Search criteria
436 vulnerabilities found for bugzilla by mozilla
VAR-201108-0186
Vulnerability from variot - Updated: 2023-12-18 11:07Cross-site scripting (XSS) vulnerability in Bugzilla 2.4 through 2.22.7, 3.0.x through 3.3.x, 3.4.x before 3.4.12, 3.5.x, 3.6.x before 3.6.6, 3.7.x, 4.0.x before 4.0.2, and 4.1.x before 4.1.3, when Internet Explorer before 9 or Safari before 5.0.6 is used for Raw Unified mode, allows remote attackers to inject arbitrary web script or HTML via a crafted patch, related to content sniffing. Bugzilla is prone to the following vulnerabilities: 1. A security-bypass vulnerability. 2. An email header-injection vulnerability. 3. Multiple information-disclosure vulnerabilities. 4. Multiple cross-site scripting vulnerabilities. Successfully exploiting these issues may allow an attacker to bypass certain security restrictions, obtain sensitive information, execute arbitrary script code in the browser of an unsuspecting user, steal cookie-based authentication credentials, and perform actions in the vulnerable application in the context of the victim. Bugzilla is an open source defect tracking system developed by the Mozilla Foundation in the United States. It can manage the entire life cycle of defects in software development, such as submitting (new), repairing (resolve), and closing (close). Bugzilla 2.4 to 2.22.7, 3.0.x to 3.3.x, 3.4.x prior to 3.4.12, 3.5.x, 3.6.x prior to 3.6.6, 3.7.x, 4.0 prior to 4.0.2. x version, and 4.1.x versions prior to 4.1.3 have a cross-site scripting vulnerability. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1
Debian Security Advisory DSA-2322-1 security@debian.org http://www.debian.org/security/ Jonathan Wiltshire October 10, 2011 http://www.debian.org/security/faq
Package : bugzilla Vulnerability : several Problem type : remote Debian-specific: no CVE ID : CVE-201-2979 CVE-2010-4567 CVE-2010-4568 CVE-2010-4572 CVE-2011-0046 CVE-2011-0048 CVE-2011-2379 CVE-2011-2380 CVE-2011-2381 CVE-2011-2978
Several vulnerabilities were discovered in Bugzilla, a web-based bug tracking system.
CVE-2010-4572
By inserting particular strings into certain URLs, it was possible to inject both headers and content to any browser.
CVE-2010-4567, CVE-2011-0048
Bugzilla has a "URL" field that can contain several types of URL, including "javascript:" and "data:" URLs. However, it does not make "javascript:" and "data:" URLs into clickable links, to protect against cross-site scripting attacks or other attacks. It was possible to bypass this protection by adding spaces into the URL in places that Bugzilla did not expect them. Also, "javascript:" and "data:" links were always shown as clickable to logged-out users.
CVE-2010-4568
It was possible for a user to gain unauthorized access to any Bugzilla account in a very short amount of time (short enough that the attack is highly effective).
CVE-2011-0046
Various pages were vulnerable to Cross-Site Request Forgery attacks.
CVE-2011-2978
When a user changes his email address, Bugzilla trusts a user-modifiable field for obtaining the current e-mail address to send a confirmation message to. If an attacker has access to the session of another user (for example, if that user left their browser window open in a public place), the attacker could alter this field to cause the email-change notification to go to their own address. This means that the user would not be notified that his account had its email address changed by the attacker.
CVE-2011-2381
For flagmails only, attachment descriptions with a newline in them could lead to the injection of crafted headers in email notifications when an attachment flag is edited.
CVE-2011-2379
Bugzilla uses an alternate host for attachments when viewing them in raw format to prevent cross-site scripting attacks.
CVE-2011-2380 CVE-201-2979
Normally, a group name is confidential and is only visible to members of the group, and to non-members if the group is used in bugs. By crafting the URL when creating or editing a bug, it was possible to guess if a group existed or not, even for groups which weren't used in bugs and so which were supposed to remain confidential.
For the oldstable distribution (lenny), it has not been practical to backport patches to fix these bugs. Users of bugzilla on lenny are strongly advised to upgrade to the version in the squeeze distribution.
For the stable distribution (squeeze), these problems have been fixed in version 3.6.2.0-4.4.
For the testing distribution (wheezy) and the unstable distribution (sid), the bugzilla packages have been removed.
We recommend that you upgrade your bugzilla packages.
Further information about Debian Security Advisories, how to apply these updates to your system and frequently asked questions can be found at: http://www.debian.org/security/
Mailing list: debian-security-announce@lists.debian.org
-----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.11 (GNU/Linux)
iEYEARECAAYFAk6TGQMACgkQXm3vHE4uylrKoACgpP8nXm2Nj6cmEPNLL5n4VVqQ cMsAoNuj8KxXmA437xUP1NZqnJrbWwFD =kZIo -----END PGP SIGNATURE-----
Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/ . ----------------------------------------------------------------------
The Secunia CSI 5.0 Beta - now available for testing Find out more, take a free test drive, and share your opinion with us: http://secunia.com/blog/242
TITLE: Bugzilla Multiple Vulnerabilities
SECUNIA ADVISORY ID: SA45501
VERIFY ADVISORY: Secunia.com http://secunia.com/advisories/45501/ Customer Area (Credentials Required) https://ca.secunia.com/?page=viewadvisory&vuln_id=45501
RELEASE DATE: 2011-08-05
DISCUSS ADVISORY: http://secunia.com/advisories/45501/#comments
AVAILABLE ON SITE AND IN CUSTOMER AREA: * Last Update * Popularity * Comments * Criticality Level * Impact * Where * Solution Status * Operating System / Software * CVE Reference(s)
http://secunia.com/advisories/45501/
ONLY AVAILABLE IN CUSTOMER AREA: * Authentication Level * Report Reliability * Secunia PoC * Secunia Analysis * Systems Affected * Approve Distribution * Remediation Status * Secunia CVSS Score * CVSS
https://ca.secunia.com/?page=viewadvisory&vuln_id=45501
ONLY AVAILABLE WITH SECUNIA CSI AND SECUNIA PSI: * AUTOMATED SCANNING
http://secunia.com/vulnerability_scanning/personal/ http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/
DESCRIPTION: Multiple vulnerabilities have been reported in Bugzilla, which can be exploited by malicious, local users to gain access to potentially sensitive information and by malicious users to disclose potentially sensitive information, conduct script insertion and spoofing attacks.
1) Input passed via patch attachments is not properly sanitised before being viewed in "Raw Unified" mode. This can be exploited to insert arbitrary HTML and script code, which will be executed in a user's browser session in context of an affected site when the malicious data is being viewed.
Successful exploitation of this vulnerability requires the victim to use Internet Explorer or Safari browsers.
SOLUTION: Update to version 3.4.12, 3.6.6, or 4.1.3 (please see the vendor's advisory for details).
PROVIDED AND/OR DISCOVERED BY: The vendor provides a bundled list of credits: Fr\xe9d\xe9ric Buclin Byron Jones Max Kanat-Alexander Reed Loden Neal Poole Neil Rashbrook David Lawrence
ORIGINAL ADVISORY: http://www.bugzilla.org/security/3.4.11/
OTHER REFERENCES: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/
DEEP LINKS: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/
EXTENDED DESCRIPTION: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/
EXTENDED SOLUTION: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/
EXPLOIT: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/
About: This Advisory was delivered by Secunia as a free service to help private users keeping their systems up to date against the latest vulnerabilities.
Subscribe: http://secunia.com/advisories/secunia_security_advisories/
Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/
Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor.
Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org
.
Background
Bugzilla is the bug-tracking system from the Mozilla project.
Affected packages
-------------------------------------------------------------------
Package / Vulnerable / Unaffected
-------------------------------------------------------------------
1 www-apps/bugzilla < 3.6.6 >= 3.6.6
Description
Multiple vulnerabilities have been discovered in Bugzilla. Please review the CVE identifiers referenced below for details.
Impact
A remote attacker could conduct cross-site scripting attacks, conduct script insertion and spoofing attacks, hijack the authentication of arbitrary users, inject arbitrary HTTP headers, obtain access to arbitrary accounts, disclose the existence of confidential groups and its names, or inject arbitrary e-mail headers.
A local attacker could disclose the contents of temporarfy files for uploaded attachments.
Workaround
There is no known workaround at this time.
Resolution
All Bugzilla users should upgrade to the latest version:
# emerge --sync # emerge --ask --oneshot --verbose ">=www-apps/bugzilla-3.6.6"
NOTE: This is a legacy GLSA. Updates for all affected architectures are available since August 27, 2011. It is likely that your system is already no longer affected by this issue.
References
[ 1 ] CVE-2010-2761 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2761 [ 2 ] CVE-2010-3172 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3172 [ 3 ] CVE-2010-3764 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3764 [ 4 ] CVE-2010-4411 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4411 [ 5 ] CVE-2010-4567 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4567 [ 6 ] CVE-2010-4568 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4568 [ 7 ] CVE-2010-4569 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4569 [ 8 ] CVE-2010-4570 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4570 [ 9 ] CVE-2010-4572 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4572 [ 10 ] CVE-2011-0046 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0046 [ 11 ] CVE-2011-0048 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0048 [ 12 ] CVE-2011-2379 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2379 [ 13 ] CVE-2011-2380 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2380 [ 14 ] CVE-2011-2381 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2381 [ 15 ] CVE-2011-2976 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2976 [ 16 ] CVE-2011-2977 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2977 [ 17 ] CVE-2011-2978 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2978 [ 18 ] CVE-2011-2979 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2979
Availability
This GLSA and any updates to it are available for viewing at the Gentoo Security Website:
http://security.gentoo.org/glsa/glsa-21f5d5f72.xml
Concerns?
Security is a primary focus of Gentoo Linux and ensuring the confidentiality and security of our users' machines is of utmost importance to us. Any security concerns should be addressed to security@gentoo.org or alternatively, you may file a bug at https://bugs.gentoo.org.
License
Copyright 2011 Gentoo Foundation, Inc; referenced text belongs to its owner(s).
The contents of this document are licensed under the Creative Commons - Attribution / Share Alike license.
http://creativecommons.org/licenses/by-sa/2.5
Show details on source website{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"configurations": {
"@id": "https://www.variotdbs.pl/ref/configurations"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-201108-0186",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "bugzilla",
"scope": "eq",
"trust": 1.9,
"vendor": "mozilla",
"version": "2.14.2"
},
{
"model": "bugzilla",
"scope": "eq",
"trust": 1.9,
"vendor": "mozilla",
"version": "2.16.7"
},
{
"model": "bugzilla",
"scope": "eq",
"trust": 1.9,
"vendor": "mozilla",
"version": "2.14.4"
},
{
"model": "bugzilla",
"scope": "eq",
"trust": 1.9,
"vendor": "mozilla",
"version": "2.16"
},
{
"model": "bugzilla",
"scope": "eq",
"trust": 1.9,
"vendor": "mozilla",
"version": "2.16.3"
},
{
"model": "bugzilla",
"scope": "eq",
"trust": 1.9,
"vendor": "mozilla",
"version": "2.16.2"
},
{
"model": "bugzilla",
"scope": "eq",
"trust": 1.9,
"vendor": "mozilla",
"version": "2.14.1"
},
{
"model": "bugzilla",
"scope": "eq",
"trust": 1.9,
"vendor": "mozilla",
"version": "2.16.1"
},
{
"model": "bugzilla",
"scope": "eq",
"trust": 1.9,
"vendor": "mozilla",
"version": "2.16.6"
},
{
"model": "bugzilla",
"scope": "eq",
"trust": 1.9,
"vendor": "mozilla",
"version": "2.16.11"
},
{
"model": "bugzilla",
"scope": "eq",
"trust": 1.3,
"vendor": "mozilla",
"version": "2.17.5"
},
{
"model": "bugzilla",
"scope": "eq",
"trust": 1.3,
"vendor": "mozilla",
"version": "2.20.1"
},
{
"model": "bugzilla",
"scope": "eq",
"trust": 1.3,
"vendor": "mozilla",
"version": "2.17.6"
},
{
"model": "bugzilla",
"scope": "eq",
"trust": 1.3,
"vendor": "mozilla",
"version": "3.6"
},
{
"model": "bugzilla",
"scope": "eq",
"trust": 1.3,
"vendor": "mozilla",
"version": "2.18.1"
},
{
"model": "bugzilla",
"scope": "eq",
"trust": 1.3,
"vendor": "mozilla",
"version": "2.19.1"
},
{
"model": "bugzilla",
"scope": "eq",
"trust": 1.3,
"vendor": "mozilla",
"version": "2.20.4"
},
{
"model": "bugzilla",
"scope": "eq",
"trust": 1.3,
"vendor": "mozilla",
"version": "2.4"
},
{
"model": "bugzilla",
"scope": "eq",
"trust": 1.3,
"vendor": "mozilla",
"version": "2.16.8"
},
{
"model": "bugzilla",
"scope": "eq",
"trust": 1.3,
"vendor": "mozilla",
"version": "3.2.1"
},
{
"model": "bugzilla",
"scope": "eq",
"trust": 1.3,
"vendor": "mozilla",
"version": "2.16.5"
},
{
"model": "bugzilla",
"scope": "eq",
"trust": 1.3,
"vendor": "mozilla",
"version": "3.2.2"
},
{
"model": "bugzilla",
"scope": "eq",
"trust": 1.3,
"vendor": "mozilla",
"version": "3.2"
},
{
"model": "bugzilla",
"scope": "eq",
"trust": 1.3,
"vendor": "mozilla",
"version": "2.14.3"
},
{
"model": "bugzilla",
"scope": "eq",
"trust": 1.3,
"vendor": "mozilla",
"version": "3.2.4"
},
{
"model": "bugzilla",
"scope": "eq",
"trust": 1.3,
"vendor": "mozilla",
"version": "2.22.2"
},
{
"model": "bugzilla",
"scope": "eq",
"trust": 1.3,
"vendor": "mozilla",
"version": "3.6.2"
},
{
"model": "bugzilla",
"scope": "eq",
"trust": 1.3,
"vendor": "mozilla",
"version": "2.18.4"
},
{
"model": "bugzilla",
"scope": "eq",
"trust": 1.3,
"vendor": "mozilla",
"version": "3.2.9"
},
{
"model": "bugzilla",
"scope": "eq",
"trust": 1.3,
"vendor": "mozilla",
"version": "3.2.3"
},
{
"model": "bugzilla",
"scope": "eq",
"trust": 1.3,
"vendor": "mozilla",
"version": "2.22.5"
},
{
"model": "bugzilla",
"scope": "eq",
"trust": 1.3,
"vendor": "mozilla",
"version": "2.22.7"
},
{
"model": "bugzilla",
"scope": "eq",
"trust": 1.3,
"vendor": "mozilla",
"version": "2.12"
},
{
"model": "bugzilla",
"scope": "eq",
"trust": 1.3,
"vendor": "mozilla",
"version": "2.20.3"
},
{
"model": "bugzilla",
"scope": "eq",
"trust": 1.3,
"vendor": "mozilla",
"version": "3.7.2"
},
{
"model": "bugzilla",
"scope": "eq",
"trust": 1.3,
"vendor": "mozilla",
"version": "3.0.1"
},
{
"model": "bugzilla",
"scope": "eq",
"trust": 1.3,
"vendor": "mozilla",
"version": "2.20.2"
},
{
"model": "bugzilla",
"scope": "eq",
"trust": 1.3,
"vendor": "mozilla",
"version": "2.10"
},
{
"model": "bugzilla",
"scope": "eq",
"trust": 1.3,
"vendor": "mozilla",
"version": "3.6.1"
},
{
"model": "bugzilla",
"scope": "eq",
"trust": 1.3,
"vendor": "mozilla",
"version": "2.9"
},
{
"model": "bugzilla",
"scope": "eq",
"trust": 1.3,
"vendor": "mozilla",
"version": "3.0.7"
},
{
"model": "bugzilla",
"scope": "eq",
"trust": 1.3,
"vendor": "mozilla",
"version": "2.21"
},
{
"model": "bugzilla",
"scope": "eq",
"trust": 1.3,
"vendor": "mozilla",
"version": "3.0.2"
},
{
"model": "bugzilla",
"scope": "eq",
"trust": 1.3,
"vendor": "mozilla",
"version": "2.16.4"
},
{
