Page 24 of 118 results (0.004 seconds)

CVSS: 7.5EPSS: 0%CPEs: 4EXPL: 0

Bugzilla 2.10 allows remote attackers to access sensitive information, including the database username and password, via an HTTP request for the globals.pl file, which is normally returned by the web server without being executed. • http://www.atstake.com/research/advisories/2001/a043001-1.txt http://www.securityfocus.com/bid/2671 https://exchange.xforce.ibmcloud.com/vulnerabilities/6489 •

CVSS: 7.5EPSS: 3%CPEs: 4EXPL: 1

Bugzilla 2.10 allows remote attackers to execute arbitrary commands via shell metacharacters in a username that is then processed by (1) the Bugzilla_login cookie in post_bug.cgi, or (2) the who parameter in process_bug.cgi. • https://www.exploit-db.com/exploits/19909 http://www.atstake.com/research/advisories/2001/a043001-1.txt http://www.mozilla.org/projects/bugzilla/security2_12.html http://www.securityfocus.com/bid/1199 •

CVSS: 7.5EPSS: 0%CPEs: 1EXPL: 0

The process_bug.cgi script in Bugzilla allows remote attackers to execute arbitrary commands via shell metacharacters. • http://archives.neohapsis.com/archives/bugtraq/2000-05/0128.html http://www.securityfocus.com/bid/1199 •