Page 5 of 24 results (0.003 seconds)

CVSS: 5.0EPSS: 0%CPEs: 56EXPL: 0

Mantis before 20041016 provides a complete Issue History (Bug History) in the web interface regardless of view_history_threshold, which allows remote attackers to obtain sensitive information (private bug details) by visiting a bug's web page. • http://bugs.mantisbugtracker.com/view.php?id=4724 http://mantisbt.cvs.sourceforge.net/mantisbt/mantisbt/history_inc.php?r1=1.24&r2=1.25 http://mantisbt.cvs.sourceforge.net/mantisbt/mantisbt/history_inc.php?view=log •

CVSS: 4.3EPSS: 0%CPEs: 50EXPL: 1

Cross-site scripting (XSS) vulnerability in Mantis bugtracker allows remote attackers to inject arbitrary web script or HTML via (1) the return parameter to login_page.php, (2) e-mail field in signup.php, (3) action parameter to login_select_proj_page.php, or (4) hide_status parameter to view_all_set.php. • http://marc.info/?l=bugtraq&m=109312225727345&w=2 http://secunia.com/advisories/12338 http://www.securityfocus.com/bid/10994 https://exchange.xforce.ibmcloud.com/vulnerabilities/17066 https://exchange.xforce.ibmcloud.com/vulnerabilities/17069 https://exchange.xforce.ibmcloud.com/vulnerabilities/17070 https://exchange.xforce.ibmcloud.com/vulnerabilities/17072 •

CVSS: 5.0EPSS: 4%CPEs: 50EXPL: 2

signup_page.php in Mantis bugtracker allows remote attackers to send e-mail bombs by creating multiple users and providing the same e-mail address. • https://www.exploit-db.com/exploits/24392 http://marc.info/?l=bugtraq&m=109312225727345&w=2 http://www.securityfocus.com/bid/10995 https://exchange.xforce.ibmcloud.com/vulnerabilities/17093 •

CVSS: 3.6EPSS: 0%CPEs: 1EXPL: 0

Mantis 0.17.5 and earlier stores its database password in cleartext in a world-readable configuration file, which allows local users to perform unauthorized database operations. Mantis 0.17.5 y anteriores almacena sus contraseñas de base de datos en un fichero de configuración legible por todo el mundo, lo que permite a usuarios locales realizar operaciones de base de datos no permitidas. • https://www.debian.org/security/2003/dsa-335 •