"model": "bugzilla",
"scope": "eq",
"trust": 1.3,
"vendor": "mozilla",
"version": "2.17.1"
},
{
"model": "bugzilla",
"scope": "eq",
"trust": 1.3,
"vendor": "mozilla",
"version": "4.1"
},
{
"model": "bugzilla",
"scope": "eq",
"trust": 1.3,
"vendor": "mozilla",
"version": "2.16.9"
},
{
"model": "bugzilla",
"scope": "eq",
"trust": 1.3,
"vendor": "mozilla",
"version": "3.2.7"
},
{
"model": "bugzilla",
"scope": "eq",
"trust": 1.3,
"vendor": "mozilla",
"version": "2.17.7"
},
{
"model": "bugzilla",
"scope": "eq",
"trust": 1.3,
"vendor": "mozilla",
"version": "3.5.2"
},
{
"model": "bugzilla",
"scope": "eq",
"trust": 1.3,
"vendor": "mozilla",
"version": "3.0.8"
},
{
"model": "bugzilla",
"scope": "eq",
"trust": 1.3,
"vendor": "mozilla",
"version": "2.21.2"
},
{
"model": "bugzilla",
"scope": "eq",
"trust": 1.3,
"vendor": "mozilla",
"version": "2.22.3"
},
{
"model": "bugzilla",
"scope": "eq",
"trust": 1.3,
"vendor": "mozilla",
"version": "2.14"
},
{
"model": "bugzilla",
"scope": "eq",
"trust": 1.3,
"vendor": "mozilla",
"version": "2.17.4"
},
{
"model": "bugzilla",
"scope": "eq",
"trust": 1.3,
"vendor": "mozilla",
"version": "3.4"
},
{
"model": "bugzilla",
"scope": "eq",
"trust": 1.3,
"vendor": "mozilla",
"version": "2.18.3"
},
{
"model": "bugzilla",
"scope": "eq",
"trust": 1.3,
"vendor": "mozilla",
"version": "3.3.2"
},
{
"model": "bugzilla",
"scope": "eq",
"trust": 1.3,
"vendor": "mozilla",
"version": "3.7.3"
},
{
"model": "bugzilla",
"scope": "eq",
"trust": 1.3,
"vendor": "mozilla",
"version": "3.3.4"
},
{
"model": "bugzilla",
"scope": "eq",
"trust": 1.3,
"vendor": "mozilla",
"version": "2.8"
},
{
"model": "bugzilla",
"scope": "eq",
"trust": 1.3,
"vendor": "mozilla",
"version": "3.5.3"
},
{
"model": "bugzilla",
"scope": "eq",
"trust": 1.3,
"vendor": "mozilla",
"version": "2.16.10"
},
{
"model": "bugzilla",
"scope": "eq",
"trust": 1.3,
"vendor": "mozilla",
"version": "2.6"
},
{
"model": "bugzilla",
"scope": "eq",
"trust": 1.3,
"vendor": "mozilla",
"version": "2.17.3"
},
{
"model": "bugzilla",
"scope": "eq",
"trust": 1.3,
"vendor": "mozilla",
"version": "2.18.2"
},
{
"model": "bugzilla",
"scope": "eq",
"trust": 1.3,
"vendor": "mozilla",
"version": "2.22.6"
},
{
"model": "bugzilla",
"scope": "eq",
"trust": 1.3,
"vendor": "mozilla",
"version": "3.2.6"
},
{
"model": "bugzilla",
"scope": "eq",
"trust": 1.3,
"vendor": "mozilla",
"version": "3.6.4"
},
{
"model": "bugzilla",
"scope": "eq",
"trust": 1.3,
"vendor": "mozilla",
"version": "3.0.4"
},
{
"model": "bugzilla",
"scope": "eq",
"trust": 1.3,
"vendor": "mozilla",
"version": "2.22.1"
},
{
"model": "bugzilla",
"scope": "eq",
"trust": 1.3,
"vendor": "mozilla",
"version": "2.14.5"
},
{
"model": "bugzilla",
"scope": "eq",
"trust": 1.3,
"vendor": "mozilla",
"version": "2.19.2"
},
{
"model": "bugzilla",
"scope": "eq",
"trust": 1.3,
"vendor": "mozilla",
"version": "2.19"
},
{
"model": "bugzilla",
"scope": "eq",
"trust": 1.3,
"vendor": "mozilla",
"version": "2.17"
},
{
"model": "bugzilla",
"scope": "eq",
"trust": 1.3,
"vendor": "mozilla",
"version": "3.4.10"
},
{
"model": "bugzilla",
"scope": "eq",
"trust": 1.3,
"vendor": "mozilla",
"version": "3.0.6"
},
{
"model": "bugzilla",
"scope": "eq",
"trust": 1.3,
"vendor": "mozilla",
"version": "3.3.3"
},
{
"model": "bugzilla",
"scope": "eq",
"trust": 1.3,
"vendor": "mozilla",
"version": "2.21.1"
},
{
"model": "bugzilla",
"scope": "eq",
"trust": 1.3,
"vendor": "mozilla",
"version": "3.0.11"
},
{
"model": "bugzilla",
"scope": "eq",
"trust": 1.3,
"vendor": "mozilla",
"version": "3.4.1"
},
{
"model": "bugzilla",
"scope": "eq",
"trust": 1.3,
"vendor": "mozilla",
"version": "3.2.5"
},
{
"model": "bugzilla",
"scope": "eq",
"trust": 1.3,
"vendor": "mozilla",
"version": "2.18.5"
},
{
"model": "bugzilla",
"scope": "eq",
"trust": 1.3,
"vendor": "mozilla",
"version": "3.2.8"
},
{
"model": "bugzilla",
"scope": "eq",
"trust": 1.3,
"vendor": "mozilla",
"version": "3.5.1"
},
{
"model": "bugzilla",
"scope": "eq",
"trust": 1.3,
"vendor": "mozilla",
"version": "2.22.4"
},
{
"model": "bugzilla",
"scope": "eq",
"trust": 1.3,
"vendor": "mozilla",
"version": "3.2.10"
},
{
"model": "bugzilla",
"scope": "eq",
"trust": 1.3,
"vendor": "mozilla",
"version": "3.0.5"
},
{
"model": "bugzilla",
"scope": "eq",
"trust": 1.3,
"vendor": "mozilla",
"version": "2.19.3"
},
{
"model": "bugzilla",
"scope": "eq",
"trust": 1.3,
"vendor": "mozilla",
"version": "3.7.1"
},
{
"model": "bugzilla",
"scope": "eq",
"trust": 1.3,
"vendor": "mozilla",
"version": "3.0.9"
},
{
"model": "bugzilla",
"scope": "eq",
"trust": 1.3,
"vendor": "mozilla",
"version": "3.6.3"
},
{
"model": "bugzilla",
"scope": "eq",
"trust": 1.3,
"vendor": "mozilla",
"version": "3.3.1"
},
{
"model": "bugzilla",
"scope": "eq",
"trust": 1.3,
"vendor": "mozilla",
"version": "2.20"
},
{
"model": "bugzilla",
"scope": "eq",
"trust": 1.3,
"vendor": "mozilla",
"version": "3.0.10"
},
{
"model": "bugzilla",
"scope": "eq",
"trust": 1.3,
"vendor": "mozilla",
"version": "2.22"
},
{
"model": "bugzilla",
"scope": "eq",
"trust": 1.0,
"vendor": "mozilla",
"version": "4.0"
},
{
"model": "bugzilla",
"scope": "eq",
"trust": 1.0,
"vendor": "mozilla",
"version": "3.4.11"
},
{
"model": "bugzilla",
"scope": "eq",
"trust": 1.0,
"vendor": "mozilla",
"version": "3.4.5"
},
{
"model": "bugzilla",
"scope": "eq",
"trust": 1.0,
"vendor": "mozilla",
"version": "4.1.2"
},
{
"model": "bugzilla",
"scope": "eq",
"trust": 1.0,
"vendor": "mozilla",
"version": "3.7"
},
{
"model": "bugzilla",
"scope": "eq",
"trust": 1.0,
"vendor": "mozilla",
"version": "3.4.9"
},
{
"model": "bugzilla",
"scope": "eq",
"trust": 1.0,
"vendor": "mozilla",
"version": "3.4.7"
},
{
"model": "bugzilla",
"scope": "eq",
"trust": 1.0,
"vendor": "mozilla",
"version": "4.1.1"
},
{
"model": "bugzilla",
"scope": "eq",
"trust": 1.0,
"vendor": "mozilla",
"version": "3.4.3"
},
{
"model": "bugzilla",
"scope": "eq",
"trust": 1.0,
"vendor": "mozilla",
"version": "3.5"
},
{
"model": "bugzilla",
"scope": "eq",
"trust": 1.0,
"vendor": "mozilla",
"version": "2.18"
},
{
"model": "bugzilla",
"scope": "eq",
"trust": 1.0,
"vendor": "mozilla",
"version": "3.0.3"
},
{
"model": "bugzilla",
"scope": "eq",
"trust": 1.0,
"vendor": "mozilla",
"version": "4.0.1"
},
{
"model": "bugzilla",
"scope": "eq",
"trust": 1.0,
"vendor": "mozilla",
"version": "3.4.6"
},
{
"model": "bugzilla",
"scope": "eq",
"trust": 1.0,
"vendor": "mozilla",
"version": "3.4.2"
},
{
"model": "bugzilla",
"scope": "eq",
"trust": 1.0,
"vendor": "mozilla",
"version": "3.6.5"
},
{
"model": "bugzilla",
"scope": "eq",
"trust": 1.0,
"vendor": "mozilla",
"version": "3.4.8"
},
{
"model": "bugzilla",
"scope": "eq",
"trust": 1.0,
"vendor": "mozilla",
"version": "3.4.4"
},
{
"model": "bugzilla",
"scope": "eq",
"trust": 1.0,
"vendor": "mozilla",
"version": "3.0.0"
},
{
"model": "bugzilla",
"scope": "eq",
"trust": 0.8,
"vendor": "mozilla",
"version": "3.0.x to 3.3.x"
},
{
"model": "bugzilla",
"scope": "eq",
"trust": 0.8,
"vendor": "mozilla",
"version": "3.4.12"
},
{
"model": "bugzilla",
"scope": "eq",
"trust": 0.8,
"vendor": "mozilla",
"version": "4.1.3"
},
{
"model": "bugzilla",
"scope": "eq",
"trust": 0.8,
"vendor": "mozilla",
"version": "2.4 to 2.22.7"
},
{
"model": "bugzilla",
"scope": "lt",
"trust": 0.8,
"vendor": "mozilla",
"version": "3.4.x"
},
{
"model": "bugzilla",
"scope": "lt",
"trust": 0.8,
"vendor": "mozilla",
"version": "4.1.x"
},
{
"model": "bugzilla",
"scope": "eq",
"trust": 0.8,
"vendor": "mozilla",
"version": "3.5.x"
},
{
"model": "bugzilla",
"scope": "lt",
"trust": 0.8,
"vendor": "mozilla",
"version": "4.0.x"
},
{
"model": "bugzilla",
"scope": "eq",
"trust": 0.8,
"vendor": "mozilla",
"version": "3.7.x"
},
{
"model": "bugzilla",
"scope": "eq",
"trust": 0.8,
"vendor": "mozilla",
"version": "4.0.2"
},
{
"model": "bugzilla",
"scope": "eq",
"trust": 0.8,
"vendor": "mozilla",
"version": "3.6.6"
},
{
"model": "bugzilla",
"scope": "lt",
"trust": 0.8,
"vendor": "mozilla",
"version": "3.6.x"
},
{
"model": "bugzilla 4.0rc2",
"scope": null,
"trust": 0.3,
"vendor": "mozilla",
"version": null
},
{
"model": "linux arm",
"scope": "eq",
"trust": 0.3,
"vendor": "debian",
"version": "6.0"
},
{
"model": "linux ia-64",
"scope": "eq",
"trust": 0.3,
"vendor": "debian",
"version": "6.0"
},
{
"model": "bugzilla",
"scope": "ne",
"trust": 0.3,
"vendor": "mozilla",
"version": "4.0.2"
},
{
"model": "linux sparc",
"scope": "eq",
"trust": 0.3,
"vendor": "debian",
"version": "6.0"
},
{
"model": "bugzilla 4.0rc1",
"scope": null,
"trust": 0.3,
"vendor": "mozilla",
"version": null
},
{
"model": "bugzilla",
"scope": "eq",
"trust": 0.3,
"vendor": "mozilla",
"version": "2.20.6"
},
{
"model": "bugzilla",
"scope": "eq",
"trust": 0.3,
"vendor": "mozilla",
"version": "3.0"
},
{
"model": "bugzilla",
"scope": "eq",
"trust": 0.3,
"vendor": "mozilla",
"version": "2.23.2"
},
{
"model": "bugzilla",
"scope": "ne",
"trust": 0.3,
"vendor": "mozilla",
"version": "3.4.12"
},
{
"model": "bugzilla",
"scope": "eq",
"trust": 0.3,
"vendor": "mozilla",
"version": "3.1.2"
},
{
"model": "bugzilla 3.2rc2",
"scope": null,
"trust": 0.3,
"vendor": "mozilla",
"version": null
},
{
"model": "bugzilla rc3",
"scope": "eq",
"trust": 0.3,
"vendor": "mozilla",
"version": "2.18"
},
{
"model": "bugzilla",
"scope": "eq",
"trust": 0.3,
"vendor": "mozilla",
"version": "3.1.1"
},
{
"model": "linux",
"scope": null,
"trust": 0.3,
"vendor": "gentoo",
"version": null
},
{
"model": "bugzilla",
"scope": "eq",
"trust": 0.3,
"vendor": "mozilla",
"version": "3.1"
},
{
"model": "linux amd64",
"scope": "eq",
"trust": 0.3,
"vendor": "debian",
"version": "6.0"
},
{
"model": "bugzilla rc2",
"scope": "eq",
"trust": 0.3,
"vendor": "mozilla",
"version": "2.18"
},
{
"model": "bugzilla",
"scope": "eq",
"trust": 0.3,
"vendor": "mozilla",
"version": "2.23.4"
},
{
"model": "bugzilla",
"scope": "eq",
"trust": 0.3,
"vendor": "mozilla",
"version": "3.1.3"
},
{
"model": "bugzilla",
"scope": "eq",
"trust": 0.3,
"vendor": "mozilla",
"version": "2.20.5"
},
{
"model": "bugzilla",
"scope": "eq",
"trust": 0.3,
"vendor": "mozilla",
"version": "2.23.3"
},
{
"model": "linux ia-32",
"scope": "eq",
"trust": 0.3,
"vendor": "debian",
"version": "6.0"
},
{
"model": "bugzilla rc1",
"scope": "eq",
"trust": 0.3,
"vendor": "mozilla",
"version": "3.4"
},
{
"model": "linux mips",
"scope": "eq",
"trust": 0.3,
"vendor": "debian",
"version": "6.0"
},
{
"model": "bugzilla 3.2rc1",
"scope": null,
"trust": 0.3,
"vendor": "mozilla",
"version": null
},
{
"model": "bugzilla",
"scope": "ne",
"trust": 0.3,
"vendor": "mozilla",
"version": "3.6.6"
},
{
"model": "bugzilla",
"scope": "ne",
"trust": 0.3,
"vendor": "mozilla",
"version": "4.1.3"
},
{
"model": "linux s/390",
"scope": "eq",
"trust": 0.3,
"vendor": "debian",
"version": "6.0"
},
{
"model": "bugzilla",
"scope": "eq",
"trust": 0.3,
"vendor": "mozilla",
"version": "3.1.4"
},
{
"model": "bugzilla rc1",
"scope": "eq",
"trust": 0.3,
"vendor": "mozilla",
"version": "2.22"
},
{
"model": "linux powerpc",
"scope": "eq",
"trust": 0.3,
"vendor": "debian",
"version": "6.0"
},
{
"model": "bugzilla rc2",
"scope": "eq",
"trust": 0.3,
"vendor": "mozilla",
"version": "2.20"
},
{
"model": "bugzilla rc1",
"scope": "eq",
"trust": 0.3,
"vendor": "mozilla",
"version": "2.20"
},
{
"model": "bugzilla",
"scope": "eq",
"trust": 0.3,
"vendor": "mozilla",
"version": "2.18.6"
},
{
"model": "bugzilla",
"scope": "eq",
"trust": 0.3,
"vendor": "mozilla",
"version": "2.20.7"
},
{
"model": "bugzilla rc1",
"scope": "eq",
"trust": 0.3,
"vendor": "mozilla",
"version": "2.18"
},
{
"model": "bugzilla",
"scope": "eq",
"trust": 0.3,
"vendor": "mozilla",
"version": "2.17.2"
}
],
"sources": [
{
"db": "BID",
"id": "49042"
},
{
"db": "JVNDB",
"id": "JVNDB-2011-004689"
},
{
"db": "NVD",
"id": "CVE-2011-2379"
},
{
"db": "CNNVD",
"id": "CNNVD-201108-111"
}
]
},
"configurations": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/configurations#",
"children": {
"@container": "@list"
},
"cpe_match": {
"@container": "@list"
},
"data": {
"@container": "@list"
},
"nodes": {
"@container": "@list"
}
},
"data": [
{
"CVE_data_version": "4.0",
"nodes": [
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:mozilla:bugzilla:3.4.10:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:bugzilla:3.4.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:bugzilla:3.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:bugzilla:3.4.5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:bugzilla:3.4.6:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:bugzilla:3.0.11:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:bugzilla:3.2.6:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:bugzilla:3.2.8:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:bugzilla:3.3.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:bugzilla:3.2.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:bugzilla:3.5.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:bugzilla:3.5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:bugzilla:3.4:rc1:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:bugzilla:3.4.11:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:bugzilla:3.0.10:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:bugzilla:3.0.8:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:bugzilla:3.2.9:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:bugzilla:3.2.5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:bugzilla:3.2.10:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:bugzilla:3.0.7:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:bugzilla:3.3.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:bugzilla:3.3.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:bugzilla:2.19.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:bugzilla:2.22.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:bugzilla:2.6:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:bugzilla:2.16.10:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:bugzilla:2.16:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:bugzilla:2.16:rc1:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:bugzilla:2.14.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:bugzilla:2.18:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:bugzilla:2.18.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:bugzilla:2.17:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:bugzilla:2.17.6:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:bugzilla:2.22.6:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:bugzilla:2.17.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:bugzilla:2.18.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:bugzilla:2.18.5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:bugzilla:3.6.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:bugzilla:3.6.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:bugzilla:3.4.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:bugzilla:3.5.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:bugzilla:3.4.8:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:bugzilla:3.4.7:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:bugzilla:3.0.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:bugzilla:3.0.6:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:bugzilla:3.2.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:bugzilla:3.2.7:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:bugzilla:3.0.9:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:bugzilla:3.2:rc2:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:bugzilla:3.0.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:bugzilla:3.0.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:bugzilla:3.0.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:bugzilla:2.21.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:bugzilla:2.22:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:bugzilla:2.19.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:bugzilla:2.16.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:bugzilla:2.14.