Page 9 of 46 results (0.005 seconds)

CVSS: 5.0EPSS: 0%CPEs: 16EXPL: 0

Mantis before 0.17.4 allows remote attackers to list project bugs without authentication by modifying the cookie that is used by the "View Bugs" page. • http://mantisbt.sourceforge.net/advisories/2002/2002-03.txt http://marc.info/?l=bugtraq&m=102978673018271&w=2 http://www.debian.org/security/2002/dsa-153 http://www.securityfocus.com/bid/5514 https://exchange.xforce.ibmcloud.com/vulnerabilities/9899 •

CVSS: 7.5EPSS: 7%CPEs: 16EXPL: 2

summary_graph_functions.php in Mantis 0.17.3 and earlier allows remote attackers to execute arbitrary PHP code by modifying the g_jpgraph_path parameter to reference the location of the PHP code. • https://www.exploit-db.com/exploits/21727 http://marc.info/?l=bugtraq&m=102927873301965&w=2 http://marc.info/?l=bugtraq&m=102978924821040&w=2 http://www.debian.org/security/2002/dsa-153 http://www.osvdb.org/4858 http://www.securityfocus.com/bid/5504 https://exchange.xforce.ibmcloud.com/vulnerabilities/9829 •

CVSS: 7.5EPSS: 0%CPEs: 6EXPL: 0

The "View Bugs" page (view_all_bug_page.php) in Mantis 0.17.4a and earlier includes summaries of private bugs for users that do not have access to any projects. • http://marc.info/?l=bugtraq&m=103014152320112&w=2 http://www.debian.org/security/2002/dsa-161 http://www.securityfocus.com/bid/5565 https://exchange.xforce.ibmcloud.com/vulnerabilities/9955 •

CVSS: 10.0EPSS: 0%CPEs: 15EXPL: 0

Multiple SQL injection vulnerabilities in Mantis 0.17.2 and earlier, when running without magic_quotes_gpc enabled, allows remote attackers to gain privileges or perform unauthorized database operations via modified form fields, e.g. to account_update.php. • http://mantisbt.sourceforge.net/advisories/2002/2002-01.txt http://marc.info/?l=bugtraq&m=102978728718851&w=2 http://www.debian.org/security/2002/dsa-153 http://www.iss.net/security_center/static/9897.php http://www.securityfocus.com/bid/5510 •

CVSS: 5.0EPSS: 0%CPEs: 6EXPL: 0

Mantis 0.17.4a and earlier allows remote attackers to view private bugs by modifying the f_id bug ID parameter to (1) bug_update_advanced_page.php, (2) bug_update_page.php, (3) view_bug_advanced_page.php, or (4) view_bug_page.php. • http://mantisbt.sourceforge.net/advisories/2002/2002-06.txt http://marc.info/?l=bugtraq&m=103013249211164&w=2 http://www.debian.org/security/2002/dsa-161 http://www.iss.net/security_center/static/9954.php http://www.securityfocus.com/bid/5563 •