Page 4 of 46 results (0.003 seconds)

CVSS: 6.1EPSS: 8%CPEs: 23EXPL: 2

28 Sep 2005 — Cross-site scripting (XSS) vulnerability in view_all_set.php in Mantis 0.19.0a1 through 1.0.0a3 allows remote attackers to inject arbitrary web script or HTML via the dir parameter, as identified by bug#0005959, and a different vulnerability than CVE-2005-3090. • https://www.exploit-db.com/exploits/26172 •

CVSS: 6.1EPSS: 0%CPEs: 9EXPL: 0

28 Sep 2005 — Cross-site scripting (XSS) vulnerability in bug_actiongroup_page.php in Mantis 0.19.0a1 through 1.0.0a3 allows remote attackers to inject arbitrary web script or HTML via the summary of the bug, which is not quoted when view_all_bug_page.php is used to delete the bug, as identified by bug#0006002, a different vulnerability than CVE-2005-2557. • http://marc.info/?l=bugtraq&m=112786017426276&w=2 •

CVSS: 6.1EPSS: 0%CPEs: 59EXPL: 0

28 Sep 2005 — Cross-site scripting (XSS) vulnerability in Mantis before 1.0.0rc1 allows remote attackers to inject arbitrary web script or HTML via unknown attack vectors, as identified by bug#0005751 "thraxisp". • http://secunia.com/advisories/16506 •

CVSS: 7.5EPSS: 0%CPEs: 9EXPL: 0

24 Aug 2005 — core/database_api.php in Mantis 0.19.0a1 through 1.0.0a3, with register_globals enabled, allows remote attackers to connect to internal databases by modifying the g_db_type variable and monitoring the speed of responses, as identified by bug#0005956. • http://marc.info/?l=bugtraq&m=112786017426276&w=2 •

CVSS: 6.1EPSS: 0%CPEs: 50EXPL: 1

31 Dec 2004 — Cross-site scripting (XSS) vulnerability in Mantis bugtracker allows remote attackers to inject arbitrary web script or HTML via (1) the return parameter to login_page.php, (2) e-mail field in signup.php, (3) action parameter to login_select_proj_page.php, or (4) hide_status parameter to view_all_set.php. • http://marc.info/?l=bugtraq&m=109312225727345&w=2 •

CVSS: 9.8EPSS: 1%CPEs: 1EXPL: 1

31 Dec 2004 — PHP remote file inclusion vulnerability in Mantis 0.19.0a allows remote attackers to execute arbitrary PHP code by modifying the (1) t_core_path parameter to bug_api.php or (2) t_core_dir parameter to relationship_api.php to reference a URL on a remote web server that contains the code. • http://marc.info/?l=bugtraq&m=109313416727851&w=2 •

CVSS: 5.3EPSS: 0%CPEs: 56EXPL: 0

31 Dec 2004 — Mantis before 20041016 provides a complete Issue History (Bug History) in the web interface regardless of view_history_threshold, which allows remote attackers to obtain sensitive information (private bug details) by visiting a bug's web page. • http://bugs.mantisbugtracker.com/view.php?id=4724 •

CVSS: 7.5EPSS: 4%CPEs: 50EXPL: 2

20 Aug 2004 — signup_page.php in Mantis bugtracker allows remote attackers to send e-mail bombs by creating multiple users and providing the same e-mail address. • https://www.exploit-db.com/exploits/24392 •

CVSS: 7.1EPSS: 0%CPEs: 1EXPL: 0

04 Jul 2003 — Mantis 0.17.5 and earlier stores its database password in cleartext in a world-readable configuration file, which allows local users to perform unauthorized database operations. Mantis 0.17.5 y anteriores almacena sus contraseñas de base de datos en un fichero de configuración legible por todo el mundo, lo que permite a usuarios locales realizar operaciones de base de datos no permitidas. • https://www.debian.org/security/2003/dsa-335 •

CVSS: 7.5EPSS: 0%CPEs: 6EXPL: 0

04 Oct 2002 — print_all_bug_page.php in Mantis 0.17.3 and earlier does not verify the limit_reporters option, which allows remote attackers to view bug summaries for bugs that would otherwise be restricted. • http://mantisbt.sourceforge.net/advisories/2002/2002-02.txt • CWE-264: Permissions, Privileges, and Access Controls •