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:bugzilla:2.16.6:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:bugzilla:2.14.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:bugzilla:2.17.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:bugzilla:2.22:rc1:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:bugzilla:2.16.8:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:bugzilla:2.20.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:bugzilla:2.22.5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:bugzilla:2.22.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:bugzilla:2.18:rc1:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:bugzilla:2.20:rc1:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:bugzilla:3.6:rc1:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:bugzilla:3.7.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:bugzilla:3.7:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:bugzilla:4.1.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:bugzilla:4.1.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:bugzilla:3.5.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:bugzilla:3.4.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:bugzilla:3.4.9:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:bugzilla:3.4.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:bugzilla:3.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:bugzilla:3.2:rc1:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:bugzilla:3.2.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:bugzilla:3.2.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:bugzilla:3.3.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:bugzilla:3.0.5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:bugzilla:2.20.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:bugzilla:2.21.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:bugzilla:2.21:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:bugzilla:2.9:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:bugzilla:2.16.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:bugzilla:2.16.11:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:bugzilla:2.14.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:bugzilla:2.18.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:bugzilla:2.17.7:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:bugzilla:2.18:rc2:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:bugzilla:2.12:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:bugzilla:2.16.9:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:bugzilla:2.10:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:bugzilla:2.17.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:bugzilla:2.16.5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:bugzilla:2.22.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:bugzilla:2.19.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:bugzilla:3.6:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:bugzilla:3.6.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:bugzilla:4.0:rc1:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:bugzilla:4.0:rc2:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:bugzilla:3.6.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:bugzilla:3.7.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:bugzilla:4.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:bugzilla:3.0.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:bugzilla:2.20.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:bugzilla:2.20:rc2:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:bugzilla:2.20:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:bugzilla:2.8:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:bugzilla:2.16.7:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:bugzilla:2.16.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:bugzilla:2.16.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:bugzilla:2.18.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:bugzilla:2.18:rc3:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:bugzilla:2.17.5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:bugzilla:2.14.5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:bugzilla:2.22.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:bugzilla:2.14:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:bugzilla:2.22.7:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:bugzilla:2.20.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:bugzilla:2.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:bugzilla:2.19:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:bugzilla:3.6.5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:bugzilla:3.7.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:bugzilla:4.0.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:bugzilla:4.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:microsoft:internet_explorer:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "8",
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:a:apple:safari:1.3.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:a:apple:safari:1.3.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:a:apple:safari:1.0:beta2:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:a:apple:safari:1.0.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:a:apple:safari:1.0.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:a:apple:safari:2.0.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:a:apple:safari:3.0.0b:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:a:apple:safari:1.2.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:a:apple:safari:2.0.3:417.9:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:a:apple:safari:1.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:a:apple:safari:2.0.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:a:apple:safari:4.1.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:a:apple:safari:1.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:a:apple:safari:3.1.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "5.0.5",
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:a:apple:safari:3.0.2b:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:a:microsoft:internet_explorer:4.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:a:microsoft:internet_explorer:5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:a:apple:safari:1.0.3:85.8.1:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:a:apple:safari:1.2.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:a:apple:safari:1.1.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:a:apple:safari:1.0:beta:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:a:apple:safari:2.0.3:417.9.3:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:a:apple:safari:1.0.0b2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:a:apple:safari:1.0.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:a:apple:safari:3.0.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:a:apple:safari:2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:a:apple:safari:1.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:a:apple:safari:3.0.1b:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:a:apple:safari:4.1.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:a:apple:safari:3.0.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:a:apple:safari:5.0.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:a:apple:safari:3.1.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:a:apple:safari:3.1.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:a:microsoft:internet_explorer:3.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:a:apple:safari:1.2.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:a:apple:safari:1.2.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:a:apple:safari:1.3.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:a:apple:safari:1.3.2:312.6:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:a:apple:safari:1.0.3:85.8:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:a:apple:safari:1.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:a:apple:safari:3.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:a:apple:safari:5.0.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:a:apple:safari:1.0.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:a:apple:safari:2.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:a:apple:safari:1.3.2:312.5:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:a:apple:safari:2.0.3:417.9.2:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:a:apple:safari:3.2.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:a:apple:safari:3.0.4b:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:a:apple:safari:3.2.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:a:apple:safari:3.1.0b:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:a:apple:safari:2.0.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:a:microsoft:internet_explorer:6:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:a:microsoft:internet_explorer:7:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:a:apple:safari:1.2.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:a:apple:safari:2.0.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:a:apple:safari:1.0.0b1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:a:apple:safari:1.1.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:a:apple:safari:3.0.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:a:apple:safari:1.2.5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:a:apple:safari:5.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:a:apple:safari:3.0.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:a:apple:safari:3.0.3b:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:a:apple:safari:2.0.3:417.8:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:a:apple:safari:5.0.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:a:apple:safari:3.2.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:a:apple:safari:4.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:a:apple:safari:5.0.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:a:apple:safari:3.0.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:a:apple:safari:3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:a:apple:safari:2.0.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
}
]
}
],
"sources": [
{
"db": "NVD",
"id": "CVE-2011-2379"
}
]
},
"credits": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/credits#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Fr\u0026amp;amp;amp;eacute;d\u0026amp;amp;amp;eacute;ric Buclin, Byron Jones, Max Kanat-Alexander, Reed Loden, Neal Poole, Neil Rashbrook, David Lawrence",
"sources": [
{
"db": "BID",
"id": "49042"
}
],
"trust": 0.3
},
"cve": "CVE-2011-2379",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [
{
"acInsufInfo": false,
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "NVD",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"exploitabilityScore": 8.6,
"impactScore": 2.9,
"integrityImpact": "PARTIAL",
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "MEDIUM",
"trust": 1.0,
"userInteractionRequired": true,
"vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
{
"acInsufInfo": null,
"accessComplexity": "Medium",
"accessVector": "Network",
"authentication": "None",
"author": "NVD",
"availabilityImpact": "None",
"baseScore": 4.3,
"confidentialityImpact": "None",
"exploitabilityScore": null,
"id": "CVE-2011-2379",
"impactScore": null,
"integrityImpact": "Partial",
"obtainAllPrivilege": null,
"obtainOtherPrivilege": null,
"obtainUserPrivilege": null,
"severity": "Medium",
"trust": 0.8,
"userInteractionRequired": null,
"vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
{
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "VULHUB",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"exploitabilityScore": 8.6,
"id": "VHN-50324",
"impactScore": 2.9,
"integrityImpact": "PARTIAL",
"severity": "MEDIUM",
"trust": 0.1,
"vectorString": "AV:N/AC:M/AU:N/C:N/I:P/A:N",
"version": "2.0"
}
],
"cvssV3": [],
"severity": [
{
"author": "NVD",
"id": "CVE-2011-2379",
"trust": 1.8,
"value": "MEDIUM"
},
{
"author": "CNNVD",
"id": "CNNVD-201108-111",
"trust": 0.6,
"value": "MEDIUM"
},
{
"author": "VULHUB",
"id": "VHN-50324",
"trust": 0.1,
"value": "MEDIUM"
}
]
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-50324"
},
{
"db": "JVNDB",
"id": "JVNDB-2011-004689"
},
{
"db": "NVD",
"id": "CVE-2011-2379"
},
{
"db": "CNNVD",
"id": "CNNVD-201108-111"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Cross-site scripting (XSS) vulnerability in Bugzilla 2.4 through 2.22.7, 3.0.x through 3.3.x, 3.4.x before 3.4.12, 3.5.x, 3.6.x before 3.6.6, 3.7.x, 4.0.x before 4.0.2, and 4.1.x before 4.1.3, when Internet Explorer before 9 or Safari before 5.0.6 is used for Raw Unified mode, allows remote attackers to inject arbitrary web script or HTML via a crafted patch, related to content sniffing. Bugzilla is prone to the following vulnerabilities:\n1. A security-bypass vulnerability. \n2. An email header-injection vulnerability. \n3. Multiple information-disclosure vulnerabilities. \n4. Multiple cross-site scripting vulnerabilities. \nSuccessfully exploiting these issues may allow an attacker to bypass certain security restrictions, obtain sensitive information, execute arbitrary script code in the browser of an unsuspecting user, steal cookie-based authentication credentials, and perform actions in the vulnerable application in the context of the victim. Bugzilla is an open source defect tracking system developed by the Mozilla Foundation in the United States. It can manage the entire life cycle of defects in software development, such as submitting (new), repairing (resolve), and closing (close). Bugzilla 2.4 to 2.22.7, 3.0.x to 3.3.x, 3.4.x prior to 3.4.12, 3.5.x, 3.6.x prior to 3.6.6, 3.7.x, 4.0 prior to 4.0.2. x version, and 4.1.x versions prior to 4.1.3 have a cross-site scripting vulnerability. -----BEGIN PGP SIGNED MESSAGE-----\nHash: SHA1\n\n- -------------------------------------------------------------------------\nDebian Security Advisory DSA-2322-1 security@debian.org\nhttp://www.debian.org/security/ Jonathan Wiltshire\nOctober 10, 2011 http://www.debian.org/security/faq\n- -------------------------------------------------------------------------\n\nPackage : bugzilla\nVulnerability : several\nProblem type : remote\nDebian-specific: no\nCVE ID : CVE-201-2979 CVE-2010-4567 CVE-2010-4568 CVE-2010-4572 \n CVE-2011-0046 CVE-2011-0048 CVE-2011-2379 CVE-2011-2380 \n CVE-2011-2381 CVE-2011-2978 \n\nSeveral vulnerabilities were discovered in Bugzilla, a web-based bug\ntracking system. \n\nCVE-2010-4572\n\n By inserting particular strings into certain URLs, it was\n possible to inject both headers and content to any\n browser. \n\nCVE-2010-4567, CVE-2011-0048\n\n Bugzilla has a \"URL\" field that can contain several types\n of URL, including \"javascript:\" and \"data:\" URLs. However,\n it does not make \"javascript:\" and \"data:\" URLs into\n clickable links, to protect against cross-site scripting\n attacks or other attacks. It was possible to bypass this\n protection by adding spaces into the URL in places that\n Bugzilla did not expect them. Also, \"javascript:\" and\n \"data:\" links were *always* shown as clickable to\n logged-out users. \n\nCVE-2010-4568\n\n It was possible for a user to gain unauthorized access to\n any Bugzilla account in a very short amount of time (short\n enough that the attack is highly effective). \n\nCVE-2011-0046\n\n Various pages were vulnerable to Cross-Site Request\n Forgery attacks. \n\nCVE-2011-2978\n\n When a user changes his email address, Bugzilla trusts\n a user-modifiable field for obtaining the current e-mail\n address to send a confirmation message to. If an attacker\n has access to the session of another