Executive Summary



This Alert is flagged as TOP 25 Common Weakness Enumeration from CWE/SANS. For more information, you can read this.
Informations
Name CVE-2010-2574 First vendor Publication 2010-08-10
Vendor Cve Last vendor Modification 2024-11-21

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
 
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:H/Au:S/C:N/I:P/A:N)
Cvss Base Score 2.1 Attack Range Network
Cvss Impact Score 2.9 Attack Complexity High
Cvss Expoit Score 3.9 Authentication Requires single instance
Calculate full CVSS 2.0 Vectors scores

Detail

Cross-site scripting (XSS) vulnerability in manage_proj_cat_add.php in MantisBT 1.2.2 allows remote authenticated administrators to inject arbitrary web script or HTML via the name parameter in an Add Category action.

Original Source

Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2574

CWE : Common Weakness Enumeration

% Id Name
100 % CWE-79 Failure to Preserve Web Page Structure ('Cross-site Scripting') (CWE/SANS Top 25)

CPE : Common Platform Enumeration

TypeDescriptionCount
Application 1

OpenVAS Exploits

Date Description
2011-01-04 Name : Fedora Update for mantis FEDORA-2010-19070
File : nvt/gb_fedora_2010_19070_mantis_fc13.nasl
2010-12-02 Name : Fedora Update for mantis FEDORA-2010-15061
File : nvt/gb_fedora_2010_15061_mantis_fc14.nasl
2010-10-01 Name : Fedora Update for mantis FEDORA-2010-15080
File : nvt/gb_fedora_2010_15080_mantis_fc12.nasl
2010-10-01 Name : Fedora Update for mantis FEDORA-2010-15082
File : nvt/gb_fedora_2010_15082_mantis_fc13.nasl
2010-08-06 Name : Mantis 'manage_proj_cat_add.php' HTML Injection Vulnerability
File : nvt/gb_mantis_42233.nasl

Open Source Vulnerability Database (OSVDB)

Id Description
66919 MantisBT manage_proj_cat_add.php name Parameter XSS

MantisBT contains a flaw that allows a remote cross site scripting (XSS) attack. This flaw exists because the application does not validate the 'name' parameter upon submission to the 'manage_proj_cat_add.php' script. This may allow a user to create a specially crafted URL that would execute arbitrary script code in a user's browser within the trust relationship between their browser and the server.

Nessus® Vulnerability Scanner

Date Description
2010-10-06 Name : The remote Fedora host is missing a security update.
File : fedora_2010-15061.nasl - Type : ACT_GATHER_INFO
2010-10-06 Name : The remote Fedora host is missing a security update.
File : fedora_2010-15080.nasl - Type : ACT_GATHER_INFO
2010-10-06 Name : The remote Fedora host is missing a security update.
File : fedora_2010-15082.nasl - Type : ACT_GATHER_INFO

Sources (Detail)

http://lists.fedoraproject.org/pipermail/package-announce/2010-September/0485...
http://lists.fedoraproject.org/pipermail/package-announce/2010-September/0486...
http://lists.fedoraproject.org/pipermail/package-announce/2010-September/0486...
http://secunia.com/advisories/40832
http://secunia.com/advisories/41653
http://secunia.com/secunia_research/2010-103/
http://www.mantisbt.org/bugs/changelog_page.php?version_id=111
http://www.mantisbt.org/bugs/view.php?id=12230
http://www.openwall.com/lists/oss-security/2010/09/14/12
http://www.openwall.com/lists/oss-security/2010/09/14/13
http://www.securityfocus.com/archive/1/512886/100/0/threaded
http://www.vupen.com/english/advisories/2010/2535
Source Url

Alert History

If you want to see full details history, please login or register.
0
1
2
3
4
5
6
7
8
Date Informations
2024-11-28 23:07:52
  • Multiple Updates
2024-11-28 12:22:20
  • Multiple Updates
2021-05-04 12:11:46
  • Multiple Updates
2021-04-22 01:12:22
  • Multiple Updates
2020-05-23 00:26:04
  • Multiple Updates
2018-10-11 00:19:53
  • Multiple Updates
2016-04-26 19:56:24
  • Multiple Updates
2014-02-17 10:56:18
  • Multiple Updates
2013-05-10 23:28:33
  • Multiple Updates