Page 7 of 43 results (0.012 seconds)

CVSS: 4.3EPSS: 0%CPEs: 23EXPL: 2

Cross-site scripting (XSS) vulnerability in view_all_set.php in Mantis 0.19.0a1 through 1.0.0a3 allows remote attackers to inject arbitrary web script or HTML via the dir parameter, as identified by bug#0005959, and a different vulnerability than CVE-2005-3090. • https://www.exploit-db.com/exploits/26172 http://marc.info/?l=bugtraq&m=112786017426276&w=2 http://secunia.com/advisories/16506 http://www.debian.org/security/2005/dsa-778 http://www.gentoo.org/security/en/glsa/glsa-200509-16.xml http://www.mantisbt.org/changelog.php http://www.securityfocus.com/bid/14604 https://exchange.xforce.ibmcloud.com/vulnerabilities/21958 •

CVSS: 4.3EPSS: 0%CPEs: 50EXPL: 1

Cross-site scripting (XSS) vulnerability in Mantis bugtracker allows remote attackers to inject arbitrary web script or HTML via (1) the return parameter to login_page.php, (2) e-mail field in signup.php, (3) action parameter to login_select_proj_page.php, or (4) hide_status parameter to view_all_set.php. • http://marc.info/?l=bugtraq&m=109312225727345&w=2 http://secunia.com/advisories/12338 http://www.securityfocus.com/bid/10994 https://exchange.xforce.ibmcloud.com/vulnerabilities/17066 https://exchange.xforce.ibmcloud.com/vulnerabilities/17069 https://exchange.xforce.ibmcloud.com/vulnerabilities/17070 https://exchange.xforce.ibmcloud.com/vulnerabilities/17072 •

CVSS: 5.0EPSS: 0%CPEs: 56EXPL: 0

Mantis before 20041016 provides a complete Issue History (Bug History) in the web interface regardless of view_history_threshold, which allows remote attackers to obtain sensitive information (private bug details) by visiting a bug's web page. • http://bugs.mantisbugtracker.com/view.php?id=4724 http://mantisbt.cvs.sourceforge.net/mantisbt/mantisbt/history_inc.php?r1=1.24&r2=1.25 http://mantisbt.cvs.sourceforge.net/mantisbt/mantisbt/history_inc.php?view=log •

CVSS: 7.5EPSS: 0%CPEs: 1EXPL: 1

PHP remote file inclusion vulnerability in Mantis 0.19.0a allows remote attackers to execute arbitrary PHP code by modifying the (1) t_core_path parameter to bug_api.php or (2) t_core_dir parameter to relationship_api.php to reference a URL on a remote web server that contains the code. • http://marc.info/?l=bugtraq&m=109313416727851&w=2 http://www.securityfocus.com/bid/10993 https://exchange.xforce.ibmcloud.com/vulnerabilities/17065 •

CVSS: 5.0EPSS: 4%CPEs: 50EXPL: 2

signup_page.php in Mantis bugtracker allows remote attackers to send e-mail bombs by creating multiple users and providing the same e-mail address. • https://www.exploit-db.com/exploits/24392 http://marc.info/?l=bugtraq&m=109312225727345&w=2 http://www.securityfocus.com/bid/10995 https://exchange.xforce.ibmcloud.com/vulnerabilities/17093 •