|
Message-ID: <Pine.GSO.4.51.0807271822290.20336@faron.mitre.org> Date: Sun, 27 Jul 2008 18:22:38 -0400 (EDT) From: "Steven M. Christey" <coley@...us.mitre.org> To: oss-security@...ts.openwall.com cc: coley@...re.org Subject: Re: CVE request: mantis < 1.1.2 ====================================================== Name: CVE-2008-2276 Status: Candidate URL: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2276 Reference: BUGTRAQ:20080520 Mantis Bug Tracker 1.1.1 Multiple Vulnerabilities Reference: URL:http://marc.info/?l=bugtraq&m=121130774617956&w=4 Reference: CONFIRM:http://sourceforge.net/project/shownotes.php?group_id=14963&release_id=595025 Reference: FEDORA:FEDORA-2008-6647 Reference: URL:https://www.redhat.com/archives/fedora-package-announce/2008-July/msg00801.html Reference: FEDORA:FEDORA-2008-6657 Reference: URL:https://www.redhat.com/archives/fedora-package-announce/2008-July/msg00813.html Reference: SECUNIA:30270 Reference: URL:http://secunia.com/advisories/30270 Reference: SECUNIA:31171 Reference: URL:http://secunia.com/advisories/31171 Reference: XF:mantis-usercreate-csrf(42447) Reference: URL:http://xforce.iss.net/xforce/xfdb/42447 Cross-site request forgery (CSRF) vulnerability in manage_user_create.php in Mantis 1.1.1 allows remote attackers to create new administrative users via a crafted link. ====================================================== Name: CVE-2008-3331 Status: Candidate URL: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3331 Reference: BUGTRAQ:20080520 Mantis Bug Tracker 1.1.1 Multiple Vulnerabilities Reference: URL:http://marc.info/?l=bugtraq&m=121130774617956&w=4 Reference: CONFIRM:http://www.mantisbt.org/bugs/changelog_page.php Reference: SECUNIA:30270 Reference: URL:http://secunia.com/advisories/30270 Cross-site scripting (XSS) vulnerability in return_dynamic_filters.php in Mantis before 1.1.2 allows remote attackers to inject arbitrary web script or HTML via the filter_target parameter. ====================================================== Name: CVE-2008-3332 Status: Candidate URL: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3332 Reference: BUGTRAQ:20080520 Mantis Bug Tracker 1.1.1 Multiple Vulnerabilities Reference: URL:http://marc.info/?l=bugtraq&m=121130774617956&w=4 Reference: CONFIRM:http://www.mantisbt.org/bugs/changelog_page.php Reference: SECUNIA:30270 Reference: URL:http://secunia.com/advisories/30270 Eval injection vulnerability in adm_config_set.php in Mantis before 1.1.2 allows remote authenticated administrators to execute arbitrary code via the value parameter. ====================================================== Name: CVE-2008-3333 Status: Candidate URL: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3333 Reference: CONFIRM:http://www.mantisbt.org/bugs/changelog_page.php Reference: CONFIRM:http://www.mantisbt.org/bugs/view.php?id=9154 Reference: SECUNIA:30270 Reference: URL:http://secunia.com/advisories/30270 Directory traversal vulnerability in core/lang_api.php in Mantis before 1.1.2 allows remote attackers to read and include arbitrary files via the language parameter to the user preferences page (account_prefs_update.php).
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.