Show filters
117 Total Results
Displaying 41-50 of 117
Sort by:
Attacker Value
Unknown
CVE-2018-6526
Disclosure Date: February 02, 2018 (last updated November 26, 2024)
view_all_bug_page.php in MantisBT 2.10.0-development before 2018-02-02 allows remote attackers to discover the full path via an invalid filter parameter, related to a filter_ensure_valid_filter call in current_user_api.php.
0
Attacker Value
Unknown
CVE-2018-6382
Disclosure Date: January 30, 2018 (last updated November 08, 2023)
MantisBT 2.10.0 allows local users to conduct SQL Injection attacks via the vendor/adodb/adodb-php/server.php sql parameter in a request to the 127.0.0.1 IP address. NOTE: the vendor disputes the significance of this report because server.php is intended to execute arbitrary SQL statements on behalf of authenticated users from 127.0.0.1, and the issue does not have an authentication bypass
0
Attacker Value
Unknown
CVE-2014-9624
Disclosure Date: September 12, 2017 (last updated November 26, 2024)
CAPTCHA bypass vulnerability in MantisBT before 1.2.19.
0
Attacker Value
Unknown
CVE-2015-2046
Disclosure Date: August 28, 2017 (last updated November 26, 2024)
Cross-site scripting (XSS) vulnerability in MantisBT 1.2.13 and later before 1.2.20.
0
Attacker Value
Unknown
CVE-2014-9701
Disclosure Date: August 09, 2017 (last updated November 26, 2024)
Cross-site scripting (XSS) vulnerability in MantisBT before 1.2.19 and 1.3.x before 1.3.0-beta.2 allows remote attackers to inject arbitrary web script or HTML via the url parameter to permalink_page.php.
0
Attacker Value
Unknown
CVE-2017-12419
Disclosure Date: August 05, 2017 (last updated November 26, 2024)
If, after successful installation of MantisBT through 2.5.2 on MySQL/MariaDB, the administrator does not remove the 'admin' directory (as recommended in the "Post-installation and upgrade tasks" section of the MantisBT Admin Guide), and the MySQL client has a local_infile setting enabled (in php.ini mysqli.allow_local_infile, or the MySQL client config file, depending on the PHP setup), an attacker may take advantage of MySQL's "connect file read" feature to remotely access files on the MantisBT server.
0
Attacker Value
Unknown
CVE-2017-12061
Disclosure Date: August 01, 2017 (last updated November 26, 2024)
An XSS issue was discovered in admin/install.php in MantisBT before 1.3.12 and 2.x before 2.5.2. Some variables under user control in the MantisBT installation script are not properly sanitized before being output, allowing remote attackers to inject arbitrary JavaScript code, as demonstrated by the $f_database, $f_db_username, and $f_admin_username variables. This is mitigated by the fact that the admin/ folder should be deleted after installation, and also prevented by CSP.
0
Attacker Value
Unknown
CVE-2017-12062
Disclosure Date: August 01, 2017 (last updated November 26, 2024)
An XSS issue was discovered in manage_user_page.php in MantisBT 2.x before 2.5.2. The 'filter' field is not sanitized before being rendered in the Manage User page, allowing remote attackers to execute arbitrary JavaScript code if CSP is disabled.
0
Attacker Value
Unknown
CVE-2015-5059
Disclosure Date: August 01, 2017 (last updated November 26, 2024)
The "Project Documentation" feature in MantisBT 1.2.19 and earlier, when the threshold to access files ($g_view_proj_doc_threshold) is set to ANYBODY, allows remote authenticated users to download attachments linked to arbitrary private projects via a file id number in the file_id parameter to file_download.php.
0
Attacker Value
Unknown
CVE-2017-7620
Disclosure Date: May 21, 2017 (last updated November 26, 2024)
MantisBT before 1.3.11, 2.x before 2.3.3, and 2.4.x before 2.4.1 omits a backslash check in string_api.php and consequently has conflicting interpretations of an initial \/ substring as introducing either a local pathname or a remote hostname, which leads to (1) arbitrary Permalink Injection via CSRF attacks on a permalink_page.php?url= URI and (2) an open redirect via a login_page.php?return= URI.
0