CVE-2001-1404
https://notcve.org/view.php?id=CVE-2001-1404
Bugzilla before 2.14 stores user passwords in plaintext and sends password requests in an email message, which could allow attackers to gain privileges. • http://bugzilla.mozilla.org/show_bug.cgi?id=74032 http://marc.info/?l=bugtraq&m=99912899900567 http://www.redhat.com/support/errata/RHSA-2001-107.html •
CVE-2001-1406
https://notcve.org/view.php?id=CVE-2001-1406
process_bug.cgi in Bugzilla before 2.14 does not set the "groupset" bit when a bug is moved between product groups, which will cause the bug to have the old group's restrictions, which might not be as stringent. • http://bugzilla.mozilla.org/show_bug.cgi?id=66235 http://marc.info/?l=bugtraq&m=99912899900567 http://www.iss.net/security_center/static/10478.php http://www.redhat.com/support/errata/RHSA-2001-107.html •
CVE-2001-0330
https://notcve.org/view.php?id=CVE-2001-0330
Bugzilla 2.10 allows remote attackers to access sensitive information, including the database username and password, via an HTTP request for the globals.pl file, which is normally returned by the web server without being executed. • http://www.atstake.com/research/advisories/2001/a043001-1.txt http://www.securityfocus.com/bid/2671 https://exchange.xforce.ibmcloud.com/vulnerabilities/6489 •
CVE-2001-0329 – Mozilla Bugzilla 2.4/2.6/2.8/2.10 - Arbitrary Command Execution
https://notcve.org/view.php?id=CVE-2001-0329
Bugzilla 2.10 allows remote attackers to execute arbitrary commands via shell metacharacters in a username that is then processed by (1) the Bugzilla_login cookie in post_bug.cgi, or (2) the who parameter in process_bug.cgi. • https://www.exploit-db.com/exploits/19909 http://www.atstake.com/research/advisories/2001/a043001-1.txt http://www.mozilla.org/projects/bugzilla/security2_12.html http://www.securityfocus.com/bid/1199 •
CVE-2000-0421
https://notcve.org/view.php?id=CVE-2000-0421
The process_bug.cgi script in Bugzilla allows remote attackers to execute arbitrary commands via shell metacharacters. • http://archives.neohapsis.com/archives/bugtraq/2000-05/0128.html http://www.securityfocus.com/bid/1199 •