cpe:2.3:a:mozilla:bugzilla:2.16:*:*:*:*:*:*:*
Cross-site scripting (XSS) vulnerability in the quips feature in Mozilla Bugzilla 2.10 through 2.17 allows remote attackers to inject arbitrary web script or HTML via the "show all quips" page.
Max CVSS
4.3
EPSS Score
0.24%
Published
2002-12-31
Updated
2017-07-29
Bugzilla 2.16.x before 2.16.1 does not properly filter apostrophes from an email address during account creation, which allows remote attackers to execute arbitrary SQL via a SQL injection attack.
Max CVSS
7.5
EPSS Score
0.19%
Published
2002-10-28
Updated
2016-10-18
bugzilla_email_append.pl in Bugzilla 2.14.x before 2.14.4, and 2.16.x before 2.16.1, allows remote attackers to execute arbitrary code via shell metacharacters in a system call to processmail.
Max CVSS
7.5
EPSS Score
1.54%
Published
2002-10-28
Updated
2016-10-18
editproducts.cgi in Bugzilla 2.14.x before 2.14.4, and 2.16.x before 2.16.1, when the "usebuggroups" feature is enabled and more than 47 groups are specified, does not properly calculate bit values for large numbers, which grants extra permissions to users via known features of Perl math that set multiple bits.
Max CVSS
7.5
EPSS Score
0.54%
Published
2002-10-28
Updated
2016-10-18
Bugzilla 2.14 before 2.14.2, and 2.16 before 2.16rc2, may allow remote attackers to cause a denial of service or execute certain queries via a SQL injection attack on the sort order parameter to buglist.cgi.
Max CVSS
7.5
EPSS Score
0.22%
Published
2002-08-12
Updated
2008-09-10
Bugzilla 2.14 before 2.14.2, and 2.16 before 2.16rc2, directs error messages from the syncshadowdb command to the HTML output, which could leak sensitive information, including plaintext passwords, if syncshadowdb fails.
Max CVSS
5.0
EPSS Score
0.68%
Published
2002-08-12
Updated
2008-09-05
Bugzilla 2.14 before 2.14.2, and 2.16 before 2.16rc2, does not properly handle URL-encoded field names that are generated by some browsers, which could cause certain fields to appear to be unset, which has the effect of removing group permissions on bugs when buglist.cgi is provided with the encoded field names.
Max CVSS
7.5
EPSS Score
0.43%
Published
2002-08-12
Updated
2008-09-05
Bugzilla 2.14 before 2.14.2, and 2.16 before 2.16rc2, when performing a mass change, sets the groupset of all bugs to the groupset of the first bug, which could inadvertently cause insecure groupset permissions to be assigned to some bugs.
Max CVSS
7.5
EPSS Score
0.53%
Published
2002-08-12
Updated
2008-09-05
Cross-site scripting vulnerabilities in Bugzilla 2.14 before 2.14.2, and 2.16 before 2.16rc2, could allow remote attackers to execute script as other Bugzilla users via the full name (real name) field, which is not properly quoted by editusers.cgi.
Max CVSS
7.5
EPSS Score
0.55%
Published
2002-08-12
Updated
2008-09-10
Bugzilla 2.14 before 2.14.2, and 2.16 before 2.16rc2, allows authenticated users with editing privileges to delete other users by directly calling the editusers.cgi script with the "del" option.
Max CVSS
2.1
EPSS Score
0.05%
Published
2002-08-12
Updated
2008-09-05
Bugzilla 2.14 before 2.14.2, and 2.16 before 2.16rc2, (1) creates new directories with world-writable permissions, and (2) creates the params file with world-writable permissions, which allows local users to modify the files and execute code.
Max CVSS
4.6
EPSS Score
0.04%
Published
2002-08-12
Updated
2008-09-05
Bugzilla 2.14 before 2.14.2, and 2.16 before 2.16rc2, when configured to perform reverse DNS lookups, allows remote attackers to bypass IP restrictions by connecting from a system with a spoofed reverse DNS hostname.
Max CVSS
7.5
EPSS Score
0.64%
Published
2002-08-12
Updated
2008-09-05
Bugzilla 2.14 before 2.14.2, and 2.16 before 2.16rc2, allows remote attackers to display restricted products and components via a direct HTTP request to queryhelp.cgi.
Max CVSS
5.0
EPSS Score
7.59%
Published
2002-08-12
Updated
2008-09-10
13 vulnerabilities found
This web site uses cookies for managing your session, storing preferences, website analytics and additional purposes described in our privacy policy.
By using this web site you are agreeing to CVEdetails.com terms of use!