Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-8mq2-g8h6-58cp

Опубликовано: 17 мая 2022
Источник: github
Github: Не прошло ревью

Описание

The mci_account_get_array_by_id function in api/soap/mc_account_api.php in MantisBT before 1.2.18 allows remote attackers to obtain sensitive information via a (1) mc_project_get_users, (2) mc_issue_get, (3) mc_filter_get_issues, or (4) mc_project_get_issues SOAP request.

The mci_account_get_array_by_id function in api/soap/mc_account_api.php in MantisBT before 1.2.18 allows remote attackers to obtain sensitive information via a (1) mc_project_get_users, (2) mc_issue_get, (3) mc_filter_get_issues, or (4) mc_project_get_issues SOAP request.

EPSS

Процентиль: 70%
0.00635
Низкий

Дефекты

CWE-200

Связанные уязвимости

ubuntu
около 11 лет назад

The mci_account_get_array_by_id function in api/soap/mc_account_api.php in MantisBT before 1.2.18 allows remote attackers to obtain sensitive information via a (1) mc_project_get_users, (2) mc_issue_get, (3) mc_filter_get_issues, or (4) mc_project_get_issues SOAP request.

nvd
около 11 лет назад

The mci_account_get_array_by_id function in api/soap/mc_account_api.php in MantisBT before 1.2.18 allows remote attackers to obtain sensitive information via a (1) mc_project_get_users, (2) mc_issue_get, (3) mc_filter_get_issues, or (4) mc_project_get_issues SOAP request.

debian
около 11 лет назад

The mci_account_get_array_by_id function in api/soap/mc_account_api.ph ...

EPSS

Процентиль: 70%
0.00635
Низкий

Дефекты

CWE-200