Логотип exploitDog
bind:CVE-2015-1042
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2015-1042

Количество 4

Количество 4

ubuntu логотип

CVE-2015-1042

почти 11 лет назад

The string_sanitize_url function in core/string_api.php in MantisBT 1.2.0a3 through 1.2.18 uses an incorrect regular expression, which allows remote attackers to conduct open redirect and phishing attacks via a URL with a ":/" (colon slash) separator in the return parameter to login_page.php, a different vulnerability than CVE-2014-6316.

CVSS2: 5.8
EPSS: Низкий
nvd логотип

CVE-2015-1042

почти 11 лет назад

The string_sanitize_url function in core/string_api.php in MantisBT 1.2.0a3 through 1.2.18 uses an incorrect regular expression, which allows remote attackers to conduct open redirect and phishing attacks via a URL with a ":/" (colon slash) separator in the return parameter to login_page.php, a different vulnerability than CVE-2014-6316.

CVSS2: 5.8
EPSS: Низкий
debian логотип

CVE-2015-1042

почти 11 лет назад

The string_sanitize_url function in core/string_api.php in MantisBT 1. ...

CVSS2: 5.8
EPSS: Низкий
github логотип

GHSA-63qw-955w-2x9f

больше 3 лет назад

The string_sanitize_url function in core/string_api.php in MantisBT 1.2.0a3 through 1.2.18 uses an incorrect regular expression, which allows remote attackers to conduct open redirect and phishing attacks via a URL with a ":/" (colon slash) separator in the return parameter to login_page.php, a different vulnerability than CVE-2014-6316.

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2015-1042

The string_sanitize_url function in core/string_api.php in MantisBT 1.2.0a3 through 1.2.18 uses an incorrect regular expression, which allows remote attackers to conduct open redirect and phishing attacks via a URL with a ":/" (colon slash) separator in the return parameter to login_page.php, a different vulnerability than CVE-2014-6316.

CVSS2: 5.8
1%
Низкий
почти 11 лет назад
nvd логотип
CVE-2015-1042

The string_sanitize_url function in core/string_api.php in MantisBT 1.2.0a3 through 1.2.18 uses an incorrect regular expression, which allows remote attackers to conduct open redirect and phishing attacks via a URL with a ":/" (colon slash) separator in the return parameter to login_page.php, a different vulnerability than CVE-2014-6316.

CVSS2: 5.8
1%
Низкий
почти 11 лет назад
debian логотип
CVE-2015-1042

The string_sanitize_url function in core/string_api.php in MantisBT 1. ...

CVSS2: 5.8
1%
Низкий
почти 11 лет назад
github логотип
GHSA-63qw-955w-2x9f

The string_sanitize_url function in core/string_api.php in MantisBT 1.2.0a3 through 1.2.18 uses an incorrect regular expression, which allows remote attackers to conduct open redirect and phishing attacks via a URL with a ":/" (colon slash) separator in the return parameter to login_page.php, a different vulnerability than CVE-2014-6316.

1%
Низкий
больше 3 лет назад

Уязвимостей на страницу