user (for example,\n if that user left their browser window open in a public\n place), the attacker could alter this field to cause\n the email-change notification to go to their own address. \n This means that the user would not be notified that his\n account had its email address changed by the attacker. \n\nCVE-2011-2381\n\n For flagmails only, attachment descriptions with a newline\n in them could lead to the injection of crafted headers in\n email notifications when an attachment flag is edited. \n\nCVE-2011-2379\n\n Bugzilla uses an alternate host for attachments when\n viewing them in raw format to prevent cross-site scripting\n attacks. \n\nCVE-2011-2380 CVE-201-2979\n\n Normally, a group name is confidential and is only visible\n to members of the group, and to non-members if the group\n is used in bugs. By crafting the URL when creating or\n editing a bug, it was possible to guess if a group existed\n or not, even for groups which weren\u0027t used in bugs and so\n which were supposed to remain confidential. \n\nFor the oldstable distribution (lenny), it has not been practical to\nbackport patches to fix these bugs. Users of bugzilla on lenny are \nstrongly advised to upgrade to the version in the squeeze distribution. \n\nFor the stable distribution (squeeze), these problems have been fixed in\nversion 3.6.2.0-4.4. \n\nFor the testing distribution (wheezy) and the unstable distribution (sid),\nthe bugzilla packages have been removed. \n\nWe recommend that you upgrade your bugzilla packages. \n\nFurther information about Debian Security Advisories, how to apply\nthese updates to your system and frequently asked questions can be\nfound at: http://www.debian.org/security/\n\nMailing list: debian-security-announce@lists.debian.org\n\n\n-----BEGIN PGP SIGNATURE-----\nVersion: GnuPG v1.4.11 (GNU/Linux)\n\niEYEARECAAYFAk6TGQMACgkQXm3vHE4uylrKoACgpP8nXm2Nj6cmEPNLL5n4VVqQ\ncMsAoNuj8KxXmA437xUP1NZqnJrbWwFD\n=kZIo\n-----END PGP SIGNATURE-----\n\n\n_______________________________________________\nFull-Disclosure - We believe in it. \nCharter: http://lists.grok.org.uk/full-disclosure-charter.html\nHosted and sponsored by Secunia - http://secunia.com/\n. ----------------------------------------------------------------------\n\nThe Secunia CSI 5.0 Beta - now available for testing\nFind out more, take a free test drive, and share your opinion with us: \nhttp://secunia.com/blog/242 \n\n----------------------------------------------------------------------\n\nTITLE:\nBugzilla Multiple Vulnerabilities\n\nSECUNIA ADVISORY ID:\nSA45501\n\nVERIFY ADVISORY:\nSecunia.com\nhttp://secunia.com/advisories/45501/\nCustomer Area (Credentials Required)\nhttps://ca.secunia.com/?page=viewadvisory\u0026vuln_id=45501\n\nRELEASE DATE:\n2011-08-05\n\nDISCUSS ADVISORY:\nhttp://secunia.com/advisories/45501/#comments\n\nAVAILABLE ON SITE AND IN CUSTOMER AREA:\n * Last Update\n * Popularity\n * Comments\n * Criticality Level\n * Impact\n * Where\n * Solution Status\n * Operating System / Software\n * CVE Reference(s)\n\nhttp://secunia.com/advisories/45501/\n\nONLY AVAILABLE IN CUSTOMER AREA:\n * Authentication Level\n * Report Reliability\n * Secunia PoC\n * Secunia Analysis\n * Systems Affected\n * Approve Distribution\n * Remediation Status\n * Secunia CVSS Score\n * CVSS\n\nhttps://ca.secunia.com/?page=viewadvisory\u0026vuln_id=45501\n\nONLY AVAILABLE WITH SECUNIA CSI AND SECUNIA PSI:\n * AUTOMATED SCANNING\n\nhttp://secunia.com/vulnerability_scanning/personal/\nhttp://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/\n\nDESCRIPTION:\nMultiple vulnerabilities have been reported in Bugzilla, which can be\nexploited by malicious, local users to gain access to potentially\nsensitive information and by malicious users to disclose potentially\nsensitive information, conduct script insertion and spoofing\nattacks. \n\n1) Input passed via patch attachments is not properly sanitised\nbefore being viewed in \"Raw Unified\" mode. This can be exploited to\ninsert arbitrary HTML and script code, which will be executed in a\nuser\u0027s browser session in context of an affected site when the\nmalicious data is being viewed. \n\nSuccessful exploitation of this vulnerability requires the victim to\nuse Internet Explorer or Safari browsers. \n\nSOLUTION:\nUpdate to version 3.4.12, 3.6.6, or 4.1.3 (please see the vendor\u0027s\nadvisory for details). \n\nPROVIDED AND/OR DISCOVERED BY:\nThe vendor provides a bundled list of credits:\nFr\\xe9d\\xe9ric Buclin\nByron Jones\nMax Kanat-Alexander\nReed Loden\nNeal Poole\nNeil Rashbrook\nDavid Lawrence\n\nORIGINAL ADVISORY:\nhttp://www.bugzilla.org/security/3.4.11/\n\nOTHER REFERENCES:\nFurther details available in Customer Area:\nhttp://secunia.com/vulnerability_intelligence/\n\nDEEP LINKS:\nFurther details available in Customer Area:\nhttp://secunia.com/vulnerability_intelligence/\n\nEXTENDED DESCRIPTION:\nFurther details available in Customer Area:\nhttp://secunia.com/vulnerability_intelligence/\n\nEXTENDED SOLUTION:\nFurther details available in Customer Area:\nhttp://secunia.com/vulnerability_intelligence/\n\nEXPLOIT:\nFurther details available in Customer Area:\nhttp://secunia.com/vulnerability_intelligence/\n\n----------------------------------------------------------------------\n\nAbout:\nThis Advisory was delivered by Secunia as a free service to help\nprivate users keeping their systems up to date against the latest\nvulnerabilities. \n\nSubscribe:\nhttp://secunia.com/advisories/secunia_security_advisories/\n\nDefinitions: (Criticality, Where etc.)\nhttp://secunia.com/advisories/about_secunia_advisories/\n\n\nPlease Note:\nSecunia recommends that you verify all advisories you receive by\nclicking the link. \nSecunia NEVER sends attached files with advisories. \nSecunia does not advise people to install third party patches, only\nuse those supplied by the vendor. \n\n----------------------------------------------------------------------\n\nUnsubscribe: Secunia Security Advisories\nhttp://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org\n\n----------------------------------------------------------------------\n\n\n. \n\nBackground\n==========\n\nBugzilla is the bug-tracking system from the Mozilla project. \n\nAffected packages\n=================\n\n -------------------------------------------------------------------\n Package / Vulnerable / Unaffected\n -------------------------------------------------------------------\n 1 www-apps/bugzilla \u003c 3.6.6 \u003e= 3.6.6\n\nDescription\n===========\n\nMultiple vulnerabilities have been discovered in Bugzilla. Please\nreview the CVE identifiers referenced below for details. \n\nImpact\n======\n\nA remote attacker could conduct cross-site scripting attacks, conduct\nscript insertion and spoofing attacks, hijack the authentication of\narbitrary users, inject arbitrary HTTP headers, obtain access to\narbitrary accounts, disclose the existence of confidential groups and\nits names, or inject arbitrary e-mail headers. \n\nA local attacker could disclose the contents of temporarfy files for\nuploaded attachments. \n\nWorkaround\n==========\n\nThere is no known workaround at this time. \n\nResolution\n==========\n\nAll Bugzilla users should upgrade to the latest version:\n\n # emerge --sync\n # emerge --ask --oneshot --verbose \"\u003e=www-apps/bugzilla-3.6.6\"\n\nNOTE: This is a legacy GLSA. Updates for all affected architectures are\navailable since August 27, 2011. It is likely that your system is\nalready no longer affected by this issue. \n\nReferences\n==========\n\n[ 1 ] CVE-2010-2761\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2761\n[ 2 ] CVE-2010-3172\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3172\n[ 3 ] CVE-2010-3764\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3764\n[ 4 ] CVE-2010-4411\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4411\n[ 5 ] CVE-2010-4567\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4567\n[ 6 ] CVE-2010-4568\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4568\n[ 7 ] CVE-2010-4569\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4569\n[ 8 ] CVE-2010-4570\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4570\n[ 9 ] CVE-2010-4572\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4572\n[ 10 ] CVE-2011-0046\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0046\n[ 11 ] CVE-2011-0048\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0048\n[ 12 ] CVE-2011-2379\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2379\n[ 13 ] CVE-2011-2380\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2380\n[ 14 ] CVE-2011-2381\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2381\n[ 15 ] CVE-2011-2976\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2976\n[ 16 ] CVE-2011-2977\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2977\n[ 17 ] CVE-2011-2978\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2978\n[ 18 ] CVE-2011-2979\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2979\n\nAvailability\n============\n\nThis GLSA and any updates to it are available for viewing at\nthe Gentoo Security Website:\n\n http://security.gentoo.org/glsa/glsa-21f5d5f72.xml\n\nConcerns?\n=========\n\nSecurity is a primary focus of Gentoo Linux and ensuring the\nconfidentiality and security of our users\u0027 machines is of utmost\nimportance to us. Any security concerns should be addressed to\nsecurity@gentoo.org or alternatively, you may file a bug at\nhttps://bugs.gentoo.org. \n\nLicense\n=======\n\nCopyright 2011 Gentoo Foundation, Inc; referenced text\nbelongs to its owner(s). \n\nThe contents of this document are licensed under the\nCreative Commons - Attribution / Share Alike license. \n\nhttp://creativecommons.org/licenses/by-sa/2.5\n\n\n\n",
"sources": [
{
"db": "NVD",
"id": "CVE-2011-2379"
},
{
"db": "JVNDB",
"id": "JVNDB-2011-004689"
},
{
"db": "BID",
"id": "49042"
},
{
"db": "VULHUB",
"id": "VHN-50324"
},
{
"db": "PACKETSTORM",
"id": "105648"
},
{
"db": "PACKETSTORM",
"id": "103748"
},
{
"db": "PACKETSTORM",
"id": "105651"
}
],
"trust": 2.25
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "NVD",
"id": "CVE-2011-2379",
"trust": 3.0
},
{
"db": "BID",
"id": "49042",
"trust": 2.0
},
{
"db": "SECUNIA",
"id": "45501",
"trust": 1.8
},
{
"db": "OSVDB",
"id": "74297",
"trust": 1.7
},
{
"db": "JVNDB",
"id": "JVNDB-2011-004689",
"trust": 0.8
},
{
"db": "CNNVD",
"id": "CNNVD-201108-111",
"trust": 0.7
},
{
"db": "VULHUB",
"id": "VHN-50324",
"trust": 0.1
},
{
"db": "PACKETSTORM",
"id": "105648",
"trust": 0.1
},
{
"db": "PACKETSTORM",
"id": "103748",
"trust": 0.1
},
{
"db": "PACKETSTORM",
"id": "105651",
"trust": 0.1
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-50324"
},
{
"db": "BID",
"id": "49042"
},
{
"db": "JVNDB",
"id": "JVNDB-2011-004689"
},
{
"db": "PACKETSTORM",
"id": "105648"
},
{
"db": "PACKETSTORM",
"id": "103748"
},
{
"db": "PACKETSTORM",
"id": "105651"
},
{
"db": "NVD",
"id": "CVE-2011-2379"
},
{
"db": "CNNVD",
"id": "CNNVD-201108-111"
}
]
},
"id": "VAR-201108-0186",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "VULHUB",
"id": "VHN-50324"
}
],
"trust": 0.01
},
"last_update_date": "2023-12-18T11:07:31.081000Z",
"patch": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/patch#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"title": "Safari",
"trust": 0.8,
"url": "http://www.apple.com/safari/"
},
{
"title": "Internet Explorer",
"trust": 0.8,
"url": "http://windows.microsoft.com/en-us/internet-explorer/products/ie/home"
},
{
"title": "Bug 637981",
"trust": 0.8,
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=637981"
},
{
"title": "4.1.2, 4.0.1, 3.6.5, and 3.4.11 Security Advisory",
"trust": 0.8,
"url": "http://www.bugzilla.org/security/3.4.11/"
},
{
"title": "Mozilla Bugzilla Raw Unified Remedial measures for pattern cross-site scripting vulnerabilities",
"trust": 0.6,
"url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=157614"
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2011-004689"
},
{
"db": "CNNVD",
"id": "CNNVD-201108-111"
}
]
},
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "CWE-79",
"trust": 1.9
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-50324"
},
{
"db": "JVNDB",
"id": "JVNDB-2011-004689"
},
{
"db": "NVD",
"id": "CVE-2011-2379"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 2.1,
"url": "http://www.bugzilla.org/security/3.4.11/"
},
{
"trust": 1.7,
"url": "http://www.securityfocus.com/bid/49042"
},
{
"trust": 1.7,
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=637981"
},
{
"trust": 1.7,
"url": "http://www.debian.org/security/2011/dsa-2322"
},
{
"trust": 1.7,
"url": "http://www.osvdb.org/74297"
},
{
"trust": 1.7,
"url": "http://secunia.com/advisories/45501"
},
{
"trust": 1.7,
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/69033"
},
{
"trust": 0.8,
"url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2011-2379"
},
{
"trust": 0.8,
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2011-2379"
},
{
"trust": 0.3,
"url": "http://www.bugzilla.org"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2010-4568"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2010-4572"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2011-0048"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2011-2380"
},
{
"trust": 0.1,
"url": "http://secunia.com/"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2010-4567"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2011-2381"
},
{
"trust": 0.1,
"url": "http://www.debian.org/security/faq"
},
{
"trust": 0.1,
"url": "http://www.debian.org/security/"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2011-2978"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2011-0046"
},
{
"trust": 0.1,
"url": "http://lists.grok.org.uk/full-disclosure-charter.html"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2011-2379"
},
{
"trust": 0.1,
"url": "https://ca.secunia.com/?page=viewadvisory\u0026vuln_id=45501"
},
{
"trust": 0.1,
"url": "http://secunia.com/vulnerability_intelligence/"
},
{
"trust": 0.1,
"url": "http://secunia.com/blog/242"
},
{
"trust": 0.1,
"url": "http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/"
},
{
"trust": 0.1,
"url": "http://secunia.com/advisories/secunia_security_advisories/"
},
{
"trust": 0.1,
"url": "http://secunia.com/vulnerability_scanning/personal/"
},
{
"trust": 0.1,
"url": "http://secunia.com/advisories/45501/"
},
{
"trust": 0.1,
"url": "http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org"
},
{
"trust": 0.1,
"url": "http://secunia.com/advisories/45501/#comments"
},
{
"trust": 0.1,
"url": "http://secunia.com/advisories/about_secunia_advisories/"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-4569"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-4572"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-2978"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-2976"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-2977"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-2979"
},
{
"trust": 0.1,
"url": "http://security.gentoo.org/glsa/glsa-21f5d5f72.xml"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-2380"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-3764"
},
{
"trust": 0.1,
"url": "http://creativecommons.org/licenses/by-sa/2.5"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-4411"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-0046"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-4570"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-2761"
},
{
"trust": 0.1,
"url": "http://security.gentoo.org/"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-3172"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-2381"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-4568"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-4567"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-0048"
},
{
"trust": 0.1,
"url": "https://bugs.gentoo.org."
