Mozilla

Bugzilla

145 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.41%
  • Veröffentlicht 09.02.2009 17:30:00
  • Zuletzt bearbeitet 09.04.2025 00:30:58

Cross-site request forgery (CSRF) vulnerability in Bugzilla 2.22 before 2.22.7, 3.0 before 3.0.7, 3.2 before 3.2.1, and 3.3 before 3.3.2 allows remote attackers to delete keywords and user preferences via a link or IMG tag to (1) editkeywords.cgi or ...

  • EPSS 0.41%
  • Veröffentlicht 09.02.2009 17:30:00
  • Zuletzt bearbeitet 09.04.2025 00:30:58

Cross-site request forgery (CSRF) vulnerability in Bugzilla 3.0 before 3.0.7, 3.2 before 3.2.1, and 3.3 before 3.3.2 allows remote attackers to delete shared or saved searches via a link or IMG tag to buglist.cgi.

  • EPSS 0.41%
  • Veröffentlicht 09.02.2009 17:30:00
  • Zuletzt bearbeitet 09.04.2025 00:30:58

Cross-site request forgery (CSRF) vulnerability in Bugzilla 2.17 to 2.22.7, 3.0 before 3.0.7, 3.2 before 3.2.1, and 3.3 before 3.3.2 allows remote attackers to delete unused flag types via a link or IMG tag to editflagtypes.cgi.

  • EPSS 0.14%
  • Veröffentlicht 09.02.2009 17:30:00
  • Zuletzt bearbeitet 09.04.2025 00:30:58

Bugzilla 3.2.1, 3.0.7, and 3.3.2, when running under mod_perl, calls the srand function at startup time, which causes Apache children to have the same seed and produce insufficiently random numbers for random tokens, which allows remote attackers to ...

Exploit
  • EPSS 9.89%
  • Veröffentlicht 03.10.2008 22:22:45
  • Zuletzt bearbeitet 09.04.2025 00:30:58

Directory traversal vulnerability in importxml.pl in Bugzilla before 2.22.5, and 3.x before 3.0.5, when --attach_path is enabled, allows remote attackers to read arbitrary files via an XML file with a .. (dot dot) in the data element.

Exploit
  • EPSS 0.62%
  • Veröffentlicht 07.05.2008 20:20:00
  • Zuletzt bearbeitet 09.04.2025 00:30:58

Cross-site scripting (XSS) vulnerability in Bugzilla 2.17.2 and later allows remote attackers to inject arbitrary web script or HTML via the id parameter to the "Format for Printing" view or "Long Format" bug list.

  • EPSS 0.29%
  • Veröffentlicht 07.05.2008 20:20:00
  • Zuletzt bearbeitet 09.04.2025 00:30:58

The WebService in Bugzilla 3.1.3 allows remote authenticated users without canconfirm privileges to create NEW or ASSIGNED bug entries via a request to the XML-RPC interface, which bypasses the canconfirm check.

  • EPSS 0.5%
  • Veröffentlicht 07.05.2008 20:20:00
  • Zuletzt bearbeitet 09.04.2025 00:30:58

email_in.pl in Bugzilla 2.23.4, 3.0.x before 3.0.4, and 3.1.x before 3.1.4 allows remote authenticated users to more easily spoof the changer of a bug via a @reporter command in the body of an e-mail message, which overrides the e-mail address as nor...

Exploit
  • EPSS 0.82%
  • Veröffentlicht 24.09.2007 00:17:00
  • Zuletzt bearbeitet 09.04.2025 00:30:58

The offer_account_by_email function in User.pm in the WebService for Bugzilla before 3.0.2, and 3.1.x before 3.1.2, does not check the value of the createemailregexp parameter, which allows remote attackers to bypass intended restrictions on account ...

Exploit
  • EPSS 0.78%
  • Veröffentlicht 27.08.2007 21:17:00
  • Zuletzt bearbeitet 09.04.2025 00:30:58

email_in.pl in Bugzilla 2.23.4 through 3.0.0 allows remote attackers to execute arbitrary commands via the -f (From address) option to the Email::Send::Sendmail function, probably involving shell metacharacters.