Page 9 of 47 results (0.008 seconds)

CVSS: 7.5EPSS: 7%CPEs: 16EXPL: 2

summary_graph_functions.php in Mantis 0.17.3 and earlier allows remote attackers to execute arbitrary PHP code by modifying the g_jpgraph_path parameter to reference the location of the PHP code. • https://www.exploit-db.com/exploits/21727 http://marc.info/?l=bugtraq&m=102927873301965&w=2 http://marc.info/?l=bugtraq&m=102978924821040&w=2 http://www.debian.org/security/2002/dsa-153 http://www.osvdb.org/4858 http://www.securityfocus.com/bid/5504 https://exchange.xforce.ibmcloud.com/vulnerabilities/9829 •

CVSS: 5.0EPSS: 0%CPEs: 16EXPL: 0

Mantis before 0.17.4 allows remote attackers to list project bugs without authentication by modifying the cookie that is used by the "View Bugs" page. • http://mantisbt.sourceforge.net/advisories/2002/2002-03.txt http://marc.info/?l=bugtraq&m=102978673018271&w=2 http://www.debian.org/security/2002/dsa-153 http://www.securityfocus.com/bid/5514 https://exchange.xforce.ibmcloud.com/vulnerabilities/9899 •

CVSS: 5.0EPSS: 0%CPEs: 6EXPL: 0

print_all_bug_page.php in Mantis 0.17.3 and earlier does not verify the limit_reporters option, which allows remote attackers to view bug summaries for bugs that would otherwise be restricted. • http://mantisbt.sourceforge.net/advisories/2002/2002-02.txt http://marc.info/?l=bugtraq&m=102978873620491&w=2 http://www.debian.org/security/2002/dsa-153 http://www.securityfocus.com/bid/5515 https://exchange.xforce.ibmcloud.com/vulnerabilities/9898 • CWE-264: Permissions, Privileges, and Access Controls •

CVSS: 7.5EPSS: 0%CPEs: 6EXPL: 0

The "View Bugs" page (view_all_bug_page.php) in Mantis 0.17.4a and earlier includes summaries of private bugs for users that do not have access to any projects. • http://marc.info/?l=bugtraq&m=103014152320112&w=2 http://www.debian.org/security/2002/dsa-161 http://www.securityfocus.com/bid/5565 https://exchange.xforce.ibmcloud.com/vulnerabilities/9955 •

CVSS: 7.5EPSS: 1%CPEs: 4EXPL: 0

config_inc2.php in Mantis before 0.17.4 allows remote attackers to execute arbitrary code or read arbitrary files via the parameters (1) g_bottom_include_page, (2) g_top_include_page, (3) g_css_include_file, (4) g_meta_include_file, or (5) a cookie. • http://marc.info/?l=bugtraq&m=102978711618648&w=2 http://www.debian.org/security/2002/dsa-153 http://www.iss.net/security_center/static/9900.php http://www.securityfocus.com/bid/5509 •