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-2379"
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-50324"
},
{
"db": "BID",
"id": "49042"
},
{
"db": "JVNDB",
"id": "JVNDB-2011-004689"
},
{
"db": "PACKETSTORM",
"id": "105648"
},
{
"db": "PACKETSTORM",
"id": "103748"
},
{
"db": "PACKETSTORM",
"id": "105651"
},
{
"db": "NVD",
"id": "CVE-2011-2379"
},
{
"db": "CNNVD",
"id": "CNNVD-201108-111"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "VULHUB",
"id": "VHN-50324"
},
{
"db": "BID",
"id": "49042"
},
{
"db": "JVNDB",
"id": "JVNDB-2011-004689"
},
{
"db": "PACKETSTORM",
"id": "105648"
},
{
"db": "PACKETSTORM",
"id": "103748"
},
{
"db": "PACKETSTORM",
"id": "105651"
},
{
"db": "NVD",
"id": "CVE-2011-2379"
},
{
"db": "CNNVD",
"id": "CNNVD-201108-111"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2011-08-09T00:00:00",
"db": "VULHUB",
"id": "VHN-50324"
},
{
"date": "2011-08-05T00:00:00",
"db": "BID",
"id": "49042"
},
{
"date": "2012-03-27T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2011-004689"
},
{
"date": "2011-10-10T22:39:20",
"db": "PACKETSTORM",
"id": "105648"
},
{
"date": "2011-08-05T09:52:27",
"db": "PACKETSTORM",
"id": "103748"
},
{
"date": "2011-10-10T22:41:23",
"db": "PACKETSTORM",
"id": "105651"
},
{
"date": "2011-08-09T19:55:01.433000",
"db": "NVD",
"id": "CVE-2011-2379"
},
{
"date": "2011-08-09T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201108-111"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2017-08-29T00:00:00",
"db": "VULHUB",
"id": "VHN-50324"
},
{
"date": "2015-05-07T17:06:00",
"db": "BID",
"id": "49042"
},
{
"date": "2012-03-27T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2011-004689"
},
{
"date": "2021-07-23T15:12:30.843000",
"db": "NVD",
"id": "CVE-2011-2379"
},
{
"date": "2021-07-26T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201108-111"
}
]
},
"threat_type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/threat_type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "remote",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201108-111"
}
],
"trust": 0.6
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Bugzilla Vulnerable to cross-site scripting",
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2011-004689"
}
],
"trust": 0.8
},
"type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "XSS",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201108-111"
}
],
"trust": 0.6
}
}
FKIE_CVE-2018-5123
Vulnerability from fkie_nvd - Published: 2019-04-29 16:29 - Updated: 2024-11-21 04:08| URL | Tags | ||
|---|---|---|---|
| security@mozilla.org | https://bugzilla.mozilla.org/show_bug.cgi?id=CVE-2018-5123 | Exploit, Issue Tracking, Patch, Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://bugzilla.mozilla.org/show_bug.cgi?id=CVE-2018-5123 | Exploit, Issue Tracking, Patch, Vendor Advisory |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:*:*:*:*:*:*:*:*",
"matchCriteriaId": "7530C9E5-4269-4278-9979-6BF498923E30",
"versionEndExcluding": "4.4",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A third party website can access information available to a user with access to a restricted bug entry using the image generation in report.cgi in all Bugzilla versions prior to 4.4."
},
{
"lang": "es",
"value": "Un sitio web de terceros puede acceder a la informaci\u00f3n disponible para un usuario con acceso a una entrada de fallo restringida, utilizando la generaci\u00f3n de im\u00e1genes en report.cgi en todas las versiones de Bugzilla anteriores a la 4.4."
}
],
"id": "CVE-2018-5123",
"lastModified": "2024-11-21T04:08:09.337",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": true
}
],
"cvssMetricV30": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2019-04-29T16:29:00.267",
"references": [
{
"source": "security@mozilla.org",
"tags": [
"Exploit",
"Issue Tracking",
"Patch",
"Vendor Advisory"
],
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=CVE-2018-5123"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Patch",
"Vendor Advisory"
],
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=CVE-2018-5123"
}
],
"sourceIdentifier": "security@mozilla.org",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-352"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
FKIE_CVE-2016-2803
Vulnerability from fkie_nvd - Published: 2017-04-12 22:59 - Updated: 2025-04-20 01:37| URL | Tags | ||
|---|---|---|---|
| security@mozilla.org | http://packetstormsecurity.com/files/137079/Bugzilla-4.4.11-5.0.2-Summary-Cross-Site-Scripting.html | Third Party Advisory, VDB Entry | |
| security@mozilla.org | http://www.securityfocus.com/archive/1/538401/100/0/threaded | ||
| security@mozilla.org | http://www.securitytracker.com/id/1035891 | Third Party Advisory, VDB Entry | |
| security@mozilla.org | https://www.bugzilla.org/security/4.4.11/ | Issue Tracking, Third Party Advisory, VDB Entry | |
| af854a3a-2127-422b-91ae-364da2661108 | http://packetstormsecurity.com/files/137079/Bugzilla-4.4.11-5.0.2-Summary-Cross-Site-Scripting.html | Third Party Advisory, VDB Entry | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/archive/1/538401/100/0/threaded | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.securitytracker.com/id/1035891 | Third Party Advisory, VDB Entry | |
| af854a3a-2127-422b-91ae-364da2661108 | https://www.bugzilla.org/security/4.4.11/ | Issue Tracking, Third Party Advisory, VDB Entry |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.2:*:*:*:*:*:*:*",
"matchCriteriaId": "DAFEF951-3FE8-49DD-B3DD-E526D5B52998",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.4:*:*:*:*:*:*:*",
"matchCriteriaId": "8112FF13-B4CE-4DC7-85B1-C69D975F162B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.6:*:*:*:*:*:*:*",
"matchCriteriaId": "86F5A3CA-E4A6-4E51-AC83-0C8F3E5E2C4E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.8:*:*:*:*:*:*:*",
"matchCriteriaId": "F6E5E379-D475-42F3-B0DC-3D04C1D25566",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.9:*:*:*:*:*:*:*",
"matchCriteriaId": "A3B3EF74-4784-47A7-8994-21EF489F4008",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.16:rc1:*:*:*:*:*:*",
"matchCriteriaId": "5877CECA-F758-4F48-B4F4-2C4C1DF01FA0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.16:rc2:*:*:*:*:*:*",
"matchCriteriaId": "D63CE086-5872-4594-8F4B-8D812E7EF09C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.16.1:*:*:*:*:*:*:*",
"matchCriteriaId": "19F19219-3AFD-4D8E-B02B-BFCBD1BC7C36",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.16.2:*:*:*:*:*:*:*",
"matchCriteriaId": "B900D9A7-913A-4176-90CF-C7C3B09A4261",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.16.3:*:*:*:*:*:*:*",
"matchCriteriaId": "B692910E-633D-4A88-B245-56A2B58DD4CB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.16.4:*:*:*:*:*:*:*",
"matchCriteriaId": "F86EE5DB-442B-4C78-8152-AF1048C6A974",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.16.5:*:*:*:*:*:*:*",
"matchCriteriaId": "19B82A1A-56EB-41D5-8619-2A717E3A6ECF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.16.6:*:*:*:*:*:*:*",
"matchCriteriaId": "83A0406C-AAF2-4A4C-9567-E21DF1B6C46E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.16.7:*:*:*:*:*:*:*",
"matchCriteriaId": "64434BFC-DDC0-4C7D-B578-472B0610C89E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.16.8:*:*:*:*:*:*:*",
"matchCriteriaId": "A30F28D9-B000-4C26-A911-5E1B8A867BF6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.16.9:*:*:*:*:*:*:*",
"matchCriteriaId": "4A123F78-A671-4FB5-AE78-83762E9323C7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.16.10:*:*:*:*:*:*:*",
"matchCriteriaId": "28C34288-A326-4B71-99B0-DA9FFD28160F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.16.11:*:*:*:*:*:*:*",
"matchCriteriaId": "73648879-BB08-4BE4-A7FF-1E8DF4E264B4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.16_rc2:*:*:*:*:*:*:*",
"matchCriteriaId": "1B4CC7E4-617D-498E-A367-374478158FA5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.17:*:*:*:*:*:*:*",
"matchCriteriaId": "9B2FC5C7-B218-4B87-9805-F90AC0E7A281",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.17.1:*:*:*:*:*:*:*",
"matchCriteriaId": "BBCDA64F-C49A-4F5B-B285-4079D8E3A499",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.17.2:*:*:*:*:*:*:*",
"matchCriteriaId": "930AF809-CA52-41CB-985A-066B8239C7CD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.17.3:*:*:*:*:*:*:*",
"matchCriteriaId": "85ED3457-CC21-4DB3-931F-677F723E1B2A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.17.4:*:*:*:*:*:*:*",
"matchCriteriaId": "6C8711D3-55CF-4131-BBAC-6BE07068219F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.17.5:*:*:*:*:*:*:*",
"matchCriteriaId": "DF54FFA5-5177-46E6-9AFA-BA3345C16E8A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.17.6:*:*:*:*:*:*:*",
"matchCriteriaId": "69D7EA7C-B401-4F5A-AC08-2199DD117403",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.17.7:*:*:*:*:*:*:*",
"matchCriteriaId": "DC2DDC7C-CD2B-4597-A5E0-266A884958FC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.18:*:*:*:*:*:*:*",
"matchCriteriaId": "DDB99B2D-CA05-4BC0-BCA4-9B94DF248333",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.18:rc1:*:*:*:*:*:*",
"matchCriteriaId": "3635C0E9-2E43-4BAE-8267-2BB2F68B03BD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.18:rc2:*:*:*:*:*:*",
"matchCriteriaId": "4869A709-AF79-49BD-A7D2-D48A8D79A085",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.18:rc3:*:*:*:*:*:*",
"matchCriteriaId": "EAC72143-27C3-498F-AFAB-98AE043C0545",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.18.1:*:*:*:*:*:*:*",
"matchCriteriaId": "BE5E8E72-D493-460D-B5A0-F90C291398A5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.18.2:*:*:*:*:*:*:*",
"matchCriteriaId": "04885D31-09F3-455F-A1A9-815E182ABCF9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.18.3:*:*:*:*:*:*:*",
"matchCriteriaId": "F153300E-42CC-4BDD-88EC-E8A0ADB4E3B7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.18.4:*:*:*:*:*:*:*",
"matchCriteriaId": "92BCD546-2A50-4F43-935C-B68459EE894E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.18.5:*:*:*:*:*:*:*",
"matchCriteriaId": "C535BAB7-6146-440B-ADBD-51007585CFC8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.18.6:*:*:*:*:*:*:*",
"matchCriteriaId": "7B6BA7E8-DEC7-4D94-B9F9-B70EC39FD892",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.18.6\\+:*:*:*:*:*:*:*",
"matchCriteriaId": "15E6F17A-7292-4640-A5E6-59865D1CDD7B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.18.7:*:*:*:*:*:*:*",
"matchCriteriaId": "E9130B6B-764B-4B83-A2BD-E16013682875",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.18.8:*:*:*:*:*:*:*",
"matchCriteriaId": "7C7A5111-8729-48DF-B308-7A489BEFA6D0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.18.9:*:*:*:*:*:*:*",
"matchCriteriaId": "15E24C39-0E61-4A57-B93F-F0ABF4CEAEEB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.19:*:*:*:*:*:*:*",
"matchCriteriaId": "725BD7BE-1769-4032-ADA8-9ED15528C770",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.19.1:*:*:*:*:*:*:*",
"matchCriteriaId": "239D70F4-7D86-4A57-ACEF-440F68994FB6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.19.2:*:*:*:*:*:*:*",
"matchCriteriaId": "ABEE2C94-DA69-4A78-A15F-538383A7460E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.19.3:*:*:*:*:*:*:*",
"matchCriteriaId": "4F7CD64E-7FAA-40DC-B36E-8B7EB9D620FB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.20:*:*:*:*:*:*:*",
"matchCriteriaId": "A749C7AB-6F60-469C-BD95-759205DDA345",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.20:rc1:*:*:*:*:*:*",
"matchCriteriaId": "B45F6C27-D89A-42A0-A304-5B0C57D2A9F1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.20:rc2:*:*:*:*:*:*",
"matchCriteriaId": "196B7CD8-D721-4CFB-B126-78758128E900",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.20.1:*:*:*:*:*:*:*",
