Note:
This project will be discontinued after December 13, 2021. [more]
Product:
Bugzilla
(Mozilla)Repositories |
Unknown: This might be proprietary software. |
#Vulnerabilities | 148 |
Date | Id | Summary | Products | Score | Patch | Annotated |
---|---|---|---|---|---|---|
2001-09-10 | CVE-2001-1405 | Bugzilla before 2.14 does not restrict access to sanitycheck.cgi, which allows local users to cause a denial of service (CPU consumption) via a flood of requests to sanitycheck.cgi. | Bugzilla | N/A | ||
2001-09-10 | CVE-2001-1404 | Bugzilla before 2.14 stores user passwords in plaintext and sends password requests in an email message, which could allow attackers to gain privileges. | Bugzilla | N/A | ||
2001-09-10 | CVE-2001-1403 | Bugzilla before 2.14 includes the username and password in URLs, which could allow attackers to gain privileges by reading the information from the web server logs, or by "shoulder-surfing" and observing the web browser's location bar. | Bugzilla | N/A | ||
2001-09-10 | CVE-2001-1402 | Bugzilla before 2.14 does not properly escape untrusted parameters, which could allow remote attackers to conduct unauthorized activities via cross-site scripting (CSS) and possibly SQL injection attacks on (1) the product or output form variables for reports.cgi, (2) the voteon, bug_id, and user variables for showvotes.cgi, (3) an invalid email address in createaccount.cgi, (4) an invalid ID in showdependencytree.cgi, (5) invalid usernames and other fields in process_bug.cgi, and (6) error... | Bugzilla | N/A | ||
2001-09-10 | CVE-2001-1401 | Bugzilla before 2.14 does not properly restrict access to confidential bugs, which could allow Bugzilla users to bypass viewing permissions via modified bug id parameters in (1) process_bug.cgi, (2) show_activity.cgi, (3) showvotes.cgi, (4) showdependencytree.cgi, (5) showdependencygraph.cgi, (6) showattachment.cgi, or (7) describecomponents.cgi. | Bugzilla | N/A | ||
2001-06-27 | CVE-2001-0330 | Bugzilla 2.10 allows remote attackers to access sensitive information, including the database username and password, via an HTTP request for the globals.pl file, which is normally returned by the web server without being executed. | Bugzilla | N/A | ||
2001-06-27 | CVE-2001-0329 | Bugzilla 2.10 allows remote attackers to execute arbitrary commands via shell metacharacters in a username that is then processed by (1) the Bugzilla_login cookie in post_bug.cgi, or (2) the who parameter in process_bug.cgi. | Bugzilla | N/A | ||
2000-05-11 | CVE-2000-0421 | The process_bug.cgi script in Bugzilla allows remote attackers to execute arbitrary commands via shell metacharacters. | Bugzilla | N/A |