Vulnerability Details : CVE-2004-1730
Cross-site scripting (XSS) vulnerability in Mantis bugtracker allows remote attackers to inject arbitrary web script or HTML via (1) the return parameter to login_page.php, (2) e-mail field in signup.php, (3) action parameter to login_select_proj_page.php, or (4) hide_status parameter to view_all_set.php.
Vulnerability category: Cross site scripting (XSS)
Exploit prediction scoring system (EPSS) score for CVE-2004-1730
Probability of exploitation activity in the next 30 days: 0.84%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 80 % EPSS Score History EPSS FAQ
CVSS scores for CVE-2004-1730
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source |
---|---|---|---|---|---|
4.3
|
MEDIUM | AV:N/AC:M/Au:N/C:N/I:P/A:N |
8.6
|
2.9
|
NIST |
References for CVE-2004-1730
-
https://exchange.xforce.ibmcloud.com/vulnerabilities/17072
-
https://exchange.xforce.ibmcloud.com/vulnerabilities/17066
-
http://www.securityfocus.com/bid/10994
Exploit
-
https://exchange.xforce.ibmcloud.com/vulnerabilities/17069
- http://marc.info/?l=bugtraq&m=109312225727345&w=2
-
https://exchange.xforce.ibmcloud.com/vulnerabilities/17070
Products affected by CVE-2004-1730
- cpe:2.3:a:mantis:mantis:0.15.10:*:*:*:*:*:*:*
- cpe:2.3:a:mantis:mantis:0.15.7:*:*:*:*:*:*:*
- cpe:2.3:a:mantis:mantis:0.15.8:*:*:*:*:*:*:*
- cpe:2.3:a:mantis:mantis:0.15.5:*:*:*:*:*:*:*
- cpe:2.3:a:mantis:mantis:0.15.6:*:*:*:*:*:*:*
- cpe:2.3:a:mantis:mantis:0.17.1:*:*:*:*:*:*:*
- cpe:2.3:a:mantis:mantis:0.17.2:*:*:*:*:*:*:*
- cpe:2.3:a:mantis:mantis:0.15.3:*:*:*:*:*:*:*
- cpe:2.3:a:mantis:mantis:0.15.4:*:*:*:*:*:*:*
- cpe:2.3:a:mantis:mantis:0.16.1:*:*:*:*:*:*:*
- cpe:2.3:a:mantis:mantis:0.17.0:*:*:*:*:*:*:*
- cpe:2.3:a:mantis:mantis:0.15.11:*:*:*:*:*:*:*
- cpe:2.3:a:mantis:mantis:0.15.12:*:*:*:*:*:*:*
- cpe:2.3:a:mantis:mantis:0.15.9:*:*:*:*:*:*:*
- cpe:2.3:a:mantis:mantis:0.16.0:*:*:*:*:*:*:*
- cpe:2.3:a:mantis:mantis:0.17.3:*:*:*:*:*:*:*
- cpe:2.3:a:mantis:mantis:0.17.4:*:*:*:*:*:*:*
- cpe:2.3:a:mantis:mantis:0.17.4a:*:*:*:*:*:*:*
- cpe:2.3:a:mantis:mantis:0.17.5:*:*:*:*:*:*:*
- cpe:2.3:a:mantis:mantis:0.13:*:*:*:*:*:*:*
- cpe:2.3:a:mantis:mantis:0.13.1:*:*:*:*:*:*:*
- cpe:2.3:a:mantis:mantis:0.14.6:*:*:*:*:*:*:*
- cpe:2.3:a:mantis:mantis:0.14.7:*:*:*:*:*:*:*
- cpe:2.3:a:mantis:mantis:0.9:*:*:*:*:*:*:*
- cpe:2.3:a:mantis:mantis:0.9.1:*:*:*:*:*:*:*
- cpe:2.3:a:mantis:mantis:0.11.1:*:*:*:*:*:*:*
- cpe:2.3:a:mantis:mantis:0.12:*:*:*:*:*:*:*
- cpe:2.3:a:mantis:mantis:0.14.4:*:*:*:*:*:*:*
- cpe:2.3:a:mantis:mantis:0.14.5:*:*:*:*:*:*:*
- cpe:2.3:a:mantis:mantis:0.15.2:*:*:*:*:*:*:*
- cpe:2.3:a:mantis:mantis:0.16:*:*:*:*:*:*:*
- cpe:2.3:a:mantis:mantis:0.18a1:*:*:*:*:*:*:*
- cpe:2.3:a:mantis:mantis:0.19.0a:*:*:*:*:*:*:*
- cpe:2.3:a:mantis:mantis:0.10.2:*:*:*:*:*:*:*
- cpe:2.3:a:mantis:mantis:0.11:*:*:*:*:*:*:*
- cpe:2.3:a:mantis:mantis:0.14.2:*:*:*:*:*:*:*
- cpe:2.3:a:mantis:mantis:0.14.3:*:*:*:*:*:*:*
- cpe:2.3:a:mantis:mantis:0.15.1:*:*:*:*:*:*:*
- cpe:2.3:a:mantis:mantis:0.18.0a2:*:*:*:*:*:*:*
- cpe:2.3:a:mantis:mantis:0.18.0a3:*:*:*:*:*:*:*
- cpe:2.3:a:mantis:mantis:0.18.0a4:*:*:*:*:*:*:*
- cpe:2.3:a:mantis:mantis:0.10:*:*:*:*:*:*:*
- cpe:2.3:a:mantis:mantis:0.10.1:*:*:*:*:*:*:*
- cpe:2.3:a:mantis:mantis:0.14:*:*:*:*:*:*:*
- cpe:2.3:a:mantis:mantis:0.14.1:*:*:*:*:*:*:*
- cpe:2.3:a:mantis:mantis:0.14.8:*:*:*:*:*:*:*
- cpe:2.3:a:mantis:mantis:0.15:*:*:*:*:*:*:*
- cpe:2.3:a:mantis:mantis:0.17:*:*:*:*:*:*:*
- cpe:2.3:a:mantis:mantis:0.18:*:*:*:*:*:*:*
- cpe:2.3:a:mantis:mantis:0.18.0_rc1:*:*:*:*:*:*:*