"matchCriteriaId": "BEA9DE63-9951-4FE0-80BE-0F6F197303D7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.20.2:*:*:*:*:*:*:*",
"matchCriteriaId": "B0CEDD02-1CB8-4D5B-B82B-E300B4E39065",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.20.3:*:*:*:*:*:*:*",
"matchCriteriaId": "8E27101B-7985-4412-A14F-9ED11E4C874C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.20.4:*:*:*:*:*:*:*",
"matchCriteriaId": "8A74E8A2-223E-4877-989E-494362B513E9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.20.5:*:*:*:*:*:*:*",
"matchCriteriaId": "E0CAFB45-B115-4492-9919-60223304BB27",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.20.6:*:*:*:*:*:*:*",
"matchCriteriaId": "DC3F7C44-C734-419B-AB62-3AD52554FC7D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.20.7:*:*:*:*:*:*:*",
"matchCriteriaId": "695036D1-994C-451E-8D53-0A345702E4D1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.21:*:*:*:*:*:*:*",
"matchCriteriaId": "2053CFB4-602E-4141-BB3D-A440E2A31D85",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.21.1:*:*:*:*:*:*:*",
"matchCriteriaId": "31ACBA13-AC13-4469-862F-B3DD2327B6FC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.21.2:*:*:*:*:*:*:*",
"matchCriteriaId": "9E9EC243-3E25-4234-A88A-FDD5B594BFBA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.21.2:rc1:*:*:*:*:*:*",
"matchCriteriaId": "AE0570E9-B967-4325-92CB-2FB6CA010C4F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.22:*:*:*:*:*:*:*",
"matchCriteriaId": "F2969731-8256-431B-9356-4BC873D98F6D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.22:rc1:*:*:*:*:*:*",
"matchCriteriaId": "1C166E42-9B36-4883-B738-EEBEF3056D98",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.22.1:*:*:*:*:*:*:*",
"matchCriteriaId": "E5177876-0FEC-481B-815F-84AF53968644",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.22.2:*:*:*:*:*:*:*",
"matchCriteriaId": "BC38566A-07F1-4F21-BAC1-259F844DC15C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.22.3:*:*:*:*:*:*:*",
"matchCriteriaId": "AE1684B8-3060-4139-BC06-707F27A05958",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.22.4:*:*:*:*:*:*:*",
"matchCriteriaId": "FF32C74C-3EA3-4E1F-BADA-BB4A92068266",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.22.5:*:*:*:*:*:*:*",
"matchCriteriaId": "D569A750-C649-4D40-89AB-D29773E66F66",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.22.6:*:*:*:*:*:*:*",
"matchCriteriaId": "95B69FA8-1182-46F1-952F-4610288ED409",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.22.7:*:*:*:*:*:*:*",
"matchCriteriaId": "5716BB97-7829-4FDE-92AC-69CA10332F45",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.23:*:*:*:*:*:*:*",
"matchCriteriaId": "02846865-D124-4C72-85C8-59A7C6F43E2E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.23.1:*:*:*:*:*:*:*",
"matchCriteriaId": "99B59422-ED6E-4F82-8D0C-091058D1C438",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.23.2:*:*:*:*:*:*:*",
"matchCriteriaId": "F658844A-6253-4A18-8A5D-1E818BE7A367",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.23.3:*:*:*:*:*:*:*",
"matchCriteriaId": "4753AB35-B95C-4544-A874-5E6D83929AC1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.23.4:*:*:*:*:*:*:*",
"matchCriteriaId": "C4880D54-CA42-4CCA-B01E-2C125002BF5C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.0:*:*:*:*:*:*:*",
"matchCriteriaId": "D4D9F54A-15A7-4899-B695-D9D8B96C4A9B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.0:rc1:*:*:*:*:*:*",
"matchCriteriaId": "BD56D9C0-38C6-4679-8104-1A0B88B71C0E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "45C36666-518F-4956-816A-940930425955",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "FF2DF96F-E45E-45AF-85E5-E939F923EC1B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "80EBAA09-F2C8-445E-8E3A-B5F937E1B1E2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.0.3:*:*:*:*:*:*:*",
"matchCriteriaId": "11C6713F-01ED-4AE9-AE42-89926067E6E6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.0.4:*:*:*:*:*:*:*",
"matchCriteriaId": "7AB5010D-37A3-4B6E-92B6-6F41A3708851",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.0.5:*:*:*:*:*:*:*",
"matchCriteriaId": "EEB09719-122F-4D25-B680-18029D5D9DE9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.0.6:*:*:*:*:*:*:*",
"matchCriteriaId": "AF585D92-9FAF-4858-A956-68AF77227333",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.0.7:*:*:*:*:*:*:*",
"matchCriteriaId": "7BA67823-C9D9-4C5B-A4ED-669E6F1851C0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.0.8:*:*:*:*:*:*:*",
"matchCriteriaId": "CB0F7531-A660-4604-80BD-15B01E2916BD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.0.9:*:*:*:*:*:*:*",
"matchCriteriaId": "A6FE6868-BB9F-4EB8-9E37-3438559CB01B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.0.10:*:*:*:*:*:*:*",
"matchCriteriaId": "1EC90352-C94A-4F47-AFB7-713B547373CC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.0.11:*:*:*:*:*:*:*",
"matchCriteriaId": "E5E77E01-D779-482A-9FAC-4AC210B68771",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.0_rc1:*:*:*:*:*:*:*",
"matchCriteriaId": "5E608E27-D43C-4F34-952D-2F49A71B1E2B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "154EA18F-534C-4095-837D-BB9865D25F23",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "585F05F2-B294-4218-9209-C487B4D2994B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.1.2:*:*:*:*:*:*:*",
"matchCriteriaId": "F3246890-8D66-474F-AC9C-BC556426467D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.1.3:*:*:*:*:*:*:*",
"matchCriteriaId": "7090332F-4CC2-4ADD-AEEC-75238BCA55CC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.1.4:*:*:*:*:*:*:*",
"matchCriteriaId": "F960BE59-05B1-4438-A854-279612E13A7B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.2:*:*:*:*:*:*:*",
"matchCriteriaId": "F248EA4D-1A39-40FD-8D3C-9701D36FD6B1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.2:rc1:*:*:*:*:*:*",
"matchCriteriaId": "170EB43B-9488-4E25-9401-B84DE838247B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.2:rc2:*:*:*:*:*:*",
"matchCriteriaId": "B1ED7682-A315-4F92-9F9F-38290BCC058E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.2.1:*:*:*:*:*:*:*",
"matchCriteriaId": "14B5A433-526F-436E-9FCD-B71E661180FD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.2.2:*:*:*:*:*:*:*",
"matchCriteriaId": "48EDC5BC-AD4B-4E67-B79C-F44292307AB4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.2.3:*:*:*:*:*:*:*",
"matchCriteriaId": "6FEC62B7-2CAA-4A0D-A9B2-B4A6B105A6F7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.2.4:*:*:*:*:*:*:*",
"matchCriteriaId": "4B4A7A67-1355-4648-B8C9-3231BED96547",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.2.5:*:*:*:*:*:*:*",
"matchCriteriaId": "442AB3EE-61DF-4B25-ABEB-55905C01E376",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.2.6:*:*:*:*:*:*:*",
"matchCriteriaId": "7F825E34-D529-4ADC-A7D6-1BD9DAE86FC1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.2.7:*:*:*:*:*:*:*",
"matchCriteriaId": "C1F92D0C-AF71-4FD3-BC4B-C6D0F1F84F9B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.2.8:*:*:*:*:*:*:*",
"matchCriteriaId": "CBC26020-BFD7-493B-BDE2-1EC8DEA1A6DA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.2.9:*:*:*:*:*:*:*",
"matchCriteriaId": "984463B4-00A8-423B-B0C5-A7C4FECF064C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.2.10:*:*:*:*:*:*:*",
"matchCriteriaId": "6C7DC534-FF77-414C-A1DC-945F508CC3C9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.3:*:*:*:*:*:*:*",
"matchCriteriaId": "BEB4EF1D-D4D0-40DA-BE78-24FD48030EE0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.3.1:*:*:*:*:*:*:*",
"matchCriteriaId": "B2962084-F778-4574-8105-8C5A260CCBD7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.3.2:*:*:*:*:*:*:*",
"matchCriteriaId": "FF288A74-070E-4EB4-BB92-7D4D41635DD1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.3.3:*:*:*:*:*:*:*",
"matchCriteriaId": "5B8B31F0-6FCC-4258-865B-B65ECBFAF252",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.3.4:*:*:*:*:*:*:*",
"matchCriteriaId": "7A0CCF96-777F-4CEE-BC04-2974663CF5E7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.4:*:*:*:*:*:*:*",
"matchCriteriaId": "D6A71919-DC70-4AE2-9D16-76A177DAE331",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.4:rc1:*:*:*:*:*:*",
"matchCriteriaId": "780896D3-3B49-486F-A136-D3D175C00A34",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.4.1:*:*:*:*:*:*:*",
"matchCriteriaId": "EA43E47B-F474-4F5B-A91B-9AF99359FE5F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.4.2:*:*:*:*:*:*:*",
"matchCriteriaId": "A7A3A453-EE50-458C-8F31-D7AA232006FC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.4.3:*:*:*:*:*:*:*",
"matchCriteriaId": "3D920D39-683D-4F9F-AA85-3C4D1600DAD6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.4.4:*:*:*:*:*:*:*",
"matchCriteriaId": "E7A4F1FD-2B00-4A99-AAA1-DBBFE3748D87",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.4.5:*:*:*:*:*:*:*",
"matchCriteriaId": "EF6A3C0F-8778-4236-B4DC-41DBCF43EB62",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.4.6:*:*:*:*:*:*:*",
"matchCriteriaId": "7D134D4D-6A95-48FE-B8E5-4F90692CB4FD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.4.7:*:*:*:*:*:*:*",
"matchCriteriaId": "08C34E6F-8233-4575-AAE7-4DBFC27453F8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.4.8:*:*:*:*:*:*:*",
"matchCriteriaId": "6D8155F8-CAB1-4EED-B576-F4102253BD25",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.4.9:*:*:*:*:*:*:*",
"matchCriteriaId": "593D2F3B-A386-48D8-BF19-A12F1B4962A6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.4.10:*:*:*:*:*:*:*",
"matchCriteriaId": "F37C651D-8989-478B-A991-654FCDEC8B1D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.4.11:*:*:*:*:*:*:*",
"matchCriteriaId": "AE170AE5-37F5-4750-ACD9-13CA691A80C5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.4.12:*:*:*:*:*:*:*",
"matchCriteriaId": "1DE75B2F-A183-4ED9-A9E9-7ADF54C341FF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.4.13:*:*:*:*:*:*:*",
"matchCriteriaId": "A4D7380C-5608-4F96-82E3-4B36CDCD71EC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.4.14:*:*:*:*:*:*:*",
"matchCriteriaId": "4BC4AB19-CA33-4C58-A305-E970EEACEBAC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.5:*:*:*:*:*:*:*",
"matchCriteriaId": "850ADB66-21F2-49CB-B105-BDA16A286CFC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.5.1:*:*:*:*:*:*:*",
"matchCriteriaId": "1907D4D0-9D6E-476E-BD1A-88A32D3EFE38",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.5.2:*:*:*:*:*:*:*",
"matchCriteriaId": "61DD0779-786E-4714-AA73-86FB19E26028",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.5.3:*:*:*:*:*:*:*",
"matchCriteriaId": "A8E8DD97-5799-465D-8B99-F2BD6AA681AB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.6:*:*:*:*:*:*:*",
"matchCriteriaId": "03E40C09-0696-45BC-9AE8-9F6F20964600",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.6:rc1:*:*:*:*:*:*",
"matchCriteriaId": "397E07B5-3D9D-44C7-B8B3-18D04EE84405",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.6.0:*:*:*:*:*:*:*",
"matchCriteriaId": "4A1AD503-7F78-4597-AECD-6DC530AD4D3C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.6.1:*:*:*:*:*:*:*",
"matchCriteriaId": "BCAD5285-E485-4F49-99CF-287545260FDD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.6.2:*:*:*:*:*:*:*",
"matchCriteriaId": "5C193DF3-8D23-44A9-94DE-9F4F7358ED3F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.6.3:*:*:*:*:*:*:*",
"matchCriteriaId": "80BA8C84-32C3-4ECF-B4C7-573B12441D22",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.6.4:*:*:*:*:*:*:*",
"matchCriteriaId": "820EC9F1-B66C-43CE-B254-145F4AC23083",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.6.5:*:*:*:*:*:*:*",
"matchCriteriaId": "C4BDA6DC-8D53-417D-8320-CE266F8607B7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.6.6:*:*:*:*:*:*:*",
