Show filters
147 Total Results
Displaying 1-10 of 147
Sort by:
Attacker Value
Unknown
CVE-2018-5123
Disclosure Date: April 29, 2019 (last updated November 27, 2024)
A third party website can access information available to a user with access to a restricted bug entry using the image generation in report.cgi in all Bugzilla versions prior to 4.4.
0
Attacker Value
Unknown
CVE-2019-1003066
Disclosure Date: April 04, 2019 (last updated October 26, 2023)
Jenkins Bugzilla Plugin stores credentials unencrypted in its global configuration file on the Jenkins master where they can be viewed by users with access to the master file system.
0
Attacker Value
Unknown
CVE-2016-2803
Disclosure Date: April 12, 2017 (last updated November 26, 2024)
Cross-site scripting (XSS) vulnerability in the dependency graphs in Bugzilla 2.16rc1 through 4.4.11, and 4.5.1 through 5.0.2 allows remote attackers to inject arbitrary web script or HTML.
0
Attacker Value
Unknown
CVE-2015-8509
Disclosure Date: January 03, 2016 (last updated November 25, 2024)
Template.pm in Bugzilla 2.x, 3.x, and 4.x before 4.2.16, 4.3.x and 4.4.x before 4.4.11, and 4.5.x and 5.0.x before 5.0.2 does not properly construct CSV files, which allows remote attackers to obtain sensitive information by leveraging a web browser that interprets CSV data as JavaScript code.
0
Attacker Value
Unknown
CVE-2015-8508
Disclosure Date: January 03, 2016 (last updated November 25, 2024)
Cross-site scripting (XSS) vulnerability in showdependencygraph.cgi in Bugzilla 2.x, 3.x, and 4.x before 4.2.16, 4.3.x and 4.4.x before 4.4.11, and 4.5.x and 5.0.x before 5.0.2, when a local dot configuration is used, allows remote attackers to inject arbitrary web script or HTML via a crafted bug summary.
0
Attacker Value
Unknown
CVE-2015-4499
Disclosure Date: September 14, 2015 (last updated October 05, 2023)
Util.pm in Bugzilla 2.x, 3.x, and 4.x before 4.2.15, 4.3.x and 4.4.x before 4.4.10, and 5.x before 5.0.1 mishandles long e-mail addresses during account registration, which allows remote attackers to obtain the default privileges for an arbitrary domain name by placing that name in a substring of an address, as demonstrated by truncation of an @mozilla.com.example.com address to an @mozilla.com address.
0
Attacker Value
Unknown
CVE-2014-8630
Disclosure Date: February 01, 2015 (last updated October 05, 2023)
Bugzilla before 4.0.16, 4.1.x and 4.2.x before 4.2.12, 4.3.x and 4.4.x before 4.4.7, and 5.x before 5.0rc1 allows remote authenticated users to execute arbitrary commands by leveraging the editcomponents privilege and triggering crafted input to a two-argument Perl open call, as demonstrated by shell metacharacters in a product name.
0
Attacker Value
Unknown
CVE-2014-1573
Disclosure Date: October 13, 2014 (last updated October 05, 2023)
Bugzilla 2.x through 4.0.x before 4.0.15, 4.1.x and 4.2.x before 4.2.11, 4.3.x and 4.4.x before 4.4.6, and 4.5.x before 4.5.6 does not ensure that a scalar context is used for certain CGI parameters, which allows remote attackers to conduct cross-site scripting (XSS) attacks by sending three values for a single parameter name.
0
Attacker Value
Unknown
CVE-2014-1572
Disclosure Date: October 13, 2014 (last updated October 05, 2023)
The confirm_create_account function in the account-creation feature in token.cgi in Bugzilla 2.x through 4.0.x before 4.0.15, 4.1.x and 4.2.x before 4.2.11, 4.3.x and 4.4.x before 4.4.6, and 4.5.x before 4.5.6 does not specify a scalar context for the realname parameter, which allows remote attackers to create accounts with unverified e-mail addresses by sending three realname values with realname=login_name as the second, as demonstrated by selecting an e-mail address with a domain name for which group privileges are automatically granted.
0
Attacker Value
Unknown
CVE-2014-1571
Disclosure Date: October 13, 2014 (last updated October 05, 2023)
Bugzilla 2.x through 4.0.x before 4.0.15, 4.1.x and 4.2.x before 4.2.11, 4.3.x and 4.4.x before 4.4.6, and 4.5.x before 4.5.6 allows remote authenticated users to obtain sensitive private-comment information by leveraging a role as a flag recipient, related to Bug.pm, Flag.pm, and a mail template.
0