Show filters
115 Total Results
Displaying 81-90 of 115
Sort by:
Attacker Value
Unknown
CVE-2014-8598
Disclosure Date: November 18, 2014 (last updated October 05, 2023)
The XML Import/Export plugin in MantisBT 1.2.x does not restrict access, which allows remote attackers to (1) upload arbitrary XML files via the import page or (2) obtain sensitive information via the export page. NOTE: this issue can be combined with CVE-2014-7146 to execute arbitrary PHP code.
0
Attacker Value
Unknown
CVE-2014-7146
Disclosure Date: November 18, 2014 (last updated October 05, 2023)
The XmlImportExport plugin in MantisBT 1.2.17 and earlier allows remote attackers to execute arbitrary PHP code via a crafted (1) description field or (2) issuelink attribute in an XML file, which is not properly handled when executing the preg_replace function with the e modifier.
0
Attacker Value
Unknown
CVE-2014-8554
Disclosure Date: November 13, 2014 (last updated October 05, 2023)
SQL injection vulnerability in the mc_project_get_attachments function in api/soap/mc_project_api.php in MantisBT before 1.2.18 allows remote attackers to execute arbitrary SQL commands via the project_id parameter. NOTE: this vulnerability exists because of an incomplete fix for CVE-2014-1609.
0
Attacker Value
Unknown
CVE-2014-6387
Disclosure Date: October 22, 2014 (last updated October 05, 2023)
gpc_api.php in MantisBT 1.2.17 and earlier allows remote attackers to bypass authenticated via a password starting will a null byte, which triggers an unauthenticated bind.
0
Attacker Value
Unknown
CVE-2013-1883
Disclosure Date: May 27, 2014 (last updated October 05, 2023)
Mantis Bug Tracker (aka MantisBT) 1.2.12 before 1.2.15 allows remote attackers to cause a denial of service (resource consumption) via a filter using a criteria, text search, and the "any condition" match type.
0
Attacker Value
Unknown
CVE-2013-0197
Disclosure Date: May 15, 2014 (last updated October 05, 2023)
Cross-site scripting (XSS) vulnerability in the filter_draw_selection_area2 function in core/filter_api.php in MantisBT 1.2.12 before 1.2.13 allows remote attackers to inject arbitrary web script or HTML via the match_type parameter to bugs/search.php.
0
Attacker Value
Unknown
CVE-2013-1810
Disclosure Date: May 15, 2014 (last updated October 05, 2023)
Multiple cross-site scripting (XSS) vulnerabilities in core/summary_api.php in MantisBT 1.2.12 allow remote authenticated users with manager or administrator permissions to inject arbitrary web script or HTML via a (1) category name in the summary_print_by_category function or (2) project name in the summary_print_by_project function.
0
Attacker Value
Unknown
CVE-2014-1609
Disclosure Date: March 20, 2014 (last updated October 05, 2023)
Multiple SQL injection vulnerabilities in MantisBT before 1.2.16 allow remote attackers to execute arbitrary SQL commands via unspecified parameters to the (1) mc_project_get_attachments function in api/soap/mc_project_api.php; the (2) news_get_limited_rows function in core/news_api.php; the (3) summary_print_by_enum, (4) summary_print_by_age, (5) summary_print_by_developer, (6) summary_print_by_reporter, or (7) summary_print_by_category function in core/summary_api.php; the (8) create_bug_enum_summary or (9) enum_bug_group function in plugins/MantisGraph/core/graph_api.php; (10) bug_graph_bycategory.php or (11) bug_graph_bystatus.php in plugins/MantisGraph/pages/; or (12) proj_doc_page.php, related to use of the db_query function, a different vulnerability than CVE-2014-1608.
0
Attacker Value
Unknown
CVE-2014-1608
Disclosure Date: March 18, 2014 (last updated October 05, 2023)
SQL injection vulnerability in the mci_file_get function in api/soap/mc_file_api.php in MantisBT before 1.2.16 allows remote attackers to execute arbitrary SQL commands via a crafted envelope tag in a mc_issue_attachment_get SOAP request.
0
Attacker Value
Unknown
CVE-2014-2238
Disclosure Date: March 05, 2014 (last updated October 05, 2023)
SQL injection vulnerability in the manage configuration page (adm_config_report.php) in MantisBT 1.2.13 through 1.2.16 allows remote authenticated administrators to execute arbitrary SQL commands via the filter_config_id parameter.
0