Логотип exploitDog
bind:CVE-2018-6382
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2018-6382

Количество 3

Количество 3

nvd логотип

CVE-2018-6382

около 8 лет назад

MantisBT 2.10.0 allows local users to conduct SQL Injection attacks via the vendor/adodb/adodb-php/server.php sql parameter in a request to the 127.0.0.1 IP address. NOTE: the vendor disputes the significance of this report because server.php is intended to execute arbitrary SQL statements on behalf of authenticated users from 127.0.0.1, and the issue does not have an authentication bypass

CVSS3: 3.3
EPSS: Низкий
debian логотип

CVE-2018-6382

около 8 лет назад

MantisBT 2.10.0 allows local users to conduct SQL Injection attacks vi ...

CVSS3: 3.3
EPSS: Низкий
github логотип

GHSA-mqw5-jgj7-2qpp

больше 3 лет назад

** DISPUTED ** MantisBT 2.10.0 allows local users to conduct SQL Injection attacks via the vendor/adodb/adodb-php/server.php sql parameter in a request to the 127.0.0.1 IP address. NOTE: the vendor disputes the significance of this report because server.php is intended to execute arbitrary SQL statements on behalf of authenticated users from 127.0.0.1, and the issue does not have an authentication bypass.

CVSS3: 3.3
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2018-6382

MantisBT 2.10.0 allows local users to conduct SQL Injection attacks via the vendor/adodb/adodb-php/server.php sql parameter in a request to the 127.0.0.1 IP address. NOTE: the vendor disputes the significance of this report because server.php is intended to execute arbitrary SQL statements on behalf of authenticated users from 127.0.0.1, and the issue does not have an authentication bypass

CVSS3: 3.3
0%
Низкий
около 8 лет назад
debian логотип
CVE-2018-6382

MantisBT 2.10.0 allows local users to conduct SQL Injection attacks vi ...

CVSS3: 3.3
0%
Низкий
около 8 лет назад
github логотип
GHSA-mqw5-jgj7-2qpp

** DISPUTED ** MantisBT 2.10.0 allows local users to conduct SQL Injection attacks via the vendor/adodb/adodb-php/server.php sql parameter in a request to the 127.0.0.1 IP address. NOTE: the vendor disputes the significance of this report because server.php is intended to execute arbitrary SQL statements on behalf of authenticated users from 127.0.0.1, and the issue does not have an authentication bypass.

CVSS3: 3.3
0%
Низкий
больше 3 лет назад

Уязвимостей на страницу