Page 8 of 115 results (0.005 seconds)

CVSS: 7.5EPSS: 0%CPEs: 1EXPL: 0

17 Dec 2014 — bug_report.php in MantisBT before 1.2.18 allows remote attackers to assign arbitrary issues via the handler_id parameter. bug_report.php en MantisBT anterior a 1.2.18 permite a atacantes remotos a asignar código arbitrario mediante el parámetro handler_id. Multiple security issues have been found in the Mantis bug tracking system, which may result in phishing, information disclosure, CAPTCHA bypass, SQL injection, cross-site scripting or the execution of arbitrary PHP code. • http://seclists.org/oss-sec/2014/q4/955 • CWE-284: Improper Access Control •

CVSS: 6.1EPSS: 0%CPEs: 1EXPL: 2

12 Dec 2014 — core/string_api.php in MantisBT before 1.2.18 does not properly categorize URLs when running under the web root, which allows remote attackers to conduct open redirect and phishing attacks via a crafted URL in the return parameter to login_page.php. core/string_api.php en MantisBT anterior a 1.2.18 no categoriza correctamente las URLs cuando funciona bajo el root web, lo que permite a atacantes remotos realizar ataques de redirección abierta y phishing a través de una URL manipulada en el parámetro return e... • http://seclists.org/oss-sec/2014/q4/931 •

CVSS: 6.1EPSS: 0%CPEs: 1EXPL: 0

09 Dec 2014 — Cross-site scripting (XSS) vulnerability in admin/copy_field.php in MantisBT before 1.2.18 allows remote attackers to inject arbitrary web script or HTML via the dest_id field. Vulnerabilidad de XSS en admin/copy_field.php en MantisBT anterior a 1.2.18 permite a atacantes remotos inyectar secuencias de comandos web o HTML arbitrarios a través del campo dest_id. Multiple security issues have been found in the Mantis bug tracking system, which may result in phishing, information disclosure, CAPTCHA bypass, SQ... • http://seclists.org/oss-sec/2014/q4/867 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 6.1EPSS: 0%CPEs: 47EXPL: 0

08 Dec 2014 — Cross-site scripting (XSS) vulnerability in the projax_array_serialize_for_autocomplete function in core/projax_api.php in MantisBT 1.1.0a3 through 1.2.17 allows remote attackers to inject arbitrary web script or HTML via the "profile/Platform" field. Vulnerabilidad de XSS en la función projax_array_serialize_for_autocomplete en core/projax_api.php en MantisBT 1.1.0a3 hasta 1.2.17 permite a atacantes remotos inyectar secuencias de comandos web o HTML arbitrarios a través del campo 'profile/Platform'. Multip... • http://seclists.org/oss-sec/2014/q4/867 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 7.5EPSS: 0%CPEs: 47EXPL: 0

08 Dec 2014 — The print_test_result function in admin/upgrade_unattended.php in MantisBT 1.1.0a3 through 1.2.x before 1.2.18 allows remote attackers to obtain database credentials via a URL in the hostname parameter and reading the parameters in the response sent to the URL. La función print_test_result en admin/upgrade_unattended.php en MantisBT 1.1.0a3 hasta 1.2.x anterior a 1.2.18 permite a atacantes remotos obtener las credenciales de la base de datos a través de una URL en el parámetro hostname y la lectura de los p... • http://seclists.org/oss-sec/2014/q4/863 • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •

CVSS: 9.8EPSS: 1%CPEs: 1EXPL: 1

08 Dec 2014 — The current_user_get_bug_filter function in core/current_user_api.php in MantisBT before 1.2.18 allows remote attackers to execute arbitrary PHP code via the filter parameter. La función current_user_get_bug_filter en core/current_user_api.php en MantisBT anterior a 1.2.18 permite a atacantes remotos ejecutar código PHP arbitrario a través del parámetro filter. Multiple security issues have been found in the Mantis bug tracking system, which may result in phishing, information disclosure, CAPTCHA bypass, SQ... • http://seclists.org/oss-sec/2014/q4/864 • CWE-94: Improper Control of Generation of Code ('Code Injection') •

CVSS: 7.5EPSS: 0%CPEs: 1EXPL: 0

06 Dec 2014 — MantisBT before 1.2.18 uses the public_key parameter value as the key to the CAPTCHA answer, which allows remote attackers to bypass the CAPTCHA protection mechanism by leveraging knowledge of a CAPTCHA answer for a public_key parameter value, as demonstrated by E4652 for the public_key value 0. MantisBT anterior a 1.2.18 utiliza el valor del parámetro public_key como la clave para la respuesta CAPTCHA, lo que permite a atacantes remotos evadir el mecanismo de protección CAPTCHA mediante el aprovechamiento ... • http://secunia.com/advisories/62101 • CWE-284: Improper Access Control •

CVSS: 9.8EPSS: 0%CPEs: 2EXPL: 1

28 Nov 2014 — Multiple SQL injection vulnerabilities in view_all_bug_page.php in MantisBT before 1.2.18 allow remote attackers to execute arbitrary SQL commands via the (1) sort or (2) dir parameter to view_all_set.php. Múltiples vulnerabilidades de inyección SQL en view_all_bug_page.php en MantisBT anterior a 1.2.18 permiten a atacantes remotos ejecutar comandos SQL arbitrarios a través del parámetro (1) sort o (2) dir en view_all_set.php. Multiple security issues have been found in the Mantis bug tracking system, which... • http://secunia.com/advisories/62101 • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •

CVSS: 6.1EPSS: 0%CPEs: 5EXPL: 0

24 Nov 2014 — Cross-site scripting (XSS) vulnerability in the selection list in the filters in the Configuration Report page (adm_config_report.php) in MantisBT 1.2.13 through 1.2.17 allows remote administrators to inject arbitrary web script or HTML via a crafted config option, a different vulnerability than CVE-2014-8987. Vulnerabilidad de XSS en la lista de selección en los filtros en la página Configuration Report (adm_config_report.php) en MantisBT 1.2.13 hasta 1.2.17 permite a administradores remotos inyectar secue... • http://secunia.com/advisories/62101 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 7.5EPSS: 0%CPEs: 1EXPL: 0

24 Nov 2014 — MantisBT before 1.2.18 allows remote authenticated users to bypass the $g_download_attachments_threshold and $g_view_attachments_threshold restrictions and read attachments for private projects by leveraging access to a project that does not restrict access to attachments and a request to the download URL. MantisBT anterior a 1.2.18 permite a usuarios remotos autenticados evadir las restricciones $g_download_attachments_threshold y $g_view_attachments_threshold y leer adjuntos para proyectos privados median... • http://seclists.org/oss-sec/2014/q4/693 • CWE-264: Permissions, Privileges, and Access Controls •