Page 14 of 151 results (0.009 seconds)

CVSS: 7.5EPSS: 0%CPEs: 4EXPL: 0

12 Aug 2002 — Bugzilla 2.14 before 2.14.2, and 2.16 before 2.16rc2, does not properly handle URL-encoded field names that are generated by some browsers, which could cause certain fields to appear to be unset, which has the effect of removing group permissions on bugs when buglist.cgi is provided with the encoded field names. • http://archives.neohapsis.com/archives/bugtraq/2002-06/0054.html •

CVSS: 7.5EPSS: 0%CPEs: 4EXPL: 0

12 Aug 2002 — Bugzilla 2.14 before 2.14.2, and 2.16 before 2.16rc2, when configured to perform reverse DNS lookups, allows remote attackers to bypass IP restrictions by connecting from a system with a spoofed reverse DNS hostname. • http://archives.neohapsis.com/archives/bugtraq/2002-06/0054.html •

CVSS: 9.1EPSS: 0%CPEs: 4EXPL: 0

12 Aug 2002 — Bugzilla 2.14 before 2.14.2, and 2.16 before 2.16rc2, when performing a mass change, sets the groupset of all bugs to the groupset of the first bug, which could inadvertently cause insecure groupset permissions to be assigned to some bugs. • http://archives.neohapsis.com/archives/bugtraq/2002-06/0054.html •

CVSS: 7.5EPSS: 0%CPEs: 4EXPL: 0

31 Jul 2002 — Cross-site scripting vulnerabilities in Bugzilla 2.14 before 2.14.2, and 2.16 before 2.16rc2, could allow remote attackers to execute script as other Bugzilla users via the full name (real name) field, which is not properly quoted by editusers.cgi. • http://archives.neohapsis.com/archives/bugtraq/2002-06/0054.html •

CVSS: 9.1EPSS: 11%CPEs: 4EXPL: 0

31 Jul 2002 — Bugzilla 2.14 before 2.14.2, and 2.16 before 2.16rc2, allows remote attackers to display restricted products and components via a direct HTTP request to queryhelp.cgi. • ftp://ftp.freebsd.org/pub/FreeBSD/CERT/advisories/FreeBSD-SN-02%3A05.asc •

CVSS: 9.8EPSS: 0%CPEs: 4EXPL: 0

31 Jul 2002 — Bugzilla 2.14 before 2.14.2, and 2.16 before 2.16rc2, may allow remote attackers to cause a denial of service or execute certain queries via a SQL injection attack on the sort order parameter to buglist.cgi. • http://archives.neohapsis.com/archives/bugtraq/2002-06/0054.html •

CVSS: 9.8EPSS: 0%CPEs: 1EXPL: 0

31 Jan 2002 — show_bug.cgi in Bugzilla before 2.14.1 allows a user with "Bugs Access" privileges to see other products that are not accessible to the user, by submitting a bug and reading the resulting Product pulldown menu. show_bug.cgi en Bugzilla anterior a la 2.14.1 permite que un usuario con privilegios de "Bugs Access" vea otros productos que no son accesibles al usuario, enviando un bug y leyendo el menú "Producto" resultante. • http://archives.neohapsis.com/archives/bugtraq/2002-01/0034.html •

CVSS: 10.0EPSS: 0%CPEs: 1EXPL: 0

31 Jan 2002 — CGI.pl in Bugzilla before 2.14.1, when using LDAP, allows remote attackers to obtain an anonymous bind to the LDAP server via a request that does not include a password, which causes a null password to be sent to the LDAP server. CGl.pl en Bugzilla anterior a la 2.14.1, cuando se usa LDAP, permite que atacantes remotos obtengan una conexión anónima con el servidor LDAP por medio de una petición que no incluye una clave, lo que provoca que se envíe una clave nula al servidor LDAP. • http://archives.neohapsis.com/archives/bugtraq/2002-01/0034.html •

CVSS: 7.5EPSS: 0%CPEs: 1EXPL: 0

31 Jan 2002 — Information leak in doeditvotes.cgi in Bugzilla before 2.14.1 may allow remote attackers to more easily conduct attacks on the login. Pérdida de información en doeditvotes.cgi en Bugzilla anterior a la 2.14.1 permite que los atacantes lleven a cabo más fácilmente sus ataques de login. • http://archives.neohapsis.com/archives/bugtraq/2002-01/0034.html •

CVSS: 7.5EPSS: 0%CPEs: 1EXPL: 0

10 Jan 2002 — Bugzilla before 2.14.1 allows remote attackers to (1) spoof a user comment via an HTTP request to process_bug.cgi using the "who" parameter, instead of the Bugzilla_login cookie, or (2) post a bug as another user by modifying the reporter parameter to enter_bug.cgi, which is passed to post_bug.cgi. Versiones anteriores a la 2.14.1 de Bugzilla permiten que un atacante remoto (1) falsee el comentario de un usuario por medio de una petición HTTP usando process_bug.cgi y el parámetro "who" en vez de una cokie d... • http://archives.neohapsis.com/archives/bugtraq/2002-01/0034.html •