Page 5 of 43 results (0.013 seconds)

CVSS: 7.5EPSS: 1%CPEs: 50EXPL: 1

Mantis before 0.19.4 allows remote attackers to bypass the file upload size restriction by modifying the max_file_size parameter to (1) bug_file_add.php, (2) bug_report.php, (3) bug_report_advanced_page.php, and (4) proj_doc_add_page.php. • http://secunia.com/advisories/18181 http://secunia.com/advisories/18221 http://secunia.com/advisories/18481 http://sourceforge.net/project/shownotes.php?release_id=377932&group_id=14963 http://www.debian.org/security/2005/dsa-944 http://www.gentoo.org/security/en/glsa/glsa-200512-12.xml http://www.osvdb.org/22056 http://www.securityfocus.com/bid/16046 http://www.trapkit.de/advisories/TKADV2005-11-002.txt http://www.vupen.com/english/advisories/2005/3064 •

CVSS: 4.3EPSS: 0%CPEs: 65EXPL: 2

Cross-site scripting (XSS) vulnerability in view_filters_page.php in Mantis 1.0.0rc3 and earlier allows remote attackers to inject arbitrary web script or HTML via the target_field parameter. • https://www.exploit-db.com/exploits/26798 http://pridels0.blogspot.com/2005/12/mantis-bugtracking-system-xss-vuln.html http://secunia.com/advisories/18018 http://secunia.com/advisories/18481 http://www.debian.org/security/2005/dsa-944 http://www.securityfocus.com/bid/15842 http://www.vupen.com/english/advisories/2005/2874 •

CVSS: 7.5EPSS: 8%CPEs: 2EXPL: 2

PHP file inclusion vulnerability in bug_sponsorship_list_view_inc.php in Mantis 1.0.0RC2 and 0.19.2 allows remote attackers to execute arbitrary PHP code and include arbitrary local files via the t_core_path parameter. • http://bugs.mantisbt.org/changelog_page.php http://secunia.com/advisories/16506 http://secunia.com/advisories/16818 http://secunia.com/advisories/17362 http://secunia.com/advisories/17654 http://secunia.com/secunia_research/2005-46/advisory http://securityreason.com/securityalert/121 http://securitytracker.com/id?1015110 http://www.debian.org/security/2005/dsa-905 http://www.gentoo.org/security/en/glsa/glsa-200510-24.xml http://www.securityfocus.com/bid/15212 http://w •

CVSS: 7.2EPSS: 1%CPEs: 7EXPL: 0

Mantis before 0.19.3 caches the User ID longer than necessary, which has unknown impact and attack vectors. • http://bugs.mantisbt.org/changelog_page.php http://secunia.com/advisories/16506 http://secunia.com/advisories/17362 http://secunia.com/advisories/17654 http://www.debian.org/security/2005/dsa-905 http://www.gentoo.org/security/en/glsa/glsa-200510-24.xml http://www.securityfocus.com/bid/15227 •

CVSS: 7.5EPSS: 1%CPEs: 2EXPL: 0

SQL injection vulnerability in Mantis 1.0.0RC2 and 0.19.2 allows remote attackers to execute arbitrary SQL commands via unknown vectors. • http://bugs.mantisbt.org/changelog_page.php http://secunia.com/advisories/16506 http://secunia.com/advisories/16818 http://secunia.com/advisories/17362 http://secunia.com/advisories/17654 http://sourceforge.net/project/shownotes.php?release_id=362673 http://www.debian.org/security/2005/dsa-905 http://www.gentoo.org/security/en/glsa/glsa-200510-24.xml http://www.osvdb.org/20324 http://www.securityfocus.com/bid/15227 http://www.vupen.com/english/advisories/2005/2221 •