Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2008-3333

Опубликовано: 27 июл. 2008
Источник: debian
EPSS Низкий

Описание

Directory traversal vulnerability in core/lang_api.php in Mantis before 1.1.2 allows remote attackers to include and execute arbitrary files via the language parameter to the user preferences page (account_prefs_update.php).

Пакеты

ПакетСтатусВерсия исправленияРелизТип
mantisfixed1.1.2+dfsg-2package

Примечания

  • I've marked the above version as fixed, however I am not sure if it wasn't fixed

  • earlier. However, lenny is fixed and it is not in etch and sarge is not supported anymore.

EPSS

Процентиль: 60%
0.00401
Низкий

Связанные уязвимости

ubuntu
около 17 лет назад

Directory traversal vulnerability in core/lang_api.php in Mantis before 1.1.2 allows remote attackers to include and execute arbitrary files via the language parameter to the user preferences page (account_prefs_update.php).

redhat
около 17 лет назад

Directory traversal vulnerability in core/lang_api.php in Mantis before 1.1.2 allows remote attackers to include and execute arbitrary files via the language parameter to the user preferences page (account_prefs_update.php).

nvd
около 17 лет назад

Directory traversal vulnerability in core/lang_api.php in Mantis before 1.1.2 allows remote attackers to include and execute arbitrary files via the language parameter to the user preferences page (account_prefs_update.php).

github
больше 3 лет назад

Directory traversal vulnerability in core/lang_api.php in Mantis before 1.1.2 allows remote attackers to include and execute arbitrary files via the language parameter to the user preferences page (account_prefs_update.php).

EPSS

Процентиль: 60%
0.00401
Низкий