Page 3 of 24 results (0.013 seconds)

CVSS: 10.0EPSS: 0%CPEs: 16EXPL: 0

Mantis before 1.1.0a2 sets the default value of $g_bug_reminder_threshold to "reporter" instead of a more privileged role, which has unknown impact and attack vectors, possibly related to frequency of reminders. Mantis en versiones anteriores a la 1.1.0a2 establece el valor por defecto del $g_bug_reminder_threshold a "reporter" en vez de un rol con más privilegios, lo cual tiene un impacto desconocido y vectores de ataque, posiblemente relacionado con la frecuencia de los recordatorios. • http://sourceforge.net/project/shownotes.php?release_id=469627 http://www.mantisbugtracker.com/changelog.php •

CVSS: 4.3EPSS: 0%CPEs: 61EXPL: 3

Multiple cross-site scripting (XSS) vulnerabilities in Mantis 1.00rc4 and earlier allow remote attackers to inject arbitrary web script or HTML via the (1) hide_status, (2) handler_id, (3) user_monitor, (4) reporter_id, (5) view_type, (6) show_severity, (7) show_category, (8) show_status, (9) show_resolution, (10) show_build, (11) show_profile, (12) show_priority, (13) highlight_changed, (14) relationship_type, and (15) relationship_bug parameters in (a) view_all_set.php; the (16) sort parameter in (b) manage_user_page.php; the (17) view_type parameter in (c) view_filters_page.php; and the (18) title parameter in (d) proj_doc_delete.php. NOTE: item 17 might be subsumed by CVE-2005-4522. • https://www.exploit-db.com/exploits/27229 https://www.exploit-db.com/exploits/27228 http://morph3us.org/advisories/20060214-mantis-100rc4.txt http://secunia.com/advisories/21400 http://sourceforge.net/project/showfiles.php?group_id=14963&package_id=12175&release_id=386059 http://sourceforge.net/project/shownotes.php?release_id=386059&group_id=14963 http://www.debian.org/security/2006/dsa-1133 http://www.osvdb.org/22487 http://www.osvdb.org/23248 http://www.securityfocus.com/ •

CVSS: 5.0EPSS: 3%CPEs: 61EXPL: 1

manage_user_page.php in Mantis 1.00rc4 and earlier does not properly handle a sort parameter containing a ' (quote) character, which allows remote attackers to trigger a SQL error that may be repeatedly reported to a user who makes subsequent web accesses with the MANTIS_MANAGE_COOKIE cookie. NOTE: this issue might be the same as vector 2 in CVE-2005-4519. • http://morph3us.org/advisories/20060214-mantis-100rc4.txt http://sourceforge.net/project/showfiles.php?group_id=14963&package_id=12175&release_id=386059 http://sourceforge.net/project/shownotes.php?release_id=386059&group_id=14963 http://www.securityfocus.com/archive/1/425046/100/0/threaded http://www.securityfocus.com/bid/16657 https://exchange.xforce.ibmcloud.com/vulnerabilities/24726 •

CVSS: 10.0EPSS: 0%CPEs: 30EXPL: 0

Unspecified vulnerability in (1) query_store.php and (2) manage_proj_create.php in Mantis before 1.0.0 has unknown impact and attack vectors. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information. An original vendor bug report is referenced, but not accessible to the general public. • http://secunia.com/advisories/21400 http://www.debian.org/security/2006/dsa-1133 http://www.securityfocus.com/bid/16561 http://www.vupen.com/english/advisories/2006/0485 •

CVSS: 4.3EPSS: 0%CPEs: 30EXPL: 0

Cross-site scripting (XSS) vulnerability in config_defaults_inc.php in Mantis before 1.0 allows remote attackers to inject arbitrary web script or HTML via unknown attack vectors. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information. An original vendor bug report is referenced, but not accessible to the general public. • http://secunia.com/advisories/21400 http://www.debian.org/security/2006/dsa-1133 http://www.securityfocus.com/bid/16561 http://www.vupen.com/english/advisories/2006/0485 https://exchange.xforce.ibmcloud.com/vulnerabilities/24585 •