/16 http://www • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 4.3EPSS: 0%CPEs: 27EXPL: 9

Multiple cross-site scripting (XSS) vulnerabilities in config_defaults_inc.php in MantisBT before 1.2.8 allow remote attackers to inject arbitrary web script or HTML via the PATH_INFO, as demonstrated by the PATH_INFO to (1) manage_config_email_page.php, (2) manage_config_workflow_page.php, or (3) bugs/plugin.php. Múltiples vulnerabilidad de ejecución de secuencias de comandos en sitios cruzados (XSS) en confige_defaults_inc.php en MantisBT antes de v1.2.8, permite a atacantes remotos inyectar secuencias de comandos web o HTML a través de PATH_INFO, como se demostró con el PATH_INFO de (1) manage_config_email_page.php, (2) manage_confige_workflow_page.php, o (3) bugs/plugin.php • http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=640297 http://lists.debian.org/debian-security-tracker/2011/09/msg00012.html http://lists.fedoraproject.org/pipermail/package-announce/2011-September/066061.html http://secunia.com/advisories/51199 http://security.gentoo.org/glsa/glsa-201211-01.xml http://securityreason.com/securityalert/8392 http://www.mantisbt.org/bugs/view.php?id=13191 http://www.mantisbt.org/bugs/view.php?id=13281 http://www.openwall.com/lists/oss-security/201 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 4.3EPSS: 0%CPEs: 27EXPL: 8

Cross-site scripting (XSS) vulnerability in bug_actiongroup_ext_page.php in MantisBT before 1.2.8 allows remote attackers to inject arbitrary web script or HTML via the action parameter, related to bug_actiongroup_page.php, a different vulnerability than CVE-2011-3357. Vulnerabilidad de ejecución de secuencias de comandos en sitios cruzados (XSS) en bug_actiongroup_ext_page.php en MantisBT antes de 1.2.8, permite a atacantes remotos inyectar secuencias de comandos web o HTML a través del parámetro action, relacionado con bug_actiongroup_page.php, una vulnerabilidad diferente de CVE-2011-3357 • http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=640297 http://lists.debian.org/debian-security-tracker/2011/09/msg00012.html http://lists.fedoraproject.org/pipermail/package-announce/2011-September/066061.html http://secunia.com/advisories/45961 http://secunia.com/advisories/51199 http://security.gentoo.org/glsa/glsa-201211-01.xml http://securityreason.com/securityalert/8392 http://www.debian.org/security/2011/dsa-2308 http://www.mantisbt.org/bugs/view.php?id=13281 http://www • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •