Page 11 of 95 results (0.011 seconds)

CVSS: 5.0EPSS: 0%CPEs: 26EXPL: 0

show_bug.cgi in Bugzilla 2.17.1 through 2.18rc2 and 2.19 from CVS, when using the insidergroup feature and exporting a bug to XML, shows comments and attachment summaries which are marked as private, which allows remote attackers to gain sensitive information. • http://marc.info/?l=bugtraq&m=109872095201238&w=2 http://www.securityfocus.com/bid/11511 https://bugzilla.mozilla.org/show_bug.cgi?id=263780 https://exchange.xforce.ibmcloud.com/vulnerabilities/17841 •

CVSS: 5.0EPSS: 0%CPEs: 25EXPL: 0

process_bug.cgi in Bugzilla 2.9 through 2.18rc2 and 2.19 from CVS does not check edit permissions on the keywords field, which allows remote authenticated users to modify the keywords in a bug via the keywordaction parameter. • http://marc.info/?l=bugtraq&m=109872095201238&w=2 https://bugzilla.mozilla.org/show_bug.cgi?id=252638 https://exchange.xforce.ibmcloud.com/vulnerabilities/17840 •

CVSS: 5.0EPSS: 0%CPEs: 26EXPL: 0

Bugzilla 2.17.1 through 2.18rc2 and 2.19 from cvs, when using the insidergroup feature, does not sufficiently protect private attachments when there are changes to the metadata, such as filename, description, MIME type, or review flags, which allows remote authenticated users to obtain sensitive information when (1) viewing the bug activity log or (2) receiving bug change notification mails. • http://marc.info/?l=bugtraq&m=109872095201238&w=2 http://www.securityfocus.com/bid/11511 https://bugzilla.mozilla.org/show_bug.cgi?id=250605 https://bugzilla.mozilla.org/show_bug.cgi?id=253544 https://exchange.xforce.ibmcloud.com/vulnerabilities/17842 •

CVSS: 6.8EPSS: 0%CPEs: 24EXPL: 0

Multiple cross-site scripting (XSS) vulnerabilities in (1) editcomponents.cgi, (2) editgroups.cgi, (3) editmilestones.cgi, (4) editproducts.cgi, (5) editusers.cgi, and (6) editversions.cgi in Bugzilla 2.16.x before 2.16.6, and 2.18 before 2.18rc1, allow remote attackers to execute arbitrary JavaScript as other users via a URL parameter. Múltiples vulnerabilidades de secuencias de órdenes en sitios cruzados (XSS) en (1) editcomponents.cgi, (2) editgroups.cgi, (3) editmilestones.cgi, (4) editproducts.cgi, (5) editusers.cgi, y (6) editversions.cgi de Bugzilla 2.16.x anteriores a 2.16.6 y 2.18 anteriores a 2.18rc1, permite a atacantes remotos ejecutar código JavaScritp de su elección como otros usuarios mediante una parámetro en la URL. • http://bugzilla.mozilla.org/show_bug.cgi?id=235265 http://marc.info/?l=bugtraq&m=108965446813639&w=2 http://www.securityfocus.com/bid/10698 https://exchange.xforce.ibmcloud.com/vulnerabilities/16670 •

CVSS: 2.1EPSS: 0%CPEs: 24EXPL: 0

Bugzilla 2.17.5 through 2.17.7 embeds the password in an image URL, which could allow local users to view the password in the web server log files. Bugzilla 2.17.5 a 2.17.7 incluye la contaseña en una URL de una imagen, lo que podría permitir a usuarios locales ver la contraseña en los ficheros de registro del servidor web. • http://bugzilla.mozilla.org/show_bug.cgi?id=235510 http://marc.info/?l=bugtraq&m=108965446813639&w=2 http://www.securityfocus.com/bid/10698 https://exchange.xforce.ibmcloud.com/vulnerabilities/16669 •