4.3

CVE-2012-0465

Bugzilla 3.5.x and 3.6.x before 3.6.9, 3.7.x and 4.0.x before 4.0.6, and 4.1.x and 4.2.x before 4.2.1, when the inbound_proxies option is enabled, does not properly validate the X-Forwarded-For HTTP header, which allows remote attackers to bypass the lockout policy via a series of authentication requests with (1) different IP address strings in this header or (2) a long string in this header.

Data is provided by the National Vulnerability Database (NVD)
MozillaBugzilla Version3.5.1
MozillaBugzilla Version3.5.2
MozillaBugzilla Version3.5.3
MozillaBugzilla Version3.6.0
MozillaBugzilla Version3.6.1
MozillaBugzilla Version3.6.2
MozillaBugzilla Version3.6.3
MozillaBugzilla Version3.6.4
MozillaBugzilla Version3.6.5
MozillaBugzilla Version3.6.6
MozillaBugzilla Version3.6.7
MozillaBugzilla Version3.6.8
MozillaBugzilla Version3.7.1
MozillaBugzilla Version3.7.2
MozillaBugzilla Version3.7.3
MozillaBugzilla Version4.0.1
MozillaBugzilla Version4.0.2
MozillaBugzilla Version4.0.3
MozillaBugzilla Version4.0.4
MozillaBugzilla Version4.0.5
MozillaBugzilla Version4.1.1
MozillaBugzilla Version4.1.2
MozillaBugzilla Version4.1.3
MozillaBugzilla Version4.2
MozillaBugzilla Version4.2 Updaterc1
MozillaBugzilla Version4.2 Updaterc2
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Type Source Score Percentile
EPSS FIRST.org 0.24% 0.447
CVSS Metriken
Source Base Score Exploit Score Impact Score Vector string
nvd@nist.gov 4.3 8.6 2.9
AV:N/AC:M/Au:N/C:P/I:N/A:N