Page 8 of 83 results (0.002 seconds)

CVSS: 9.8EPSS: 3%CPEs: 60EXPL: 2

17 Jun 2012 — The mc_issue_note_update function in the SOAP API in MantisBT before 1.2.11 does not properly check privileges, which allows remote attackers with bug reporting privileges to edit arbitrary bugnotes via a SOAP request. La función de mc_issue_note_update en la API SOAP en MantisBT anterior a v1.2.11 no comprueba correctamente los privilegios, lo que permite a atacantes remotos con privilegios de reporte de informes de errores editar bugnotes arbitrarios a través de una solicitud SOAP. • http://lists.fedoraproject.org/pipermail/package-announce/2012-November/092926.html • CWE-264: Permissions, Privileges, and Access Controls •

CVSS: 6.5EPSS: 0%CPEs: 48EXPL: 0

17 Jun 2012 — MantisBT before 1.2.11 does not check the delete_attachments_threshold permission when form_security_validation is set to OFF, which allows remote authenticated users with certain privileges to bypass intended access restrictions and delete arbitrary attachments. MantisBT anterior a v1.2.11 no comprueba el permiso delete_attachments_threshold form_security_validation cuando está en OFF, lo que permite a usuarios remotos autenticados con ciertos privilegios eludir las restricciones de acceso previstas y elim... • http://lists.fedoraproject.org/pipermail/package-announce/2012-November/092926.html • CWE-264: Permissions, Privileges, and Access Controls •

CVSS: 6.1EPSS: 1%CPEs: 27EXPL: 8

21 Sep 2011 — Cross-site scripting (XSS) vulnerability in bug_actiongroup_ext_page.php in MantisBT before 1.2.8 allows remote attackers to inject arbitrary web script or HTML via the action parameter, related to bug_actiongroup_page.php, a different vulnerability than CVE-2011-3357. Vulnerabilidad de ejecución de secuencias de comandos en sitios cruzados (XSS) en bug_actiongroup_ext_page.php en MantisBT antes de 1.2.8, permite a atacantes remotos inyectar secuencias de comandos web o HTML a través del parámetro action, r... • http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=640297 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 6.1EPSS: 21%CPEs: 26EXPL: 10

21 Sep 2011 — Multiple cross-site scripting (XSS) vulnerabilities in filter_api.php in MantisBT before 1.2.7 allow remote attackers to inject arbitrary web script or HTML via a parameter, as demonstrated by the project_id parameter to search.php. Varias vulnerabilidades de ejecución de comandos en sitios cruzados (XSS) en filter_api.php en MantisBT antes de la versión v1.2.7 permite a atacantes remotos inyectar secuencias de comandos web o HTML a través de un parámetro, tal y como se demuestra por el parámetro project_id... • https://www.exploit-db.com/exploits/36068 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 6.1EPSS: 0%CPEs: 27EXPL: 9

21 Sep 2011 — Multiple cross-site scripting (XSS) vulnerabilities in config_defaults_inc.php in MantisBT before 1.2.8 allow remote attackers to inject arbitrary web script or HTML via the PATH_INFO, as demonstrated by the PATH_INFO to (1) manage_config_email_page.php, (2) manage_config_workflow_page.php, or (3) bugs/plugin.php. Múltiples vulnerabilidad de ejecución de secuencias de comandos en sitios cruzados (XSS) en confige_defaults_inc.php en MantisBT antes de v1.2.8, permite a atacantes remotos inyectar secuencias de... • http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=640297 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 9.8EPSS: 1%CPEs: 27EXPL: 8

21 Sep 2011 — Directory traversal vulnerability in bug_actiongroup_ext_page.php in MantisBT before 1.2.8 allows remote attackers to include and execute arbitrary local files via a .. (dot dot) in the action parameter, related to bug_actiongroup_page.php. Vulnerabilidad de salto de directorio en bug_actiongroup_ext_page.php en MantisBT antes de v1.2.8, permite a atacantes remotos incluir y ejecutar archivos locales de su elección a través del parámetro .. (punto punto) en el parámetro action, relacionado con bug_actiongro... • http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=640297 • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •

CVSS: 6.1EPSS: 0%CPEs: 27EXPL: 7

21 Sep 2011 — Multiple cross-site scripting (XSS) vulnerabilities in MantisBT before 1.2.8 allow remote attackers to inject arbitrary web script or HTML via the (1) os, (2) os_build, or (3) platform parameter to (a) bug_report_page.php or (b) bug_update_advanced_page.php, related to use of the Projax library. Múltiples vulnerabilidades de ejecución de secuencias de comandos en sitios cruzados (XSS) en MantisBT antes de v1.2.8, permite a atacantes remotos inyectar secuencias de comandos web o HTML a través del parámetro (... • http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=640297 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 6.1EPSS: 11%CPEs: 39EXPL: 5

03 Jan 2011 — Cross-site scripting (XSS) vulnerability in admin/upgrade_unattended.php in MantisBT before 1.2.4 allows remote attackers to inject arbitrary web script or HTML via the db_type parameter, related to an unsafe call by MantisBT to a function in the ADOdb Library for PHP. Vulnerabilidad de ejecución de secuencias de comandos en sitios cruzados (XSS) en admin / upgrade_unattended.php en MantisBT antes de 1.2.4 permite a atacantes remotos inyectar secuencias de comandos web o HTML a través del parámetro db_type,... • https://www.exploit-db.com/exploits/15735 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 5.3EPSS: 10%CPEs: 39EXPL: 5

03 Jan 2011 — admin/upgrade_unattended.php in MantisBT before 1.2.4 allows remote attackers to obtain sensitive information via an invalid db_type parameter, which reveals the installation path in an error message, related to an unsafe call by MantisBT to a function in the ADOdb Library for PHP. admin / upgrade_unattended.php en MantisBT anterior a v1.2.4 permite a atacantes remotos obtener información sensible a través de un parámetro db_type no válido, lo cual revela la ruta de instalación en un mensaje de error, relac... • https://www.exploit-db.com/exploits/15735 • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •

CVSS: 9.8EPSS: 11%CPEs: 39EXPL: 6

03 Jan 2011 — Directory traversal vulnerability in admin/upgrade_unattended.php in MantisBT before 1.2.4 allows remote attackers to include and execute arbitrary local files via a .. (dot dot) in the db_type parameter, related to an unsafe call by MantisBT to a function in the ADOdb Library for PHP. Vulnerabilidad de salto de directorio en admin / upgrade_unattended.php en MantisBT antes de 1.2.4 permite a atacantes remotos incluir y ejecutar archivos locales a través de un .. (punto punto) en el parámetro db_type, relac... • https://www.exploit-db.com/exploits/15736 • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •