Page 5 of 26 results (0.012 seconds)

CVSS: 7.5EPSS: 8%CPEs: 2EXPL: 2

PHP file inclusion vulnerability in bug_sponsorship_list_view_inc.php in Mantis 1.0.0RC2 and 0.19.2 allows remote attackers to execute arbitrary PHP code and include arbitrary local files via the t_core_path parameter. • http://bugs.mantisbt.org/changelog_page.php http://secunia.com/advisories/16506 http://secunia.com/advisories/16818 http://secunia.com/advisories/17362 http://secunia.com/advisories/17654 http://secunia.com/secunia_research/2005-46/advisory http://securityreason.com/securityalert/121 http://securitytracker.com/id?1015110 http://www.debian.org/security/2005/dsa-905 http://www.gentoo.org/security/en/glsa/glsa-200510-24.xml http://www.securityfocus.com/bid/15212 http://w •

CVSS: 7.5EPSS: 1%CPEs: 2EXPL: 0

SQL injection vulnerability in Mantis 1.0.0RC2 and 0.19.2 allows remote attackers to execute arbitrary SQL commands via unknown vectors. • http://bugs.mantisbt.org/changelog_page.php http://secunia.com/advisories/16506 http://secunia.com/advisories/16818 http://secunia.com/advisories/17362 http://secunia.com/advisories/17654 http://sourceforge.net/project/shownotes.php?release_id=362673 http://www.debian.org/security/2005/dsa-905 http://www.gentoo.org/security/en/glsa/glsa-200510-24.xml http://www.osvdb.org/20324 http://www.securityfocus.com/bid/15227 http://www.vupen.com/english/advisories/2005/2221 •

CVSS: 4.3EPSS: 0%CPEs: 9EXPL: 0

Cross-site scripting (XSS) vulnerability in bug_actiongroup_page.php in Mantis 0.19.0a1 through 1.0.0a3 allows remote attackers to inject arbitrary web script or HTML via the summary of the bug, which is not quoted when view_all_bug_page.php is used to delete the bug, as identified by bug#0006002, a different vulnerability than CVE-2005-2557. • http://marc.info/?l=bugtraq&m=112786017426276&w=2 http://www.debian.org/security/2005/dsa-778 •

CVSS: 4.3EPSS: 0%CPEs: 59EXPL: 0

Cross-site scripting (XSS) vulnerability in Mantis before 1.0.0rc1 allows remote attackers to inject arbitrary web script or HTML via unknown attack vectors, as identified by bug#0005751 "thraxisp". • http://secunia.com/advisories/16506 http://secunia.com/advisories/17654 http://www.debian.org/security/2005/dsa-905 http://www.mantisbt.org/changelog.php http://www.securityfocus.com/bid/15227 •

CVSS: 7.5EPSS: 0%CPEs: 9EXPL: 0

core/database_api.php in Mantis 0.19.0a1 through 1.0.0a3, with register_globals enabled, allows remote attackers to connect to internal databases by modifying the g_db_type variable and monitoring the speed of responses, as identified by bug#0005956. • http://marc.info/?l=bugtraq&m=112786017426276&w=2 http://secunia.com/advisories/16506 http://www.debian.org/security/2005/dsa-778 http://www.gentoo.org/security/en/glsa/glsa-200509-16.xml http://www.securityfocus.com/bid/14604 •