"matchCriteriaId": "5B01E0D5-3F26-4A71-A22C-FAD7CBF47283",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.6.7:*:*:*:*:*:*:*",
"matchCriteriaId": "6C33D8DA-86A4-4A70-82F8-27D5DE3881EA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.6.8:*:*:*:*:*:*:*",
"matchCriteriaId": "884D0728-8E3C-47F3-9DDD-FA976E1553EB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.6.9:*:*:*:*:*:*:*",
"matchCriteriaId": "C47C594A-D3B6-44FD-93D7-7E69212050BF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.6.10:*:*:*:*:*:*:*",
"matchCriteriaId": "551303CA-63C5-4A3A-9280-ADB2B77C05F7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.6.11:*:*:*:*:*:*:*",
"matchCriteriaId": "0777EB93-D11C-4837-BB7F-96DEC716E1BB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.6.12:*:*:*:*:*:*:*",
"matchCriteriaId": "10FFAD30-56A0-40C8-AE70-70DD9904C528",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.6.13:*:*:*:*:*:*:*",
"matchCriteriaId": "3620DE78-AF48-44EC-B211-E0C26F4E951F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.7:*:*:*:*:*:*:*",
"matchCriteriaId": "2757B2A7-5232-4245-9CC6-91BF9E3ECA09",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.7.1:*:*:*:*:*:*:*",
"matchCriteriaId": "740ADCB7-B296-4728-A73A-9691265B8F07",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.7.2:*:*:*:*:*:*:*",
"matchCriteriaId": "6187C92D-FEE9-4B1B-B7ED-9A1DD360B204",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.7.3:*:*:*:*:*:*:*",
"matchCriteriaId": "71213AF6-48CC-469F-9FBA-CAF1D3237657",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:4.0:*:*:*:*:*:*:*",
"matchCriteriaId": "DABC1683-0E04-456E-9500-68D0D35815E6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:4.0:rc1:*:*:*:*:*:*",
"matchCriteriaId": "38D71912-DCD6-44BB-8A86-72D207B49E58",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:4.0:rc2:*:*:*:*:*:*",
"matchCriteriaId": "D5A8816A-84EE-44B0-AD3B-5C9BC9B3E71E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:4.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "A367BFF0-397D-416F-960C-602E8B66421A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:4.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "A6229B76-3EB0-45D9-9667-7E94D0880AE7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:4.0.3:*:*:*:*:*:*:*",
"matchCriteriaId": "4FCD8B47-9BF6-4F3E-AF88-0416BE31EC65",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:4.0.4:*:*:*:*:*:*:*",
"matchCriteriaId": "C8D0ED4E-F1A7-43B7-B9D2-D6D6AA145459",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:4.0.5:*:*:*:*:*:*:*",
"matchCriteriaId": "93FE2861-A397-4439-9BB8-7B67D7F9D211",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:4.0.6:*:*:*:*:*:*:*",
"matchCriteriaId": "3AF08887-66BF-4B3C-81E9-F8443E7D3285",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:4.0.7:*:*:*:*:*:*:*",
"matchCriteriaId": "D2D243D2-0FD9-45E5-BE52-A2956F587122",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:4.0.8:*:*:*:*:*:*:*",
"matchCriteriaId": "6038EF72-2CDC-42A1-A20A-B23459776E21",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:4.0.9:*:*:*:*:*:*:*",
"matchCriteriaId": "66959932-AB8A-43C7-83CE-07EE576BF2F6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:4.0.10:*:*:*:*:*:*:*",
"matchCriteriaId": "145D0FF7-1691-4A73-95FA-284A9EF79F65",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:4.0.11:*:*:*:*:*:*:*",
"matchCriteriaId": "A9C9A0A8-139B-469D-ABE8-2724D65F7EAA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:4.0.12:*:*:*:*:*:*:*",
"matchCriteriaId": "4A54C2C7-AA44-46E9-BF03-E00018084093",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:4.0.13:*:*:*:*:*:*:*",
"matchCriteriaId": "BECED922-3748-4534-9750-3A061B939A0B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:4.0.14:*:*:*:*:*:*:*",
"matchCriteriaId": "A8A5E5C6-AF2D-4C31-B422-63D0182EC21B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:4.0.15:*:*:*:*:*:*:*",
"matchCriteriaId": "E5487227-FD2D-45BE-B4AE-57BD25FF9260",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:4.0.16:*:*:*:*:*:*:*",
"matchCriteriaId": "9BF3A2DE-4E15-45E8-956E-B3368DBC4ED6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:4.0.17:*:*:*:*:*:*:*",
"matchCriteriaId": "710E220C-7E70-425D-B15C-945C35A65C92",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:4.0.18:*:*:*:*:*:*:*",
"matchCriteriaId": "F6DE24FD-5C6B-4B5E-A5F0-AED448F1BA98",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:4.1:*:*:*:*:*:*:*",
"matchCriteriaId": "85CDC579-6967-4E5C-B716-B2BC04F6DBF2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:4.1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "27783033-F558-427C-89A7-C3638C57F2A0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:4.1.2:*:*:*:*:*:*:*",
"matchCriteriaId": "E91557C7-8C53-49C4-8BC5-7F86D4AA09B8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:4.1.3:*:*:*:*:*:*:*",
"matchCriteriaId": "50448355-F1D3-48AB-AED0-5FE027D7C199",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:4.2:*:*:*:*:*:*:*",
"matchCriteriaId": "7CE9B4E3-8044-4305-A517-E695D0831355",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:4.2:rc1:*:*:*:*:*:*",
"matchCriteriaId": "4BDA28D1-5B26-4FBA-B685-C230569AF024",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:4.2:rc2:*:*:*:*:*:*",
"matchCriteriaId": "F61B90BF-3548-4D3A-BF70-A9DC96C11775",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:4.2.1:*:*:*:*:*:*:*",
"matchCriteriaId": "AD204F45-15FE-4677-BC4C-A53F322A3B15",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:4.2.2:*:*:*:*:*:*:*",
"matchCriteriaId": "22FAFCDF-C615-4958-9C6D-E74EC11E9A62",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:4.2.3:*:*:*:*:*:*:*",
"matchCriteriaId": "4D623AEB-622E-470E-898C-A447F9C4066A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:4.2.4:*:*:*:*:*:*:*",
"matchCriteriaId": "9019921A-B8D2-4774-AB6B-673FC2FD2197",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:4.2.5:*:*:*:*:*:*:*",
"matchCriteriaId": "1DC1A059-DDE4-4442-BD90-20AB3CE0E1CC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:4.2.6:*:*:*:*:*:*:*",
"matchCriteriaId": "4801DB4A-F828-4E95-8619-F909D5D39524",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:4.2.7:*:*:*:*:*:*:*",
"matchCriteriaId": "1E0D48CD-C77A-4D86-B091-2B8DF3ADA6D7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:4.2.8:*:*:*:*:*:*:*",
"matchCriteriaId": "956C5C97-E7A8-49F2-8AC6-9570A5948395",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:4.2.9:*:*:*:*:*:*:*",
"matchCriteriaId": "281A3D1A-1F92-454D-AE09-522114FF9D8D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:4.2.10:*:*:*:*:*:*:*",
"matchCriteriaId": "717B879A-EDEA-4917-A75E-2C40BB8D35D7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:4.2.11:*:*:*:*:*:*:*",
"matchCriteriaId": "F874FD21-1D5D-4F0F-BEE1-93229AA3E8A6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:4.2.12:*:*:*:*:*:*:*",
"matchCriteriaId": "62B10FC3-30EC-46C7-9324-D91127647809",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:4.2.13:*:*:*:*:*:*:*",
"matchCriteriaId": "E2F9B052-F50C-41E0-B4B5-A5A4A5B3CE5D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:4.2.14:*:*:*:*:*:*:*",
"matchCriteriaId": "56AB0583-0DE5-4229-9D35-6C3539341C3F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:4.2.15:*:*:*:*:*:*:*",
"matchCriteriaId": "FCF64AD5-022B-45AA-BE9E-D4457F7824BC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:4.3:*:*:*:*:*:*:*",
"matchCriteriaId": "F119CA93-4D32-4852-90AD-A23215D6CBAC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:4.3.1:*:*:*:*:*:*:*",
"matchCriteriaId": "6CA9A1C4-412D-4EED-8259-04F48322238B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:4.3.2:*:*:*:*:*:*:*",
"matchCriteriaId": "27847E43-22AD-468D-8E64-8D56EA8CBE50",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:4.3.3:*:*:*:*:*:*:*",
"matchCriteriaId": "8DBB66FA-6E99-4F08-A223-6070E193B869",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:4.4:-:*:*:*:*:*:*",
"matchCriteriaId": "4ED67179-EEEB-488A-BD1C-9AE336D16AB5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:4.4:rc1:*:*:*:*:*:*",
"matchCriteriaId": "FF326273-99CF-40C3-B112-F5F18C94978F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:4.4:rc2:*:*:*:*:*:*",
"matchCriteriaId": "ECED66BE-C877-4250-AC7A-FAEAD9DAAC31",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:4.4.1:*:*:*:*:*:*:*",
"matchCriteriaId": "9FFFD96D-D0B5-47BB-91D9-3736E343711E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:4.4.2:*:*:*:*:*:*:*",
"matchCriteriaId": "4D710732-6D93-4143-874F-81B19F70FBEF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:4.4.3:*:*:*:*:*:*:*",
"matchCriteriaId": "FD56846F-40B5-4A45-99DB-44C56E3A20A3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:4.4.4:*:*:*:*:*:*:*",
"matchCriteriaId": "32C22A06-5F01-4C6A-886F-E3C0776C3C5B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:4.4.5:*:*:*:*:*:*:*",
"matchCriteriaId": "6457398E-A1C9-4F72-BBF7-FC54118FA91C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:4.4.6:*:*:*:*:*:*:*",
"matchCriteriaId": "47FF50AB-7156-4828-A6B5-6E7AF5152561",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:4.4.7:*:*:*:*:*:*:*",
"matchCriteriaId": "196B21CA-0EC5-4590-A584-01D667E31FD5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:4.4.8:*:*:*:*:*:*:*",
"matchCriteriaId": "A07C2A67-6D87-4451-BDCE-9570508386E8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:4.4.9:*:*:*:*:*:*:*",
"matchCriteriaId": "B1D189FB-9322-4E74-9B9E-26F0B3A235F9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:4.4.10:*:*:*:*:*:*:*",
"matchCriteriaId": "0EED9ABC-56B6-4953-B28A-394E6DF66990",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:4.4.11:*:*:*:*:*:*:*",
"matchCriteriaId": "D0350202-3B8D-4EFE-9B91-B948ED2EB866",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:4.5.1:*:*:*:*:*:*:*",
"matchCriteriaId": "E86608A6-8B14-4D27-A86B-1DD10E1F7825",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:4.5.2:*:*:*:*:*:*:*",
"matchCriteriaId": "D7F176CD-2EE5-4C7D-A376-4EA8918610C3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:4.5.3:*:*:*:*:*:*:*",
"matchCriteriaId": "0BD5F23A-33EC-4D8A-B39D-972A048DAB0A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:4.5.4:*:*:*:*:*:*:*",
"matchCriteriaId": "D1F3C39E-50A1-4005-AC0B-097A1FA6E1C2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:4.5.5:*:*:*:*:*:*:*",
"matchCriteriaId": "47A322B9-DA3A-448C-BD61-3E67A98AC74E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:4.5.6:*:*:*:*:*:*:*",
"matchCriteriaId": "482DEB13-B194-4D5E-9C5A-E1502108741C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:5.0:*:*:*:*:*:*:*",
"matchCriteriaId": "8925480C-C23F-42B6-A525-FC49E6936F9E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:5.0:rc1:*:*:*:*:*:*",
"matchCriteriaId": "E6B372E9-2014-4777-BC2F-FDF0E7A2E42C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:5.0:rc2:*:*:*:*:*:*",
"matchCriteriaId": "83D06F5D-5A48-46FB-9720-4E97544FE57E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:5.0:rc3:*:*:*:*:*:*",
"matchCriteriaId": "F5D2830A-8910-4EB0-A079-D0598565E302",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:5.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "219D0E4C-222E-407F-BF4D-DD509DEFA22F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:5.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "36480825-8A6D-4E81-8B5F-835923EB39B5",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Cross-site scripting (XSS) vulnerability in the dependency graphs in Bugzilla 2.16rc1 through 4.4.11, and 4.5.1 through 5.0.2 allows remote attackers to inject arbitrary web script or HTML."
},
{
"lang": "es",
"value": "Vulnerabilidad (XSS) en los gr\u00e1ficos de dependencia en Bugzilla 2.16rc1 hasta la versi\u00f3n 4.4.11, y 4.5.1 hasta la versi\u00f3n 5.0.2 permite a atacantes remotos inyectar secuencias de comandos web o HTML arbitrario."
