Show filters
699 Total Results
Displaying 261-270 of 699
Sort by:
Attacker Value
Unknown

CVE-2009-20001

Disclosure Date: March 07, 2021 (last updated February 22, 2025)
An issue was discovered in MantisBT before 2.24.5. It associates a unique cookie string with each user. This string is not reset upon logout (i.e., the user session is still considered valid and active), allowing an attacker who somehow gained access to a user's cookie to login as them.
Attacker Value
Unknown

CVE-2020-35571

Disclosure Date: February 22, 2021 (last updated February 22, 2025)
An issue was discovered in MantisBT through 2.24.3. In the helper_ensure_confirmed call in manage_custom_field_update.php, the custom field name is not sanitized. This may be problematic depending on CSP settings.
Attacker Value
Unknown

CVE-2020-29604

Disclosure Date: January 29, 2021 (last updated February 22, 2025)
An issue was discovered in MantisBT before 2.24.4. A missing access check in bug_actiongroup.php allows an attacker (with rights to create new issues) to use the COPY group action to create a clone, including all bugnotes and attachments, of any private issue (i.e., one having Private view status, or belonging to a private Project) via the bug_arr[] parameter. This provides full access to potentially confidential information.
Attacker Value
Unknown

CVE-2020-29605

Disclosure Date: January 29, 2021 (last updated February 22, 2025)
An issue was discovered in MantisBT before 2.24.4. Due to insufficient access-level checks, any logged-in user allowed to perform Group Actions can get access to the Summary fields of private Issues via bug_arr[]= in a crafted bug_actiongroup_page.php URL. (The target Issues can have Private view status, or belong to a private Project.)
Attacker Value
Unknown

CVE-2020-29603

Disclosure Date: January 29, 2021 (last updated February 22, 2025)
In manage_proj_edit_page.php in MantisBT before 2.24.4, any unprivileged logged-in user can retrieve Private Projects' names via the manage_proj_edit_page.php project_id parameter, without having access to them.
Attacker Value
Unknown

CVE-2020-36192

Disclosure Date: January 18, 2021 (last updated November 28, 2024)
An issue was discovered in the Source Integration plugin before 2.4.1 for MantisBT. An attacker can gain access to the Summary field of private Issues (either marked as Private, or part of a private Project), if they are attached to an existing Changeset. The information is visible on the view.php page, as well as on the list.php page (a pop-up on the Affected Issues id hyperlink). Additionally, if the attacker has "Update threshold" in the plugin's configuration (set to the "updater" access level by default), then they can link any Issue to a Changeset by entering the Issue's Id, even if they do not have access to it.
Attacker Value
Unknown

CVE-2020-28413

Disclosure Date: December 30, 2020 (last updated February 22, 2025)
In MantisBT 2.24.3, SQL Injection can occur in the parameter "access" of the mc_project_get_users function through the API SOAP.
Attacker Value
Unknown

CVE-2020-35849

Disclosure Date: December 30, 2020 (last updated February 22, 2025)
An issue was discovered in MantisBT before 2.24.4. An incorrect access check in bug_revision_view_page.php allows an unprivileged attacker to view the Summary field of private issues, as well as bugnotes revisions, gaining access to potentially confidential information via the bugnote_id parameter.
Attacker Value
Unknown

CVE-2020-27197

Disclosure Date: October 17, 2020 (last updated February 22, 2025)
TAXII libtaxii through 1.1.117, as used in EclecticIQ OpenTAXII through 0.2.0 and other products, allows SSRF via an initial http:// substring to the parse method, even when the no_network setting is used for the XML parser. NOTE: the vendor points out that the parse method "wraps the lxml library" and that this may be an issue to "raise ... to the lxml group.
Attacker Value
Unknown

CVE-2020-25830

Disclosure Date: September 30, 2020 (last updated February 22, 2025)
An issue was discovered in MantisBT before 2.24.3. Improper escaping of a custom field's name allows an attacker to inject HTML and, if CSP settings permit, achieve execution of arbitrary JavaScript when attempting to update said custom field via bug_actiongroup_page.php.