Page 3 of 21 results (0.009 seconds)

CVSS: 10.0EPSS: 0%CPEs: 16EXPL: 0

Mantis before 1.1.0a2 sets the default value of $g_bug_reminder_threshold to "reporter" instead of a more privileged role, which has unknown impact and attack vectors, possibly related to frequency of reminders. Mantis en versiones anteriores a la 1.1.0a2 establece el valor por defecto del $g_bug_reminder_threshold a "reporter" en vez de un rol con más privilegios, lo cual tiene un impacto desconocido y vectores de ataque, posiblemente relacionado con la frecuencia de los recordatorios. • http://sourceforge.net/project/shownotes.php?release_id=469627 http://www.mantisbugtracker.com/changelog.php •

CVSS: 4.3EPSS: 0%CPEs: 61EXPL: 3

Multiple cross-site scripting (XSS) vulnerabilities in Mantis 1.00rc4 and earlier allow remote attackers to inject arbitrary web script or HTML via the (1) hide_status, (2) handler_id, (3) user_monitor, (4) reporter_id, (5) view_type, (6) show_severity, (7) show_category, (8) show_status, (9) show_resolution, (10) show_build, (11) show_profile, (12) show_priority, (13) highlight_changed, (14) relationship_type, and (15) relationship_bug parameters in (a) view_all_set.php; the (16) sort parameter in (b) manage_user_page.php; the (17) view_type parameter in (c) view_filters_page.php; and the (18) title parameter in (d) proj_doc_delete.php. NOTE: item 17 might be subsumed by CVE-2005-4522. • https://www.exploit-db.com/exploits/27229 https://www.exploit-db.com/exploits/27228 http://morph3us.org/advisories/20060214-mantis-100rc4.txt http://secunia.com/advisories/21400 http://sourceforge.net/project/showfiles.php?group_id=14963&package_id=12175&release_id=386059 http://sourceforge.net/project/shownotes.php?release_id=386059&group_id=14963 http://www.debian.org/security/2006/dsa-1133 http://www.osvdb.org/22487 http://www.osvdb.org/23248 http://www.securityfocus.com/ •

CVSS: 5.0EPSS: 3%CPEs: 61EXPL: 1

manage_user_page.php in Mantis 1.00rc4 and earlier does not properly handle a sort parameter containing a ' (quote) character, which allows remote attackers to trigger a SQL error that may be repeatedly reported to a user who makes subsequent web accesses with the MANTIS_MANAGE_COOKIE cookie. NOTE: this issue might be the same as vector 2 in CVE-2005-4519. • http://morph3us.org/advisories/20060214-mantis-100rc4.txt http://sourceforge.net/project/showfiles.php?group_id=14963&package_id=12175&release_id=386059 http://sourceforge.net/project/shownotes.php?release_id=386059&group_id=14963 http://www.securityfocus.com/archive/1/425046/100/0/threaded http://www.securityfocus.com/bid/16657 https://exchange.xforce.ibmcloud.com/vulnerabilities/24726 •

CVSS: 5.0EPSS: 0%CPEs: 65EXPL: 1

Mantis 1.0.0rc3 and earlier discloses private bugs via public RSS feeds, which allows remote attackers to obtain sensitive information. • http://secunia.com/advisories/18181 http://secunia.com/advisories/18221 http://secunia.com/advisories/18481 http://sourceforge.net/project/shownotes.php?release_id=377934&group_id=14963 http://www.debian.org/security/2005/dsa-944 http://www.trapkit.de/advisories/TKADV2005-11-002.txt http://www.vupen.com/english/advisories/2005/3064 •

CVSS: 7.5EPSS: 1%CPEs: 65EXPL: 1

Multiple SQL injection vulnerabilities in the manage user page (manage_user_page.php) in Mantis 1.0.0rc3 and earlier allow remote attackers to execute arbitrary SQL commands via the (1) prefix and (2) sort parameters to the manage user page (manage_user_page.php), or (3) the sort parameter to view_all_set.php. • http://secunia.com/advisories/18181 http://secunia.com/advisories/18221 http://secunia.com/advisories/18481 http://sourceforge.net/project/shownotes.php?release_id=377932&group_id=14963 http://sourceforge.net/project/shownotes.php?release_id=377934&group_id=14963 http://www.debian.org/security/2005/dsa-944 http://www.gentoo.org/security/en/glsa/glsa-200512-12.xml http://www.osvdb.org/22051 http://www.osvdb.org/22052 http://www.securityfocus.com/bid/16046 http://www •