Page 9 of 70 results (0.012 seconds)

CVSS: 5.0EPSS: 6%CPEs: 6EXPL: 1

email_in.pl in Bugzilla 2.23.4 through 3.0.0 allows remote attackers to execute arbitrary commands via the -f (From address) option to the Email::Send::Sendmail function, probably involving shell metacharacters. email_in.pl en Bugzilla 2.23.4 hasta la 3.0.0 permite a atacantes remotos ejecutar comandos de su elección a través de la opción -f (Dirección Desde) en la función Email::Send::Sendmail, probablemente afectando al interprete de comandos de metacaracteres. • http://osvdb.org/37203 http://secunia.com/advisories/26584 http://secunia.com/advisories/26971 http://security.gentoo.org/glsa/glsa-200709-18.xml http://www.bugzilla.org/security/2.20.4 http://www.securityfocus.com/archive/1/477630/100/0/threaded http://www.securityfocus.com/bid/25425 http://www.securitytracker.com/id?1018604 http://www.vupen.com/english/advisories/2007/2977 https://bugzilla.mozilla.org/show_bug.cgi?id=386860 https://exchange.xforce.ibmcloud.com/ •

CVSS: 2.6EPSS: 4%CPEs: 4EXPL: 0

Cross-site request forgery (CSRF) vulnerability in editversions.cgi in Bugzilla before 2.22.1 and 2.23.x before 2.23.3 allows user-assisted remote attackers to create, modify, or delete arbitrary bug reports via a crafted URL. Vulnerabilidad de falsificación de petición en sitios cruzados (CSRF) en editversions.cgi en Bugzilla anterior a 2.22.1 y 2.23.x anteriores a 2.23.3 permite a atacantes remotos con intervención del usuario crear, modificar o borrar informes de "bugs" de su elección mediante una URL creada artesanalmente. • http://secunia.com/advisories/22409 http://secunia.com/advisories/22790 http://security.gentoo.org/glsa/glsa-200611-04.xml http://securityreason.com/securityalert/1760 http://www.bugzilla.org/security/2.18.5 http://www.osvdb.org/29548 http://www.securityfocus.com/archive/1/448777/100/100/threaded http://www.securityfocus.com/bid/20538 http://www.vupen.com/english/advisories/2006/4035 https://bugzilla.mozilla.org/show_bug.cgi?id=281181 https://exchange.xforce.ibmcloud •

CVSS: 5.0EPSS: 0%CPEs: 26EXPL: 0

show_bug.cgi in Bugzilla 2.17.1 through 2.18rc2 and 2.19 from CVS, when using the insidergroup feature and exporting a bug to XML, shows comments and attachment summaries which are marked as private, which allows remote attackers to gain sensitive information. • http://marc.info/?l=bugtraq&m=109872095201238&w=2 http://www.securityfocus.com/bid/11511 https://bugzilla.mozilla.org/show_bug.cgi?id=263780 https://exchange.xforce.ibmcloud.com/vulnerabilities/17841 •

CVSS: 5.0EPSS: 0%CPEs: 26EXPL: 0

Bugzilla 2.17.1 through 2.18rc2 and 2.19 from cvs, when using the insidergroup feature, does not sufficiently protect private attachments when there are changes to the metadata, such as filename, description, MIME type, or review flags, which allows remote authenticated users to obtain sensitive information when (1) viewing the bug activity log or (2) receiving bug change notification mails. • http://marc.info/?l=bugtraq&m=109872095201238&w=2 http://www.securityfocus.com/bid/11511 https://bugzilla.mozilla.org/show_bug.cgi?id=250605 https://bugzilla.mozilla.org/show_bug.cgi?id=253544 https://exchange.xforce.ibmcloud.com/vulnerabilities/17842 •

CVSS: 6.8EPSS: 0%CPEs: 24EXPL: 0

Multiple cross-site scripting (XSS) vulnerabilities in (1) editcomponents.cgi, (2) editgroups.cgi, (3) editmilestones.cgi, (4) editproducts.cgi, (5) editusers.cgi, and (6) editversions.cgi in Bugzilla 2.16.x before 2.16.6, and 2.18 before 2.18rc1, allow remote attackers to execute arbitrary JavaScript as other users via a URL parameter. Múltiples vulnerabilidades de secuencias de órdenes en sitios cruzados (XSS) en (1) editcomponents.cgi, (2) editgroups.cgi, (3) editmilestones.cgi, (4) editproducts.cgi, (5) editusers.cgi, y (6) editversions.cgi de Bugzilla 2.16.x anteriores a 2.16.6 y 2.18 anteriores a 2.18rc1, permite a atacantes remotos ejecutar código JavaScritp de su elección como otros usuarios mediante una parámetro en la URL. • http://bugzilla.mozilla.org/show_bug.cgi?id=235265 http://marc.info/?l=bugtraq&m=108965446813639&w=2 http://www.securityfocus.com/bid/10698 https://exchange.xforce.ibmcloud.com/vulnerabilities/16670 •