Количество 4
Количество 4

CVE-2005-4521
CRLF injection vulnerability in Mantis 1.0.0rc3 and earlier allows remote attackers to modify HTTP headers and conduct HTTP response splitting attacks via (1) the return parameter in login_cookie_test.php and (2) ref parameter in login_select_proj_page.php.

CVE-2005-4521
CRLF injection vulnerability in Mantis 1.0.0rc3 and earlier allows remote attackers to modify HTTP headers and conduct HTTP response splitting attacks via (1) the return parameter in login_cookie_test.php and (2) ref parameter in login_select_proj_page.php.
CVE-2005-4521
CRLF injection vulnerability in Mantis 1.0.0rc3 and earlier allows rem ...
GHSA-r5mj-2hhf-f733
CRLF injection vulnerability in Mantis 1.0.0rc3 and earlier allows remote attackers to modify HTTP headers and conduct HTTP response splitting attacks via (1) the return parameter in login_cookie_test.php and (2) ref parameter in login_select_proj_page.php.
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
---|---|---|---|---|
![]() | CVE-2005-4521 CRLF injection vulnerability in Mantis 1.0.0rc3 and earlier allows remote attackers to modify HTTP headers and conduct HTTP response splitting attacks via (1) the return parameter in login_cookie_test.php and (2) ref parameter in login_select_proj_page.php. | CVSS2: 5 | 1% Низкий | больше 19 лет назад |
![]() | CVE-2005-4521 CRLF injection vulnerability in Mantis 1.0.0rc3 and earlier allows remote attackers to modify HTTP headers and conduct HTTP response splitting attacks via (1) the return parameter in login_cookie_test.php and (2) ref parameter in login_select_proj_page.php. | CVSS2: 5 | 1% Низкий | больше 19 лет назад |
CVE-2005-4521 CRLF injection vulnerability in Mantis 1.0.0rc3 and earlier allows rem ... | CVSS2: 5 | 1% Низкий | больше 19 лет назад | |
GHSA-r5mj-2hhf-f733 CRLF injection vulnerability in Mantis 1.0.0rc3 and earlier allows remote attackers to modify HTTP headers and conduct HTTP response splitting attacks via (1) the return parameter in login_cookie_test.php and (2) ref parameter in login_select_proj_page.php. | 1% Низкий | больше 3 лет назад |
Уязвимостей на страницу