Page 14 of 71 results (0.006 seconds)

CVSS: 7.5EPSS: 0%CPEs: 6EXPL: 0

Bugzilla before 2.14 does not properly restrict access to confidential bugs, which could allow Bugzilla users to bypass viewing permissions via modified bug id parameters in (1) process_bug.cgi, (2) show_activity.cgi, (3) showvotes.cgi, (4) showdependencytree.cgi, (5) showdependencygraph.cgi, (6) showattachment.cgi, or (7) describecomponents.cgi. • http://bugzilla.mozilla.org/show_bug.cgi?id=39524 http://bugzilla.mozilla.org/show_bug.cgi?id=39526 http://bugzilla.mozilla.org/show_bug.cgi?id=39527 http://bugzilla.mozilla.org/show_bug.cgi?id=39531 http://bugzilla.mozilla.org/show_bug.cgi? •

CVSS: 7.5EPSS: 0%CPEs: 6EXPL: 0

Bugzilla before 2.14 allows Bugzilla users to bypass group security checks by marking a bug as the duplicate of a restricted bug, which adds the user to the CC list of the restricted bug and allows the user to view the bug. • http://bugzilla.mozilla.org/show_bug.cgi?id=96085 http://marc.info/?l=bugtraq&m=99912899900567 http://www.iss.net/security_center/static/10479.php http://www.redhat.com/support/errata/RHSA-2001-107.html •

CVSS: 7.5EPSS: 0%CPEs: 6EXPL: 0

Bugzilla before 2.14 stores user passwords in plaintext and sends password requests in an email message, which could allow attackers to gain privileges. • http://bugzilla.mozilla.org/show_bug.cgi?id=74032 http://marc.info/?l=bugtraq&m=99912899900567 http://www.redhat.com/support/errata/RHSA-2001-107.html •

CVSS: 2.1EPSS: 0%CPEs: 6EXPL: 0

Bugzilla before 2.14 does not restrict access to sanitycheck.cgi, which allows local users to cause a denial of service (CPU consumption) via a flood of requests to sanitycheck.cgi. • http://bugzilla.mozilla.org/show_bug.cgi?id=54556 http://marc.info/?l=bugtraq&m=99912899900567 http://www.redhat.com/support/errata/RHSA-2001-107.html •

CVSS: 7.5EPSS: 0%CPEs: 4EXPL: 0

Bugzilla 2.10 allows remote attackers to access sensitive information, including the database username and password, via an HTTP request for the globals.pl file, which is normally returned by the web server without being executed. • http://www.atstake.com/research/advisories/2001/a043001-1.txt http://www.securityfocus.com/bid/2671 https://exchange.xforce.ibmcloud.com/vulnerabilities/6489 •