}
],
"id": "CVE-2016-2803",
"lastModified": "2025-04-20T01:37:25.860",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": true
}
],
"cvssMetricV30": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"version": "3.0"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2017-04-12T22:59:00.337",
"references": [
{
"source": "security@mozilla.org",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "http://packetstormsecurity.com/files/137079/Bugzilla-4.4.11-5.0.2-Summary-Cross-Site-Scripting.html"
},
{
"source": "security@mozilla.org",
"url": "http://www.securityfocus.com/archive/1/538401/100/0/threaded"
},
{
"source": "security@mozilla.org",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securitytracker.com/id/1035891"
},
{
"source": "security@mozilla.org",
"tags": [
"Issue Tracking",
"Third Party Advisory",
"VDB Entry"
],
"url": "https://www.bugzilla.org/security/4.4.11/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "http://packetstormsecurity.com/files/137079/Bugzilla-4.4.11-5.0.2-Summary-Cross-Site-Scripting.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securityfocus.com/archive/1/538401/100/0/threaded"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securitytracker.com/id/1035891"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Issue Tracking",
"Third Party Advisory",
"VDB Entry"
],
"url": "https://www.bugzilla.org/security/4.4.11/"
}
],
"sourceIdentifier": "security@mozilla.org",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-79"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
FKIE_CVE-2015-8509
Vulnerability from fkie_nvd - Published: 2016-01-03 05:59 - Updated: 2025-04-12 10:46{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "DC38A53F-60E6-4F7A-A953-C53D141E830D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.2:*:*:*:*:*:*:*",
"matchCriteriaId": "DAFEF951-3FE8-49DD-B3DD-E526D5B52998",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.4:*:*:*:*:*:*:*",
"matchCriteriaId": "8112FF13-B4CE-4DC7-85B1-C69D975F162B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.6:*:*:*:*:*:*:*",
"matchCriteriaId": "86F5A3CA-E4A6-4E51-AC83-0C8F3E5E2C4E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.8:*:*:*:*:*:*:*",
"matchCriteriaId": "F6E5E379-D475-42F3-B0DC-3D04C1D25566",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.10:*:*:*:*:*:*:*",
"matchCriteriaId": "893741D3-062B-45F9-B5A3-1B81058E7FD7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.12:*:*:*:*:*:*:*",
"matchCriteriaId": "E8D53B5F-6AEE-4192-B838-E1DA92C59285",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.14:*:*:*:*:*:*:*",
"matchCriteriaId": "1883A98C-E595-4F3C-87BF-A63393F9F561",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.14.1:*:*:*:*:*:*:*",
"matchCriteriaId": "DD49E53A-5676-4FAC-A8A2-30FAC04C33D7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.14.2:*:*:*:*:*:*:*",
"matchCriteriaId": "1084AF8E-5269-4EFF-BBD2-C5A77945FCF2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.14.3:*:*:*:*:*:*:*",
"matchCriteriaId": "D9A4B035-B73E-48E9-BBB9-83219F5D2A95",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.14.4:*:*:*:*:*:*:*",
"matchCriteriaId": "9452C271-2812-4775-8396-394C642EACFD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.14.5:*:*:*:*:*:*:*",
"matchCriteriaId": "2D351AF2-C0AB-4BB3-8692-677A3025A615",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.16:*:*:*:*:*:*:*",
"matchCriteriaId": "F16D338E-C5BC-46E1-95DD-D9B0E25EE56E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.16.1:*:*:*:*:*:*:*",
"matchCriteriaId": "19F19219-3AFD-4D8E-B02B-BFCBD1BC7C36",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.16.2:*:*:*:*:*:*:*",
"matchCriteriaId": "B900D9A7-913A-4176-90CF-C7C3B09A4261",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.16.3:*:*:*:*:*:*:*",
"matchCriteriaId": "B692910E-633D-4A88-B245-56A2B58DD4CB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.16.4:*:*:*:*:*:*:*",
"matchCriteriaId": "F86EE5DB-442B-4C78-8152-AF1048C6A974",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.16.5:*:*:*:*:*:*:*",
"matchCriteriaId": "19B82A1A-56EB-41D5-8619-2A717E3A6ECF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.16.6:*:*:*:*:*:*:*",
"matchCriteriaId": "83A0406C-AAF2-4A4C-9567-E21DF1B6C46E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.16.7:*:*:*:*:*:*:*",
"matchCriteriaId": "64434BFC-DDC0-4C7D-B578-472B0610C89E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.16.8:*:*:*:*:*:*:*",
"matchCriteriaId": "A30F28D9-B000-4C26-A911-5E1B8A867BF6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.16.9:*:*:*:*:*:*:*",
"matchCriteriaId": "4A123F78-A671-4FB5-AE78-83762E9323C7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.16.10:*:*:*:*:*:*:*",
"matchCriteriaId": "28C34288-A326-4B71-99B0-DA9FFD28160F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.16.11:*:*:*:*:*:*:*",
"matchCriteriaId": "73648879-BB08-4BE4-A7FF-1E8DF4E264B4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.18:*:*:*:*:*:*:*",
"matchCriteriaId": "DDB99B2D-CA05-4BC0-BCA4-9B94DF248333",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.18.1:*:*:*:*:*:*:*",
"matchCriteriaId": "BE5E8E72-D493-460D-B5A0-F90C291398A5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.18.2:*:*:*:*:*:*:*",
"matchCriteriaId": "04885D31-09F3-455F-A1A9-815E182ABCF9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.18.3:*:*:*:*:*:*:*",
"matchCriteriaId": "F153300E-42CC-4BDD-88EC-E8A0ADB4E3B7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.18.4:*:*:*:*:*:*:*",
"matchCriteriaId": "92BCD546-2A50-4F43-935C-B68459EE894E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.18.5:*:*:*:*:*:*:*",
"matchCriteriaId": "C535BAB7-6146-440B-ADBD-51007585CFC8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.18.6:*:*:*:*:*:*:*",
"matchCriteriaId": "7B6BA7E8-DEC7-4D94-B9F9-B70EC39FD892",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.20:*:*:*:*:*:*:*",
"matchCriteriaId": "A749C7AB-6F60-469C-BD95-759205DDA345",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.20.1:*:*:*:*:*:*:*",
"matchCriteriaId": "BEA9DE63-9951-4FE0-80BE-0F6F197303D7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.20.2:*:*:*:*:*:*:*",
"matchCriteriaId": "B0CEDD02-1CB8-4D5B-B82B-E300B4E39065",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.20.3:*:*:*:*:*:*:*",
"matchCriteriaId": "8E27101B-7985-4412-A14F-9ED11E4C874C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.20.4:*:*:*:*:*:*:*",
"matchCriteriaId": "8A74E8A2-223E-4877-989E-494362B513E9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.20.5:*:*:*:*:*:*:*",
"matchCriteriaId": "E0CAFB45-B115-4492-9919-60223304BB27",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.20.6:*:*:*:*:*:*:*",
"matchCriteriaId": "DC3F7C44-C734-419B-AB62-3AD52554FC7D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.20.7:*:*:*:*:*:*:*",
"matchCriteriaId": "695036D1-994C-451E-8D53-0A345702E4D1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.22:*:*:*:*:*:*:*",
"matchCriteriaId": "F2969731-8256-431B-9356-4BC873D98F6D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.22.1:*:*:*:*:*:*:*",
"matchCriteriaId": "E5177876-0FEC-481B-815F-84AF53968644",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.22.2:*:*:*:*:*:*:*",
"matchCriteriaId": "BC38566A-07F1-4F21-BAC1-259F844DC15C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.22.3:*:*:*:*:*:*:*",
"matchCriteriaId": "AE1684B8-3060-4139-BC06-707F27A05958",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.22.4:*:*:*:*:*:*:*",
"matchCriteriaId": "FF32C74C-3EA3-4E1F-BADA-BB4A92068266",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.22.5:*:*:*:*:*:*:*",
"matchCriteriaId": "D569A750-C649-4D40-89AB-D29773E66F66",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.22.6:*:*:*:*:*:*:*",
"matchCriteriaId": "95B69FA8-1182-46F1-952F-4610288ED409",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.22.7:*:*:*:*:*:*:*",
"matchCriteriaId": "5716BB97-7829-4FDE-92AC-69CA10332F45",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.0:*:*:*:*:*:*:*",
"matchCriteriaId": "D4D9F54A-15A7-4899-B695-D9D8B96C4A9B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "FF2DF96F-E45E-45AF-85E5-E939F923EC1B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "80EBAA09-F2C8-445E-8E3A-B5F937E1B1E2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.0.3:*:*:*:*:*:*:*",
"matchCriteriaId": "11C6713F-01ED-4AE9-AE42-89926067E6E6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.0.4:*:*:*:*:*:*:*",
"matchCriteriaId": "7AB5010D-37A3-4B6E-92B6-6F41A3708851",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.0.5:*:*:*:*:*:*:*",
"matchCriteriaId": "EEB09719-122F-4D25-B680-18029D5D9DE9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.0.6:*:*:*:*:*:*:*",
"matchCriteriaId": "AF585D92-9FAF-4858-A956-68AF77227333",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.0.7:*:*:*:*:*:*:*",
"matchCriteriaId": "7BA67823-C9D9-4C5B-A4ED-669E6F1851C0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.0.8:*:*:*:*:*:*:*",
"matchCriteriaId": "CB0F7531-A660-4604-80BD-15B01E2916BD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.0.9:*:*:*:*:*:*:*",
"matchCriteriaId": "A6FE6868-BB9F-4EB8-9E37-3438559CB01B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.0.10:*:*:*:*:*:*:*",
"matchCriteriaId": "1EC90352-C94A-4F47-AFB7-713B547373CC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.0.11:*:*:*:*:*:*:*",
"matchCriteriaId": "E5E77E01-D779-482A-9FAC-4AC210B68771",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.2:*:*:*:*:*:*:*",
"matchCriteriaId": "F248EA4D-1A39-40FD-8D3C-9701D36FD6B1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.2.1:*:*:*:*:*:*:*",
"matchCriteriaId": "14B5A433-526F-436E-9FCD-B71E661180FD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.2.2:*:*:*:*:*:*:*",
"matchCriteriaId": "48EDC5BC-AD4B-4E67-B79C-F44292307AB4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.2.3:*:*:*:*:*:*:*",
"matchCriteriaId": "6FEC62B7-2CAA-4A0D-A9B2-B4A6B105A6F7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.2.4:*:*:*:*:*:*:*",
"matchCriteriaId": "4B4A7A67-1355-4648-B8C9-3231BED96547",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.2.5:*:*:*:*:*:*:*",
"matchCriteriaId": "442AB3EE-61DF-4B25-ABEB-55905C01E376",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.2.6:*:*:*:*:*:*:*",
"matchCriteriaId": "7F825E34-D529-4ADC-A7D6-1BD9DAE86FC1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.2.7:*:*:*:*:*:*:*",
"matchCriteriaId": "C1F92D0C-AF71-4FD3-BC4B-C6D0F1F84F9B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.2.8:*:*:*:*:*:*:*",
"matchCriteriaId": "CBC26020-BFD7-493B-BDE2-1EC8DEA1A6DA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.2.9:*:*:*:*:*:*:*",
"matchCriteriaId": "984463B4-00A8-423B-B0C5-A7C4FECF064C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.2.10:*:*:*:*:*:*:*",
"matchCriteriaId": "6C7DC534-FF77-414C-A1DC-945F508CC3C9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.4:*:*:*:*:*:*:*",
"matchCriteriaId": "D6A71919-DC70-4AE2-9D16-76A177DAE331",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.4.1:*:*:*:*:*:*:*",
"matchCriteriaId": "EA43E47B-F474-4F5B-A91B-9AF99359FE5F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.4.2:*:*:*:*:*:*:*",
"matchCriteriaId": "A7A3A453-EE50-458C-8F31-D7AA232006FC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.4.3:*:*:*:*:*:*:*",
"matchCriteriaId": "3D920D39-683D-4F9F-AA85-3C4D1600DAD6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.4.5:*:*:*:*:*:*:*",
"matchCriteriaId": "EF6A3C0F-8778-4236-B4DC-41DBCF43EB62",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.4.6:*:*:*:*:*:*:*",
"matchCriteriaId": "7D134D4D-6A95-48FE-B8E5-4F90692CB4FD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.4.7:*:*:*:*:*:*:*",
"matchCriteriaId": "08C34E6F-8233-4575-AAE7-4DBFC27453F8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.4.8:*:*:*:*:*:*:*",
"matchCriteriaId": "6D8155F8-CAB1-4EED-B576-F4102253BD25",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.4.9:*:*:*:*:*:*:*",
"matchCriteriaId": "593D2F3B-A386-48D8-BF19-A12F1B4962A6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.4.10:*:*:*:*:*:*:*",
"matchCriteriaId": "F37C651D-8989-478B-A991-654FCDEC8B1D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.4.11:*:*:*:*:*:*:*",
"matchCriteriaId": "AE170AE5-37F5-4750-ACD9-13CA691A80C5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.4.12:*:*:*:*:*:*:*",
"matchCriteriaId": "1DE75B2F-A183-4ED9-A9E9-7ADF54C341FF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.4.13:*:*:*:*:*:*:*",
"matchCriteriaId": "A4D7380C-5608-4F96-82E3-4B36CDCD71EC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.4.14:*:*:*:*:*:*:*",
"matchCriteriaId": "4BC4AB19-CA33-4C58-A305-E970EEACEBAC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.6:*:*:*:*:*:*:*",
"matchCriteriaId": "03E40C09-0696-45BC-9AE8-9F6F20964600",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.6.1:*:*:*:*:*:*:*",
"matchCriteriaId": "BCAD5285-E485-4F49-99CF-287545260FDD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.6.2:*:*:*:*:*:*:*",
"matchCriteriaId": "5C193DF3-8D23-44A9-94DE-9F4F7358ED3F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.6.3:*:*:*:*:*:*:*",
"matchCriteriaId": "80BA8C84-32C3-4ECF-B4C7-573B12441D22",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.6.4:*:*:*:*:*:*:*",
"matchCriteriaId": "820EC9F1-B66C-43CE-B254-145F4AC23083",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.6.5:*:*:*:*:*:*:*",
"matchCriteriaId": "C4BDA6DC-8D53-417D-8320-CE266F8607B7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.6.6:*:*:*:*:*:*:*",
"matchCriteriaId": "5B01E0D5-3F26-4A71-A22C-FAD7CBF47283",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.6.7:*:*:*:*:*:*:*",
"matchCriteriaId": "6C33D8DA-86A4-4A70-82F8-27D5DE3881EA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.6.8:*:*:*:*:*:*:*",
"matchCriteriaId": "884D0728-8E3C-47F3-9DDD-FA976E1553EB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.6.9:*:*:*:*:*:*:*",
"matchCriteriaId": "C47C594A-D3B6-44FD-93D7-7E69212050BF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.6.10:*:*:*:*:*:*:*",
"matchCriteriaId": "551303CA-63C5-4A3A-9280-ADB2B77C05F7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.6.11:*:*:*:*:*:*:*",
"matchCriteriaId": "0777EB93-D11C-4837-BB7F-96DEC716E1BB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.6.12:*:*:*:*:*:*:*",
"matchCriteriaId": "10FFAD30-56A0-40C8-AE70-70DD9904C528",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.6.13:*:*:*:*:*:*:*",
"matchCriteriaId": "3620DE78-AF48-44EC-B211-E0C26F4E951F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:4.0:*:*:*:*:*:*:*",
"matchCriteriaId": "DABC1683-0E04-456E-9500-68D0D35815E6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:4.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "A367BFF0-397D-416F-960C-602E8B66421A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:4.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "A6229B76-3EB0-45D9-9667-7E94D0880AE7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:4.0.3:*:*:*:*:*:*:*",
"matchCriteriaId": "4FCD8B47-9BF6-4F3E-AF88-0416BE31EC65",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:4.0.4:*:*:*:*:*:*:*",
"matchCriteriaId": "C8D0ED4E-F1A7-43B7-B9D2-D6D6AA145459",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:4.0.5:*:*:*:*:*:*:*",
"matchCriteriaId": "93FE2861-A397-4439-9BB8-7B67D7F9D211",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:4.0.6:*:*:*:*:*:*:*",
"matchCriteriaId": "3AF08887-66BF-4B3C-81E9-F8443E7D3285",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:4.0.7:*:*:*:*:*:*:*",
"matchCriteriaId": "D2D243D2-0FD9-45E5-BE52-A2956F587122",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:4.0.8:*:*:*:*:*:*:*",
"matchCriteriaId": "6038EF72-2CDC-42A1-A20A-B23459776E21",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:4.0.9:*:*:*:*:*:*:*",
"matchCriteriaId": "66959932-AB8A-43C7-83CE-07EE576BF2F6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:4.0.10:*:*:*:*:*:*:*",
"matchCriteriaId": "145D0FF7-1691-4A73-95FA-284A9EF79F65",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:4.0.11:*:*:*:*:*:*:*",
"matchCriteriaId": "A9C9A0A8-139B-469D-ABE8-2724D65F7EAA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:4.0.12:*:*:*:*:*:*:*",
"matchCriteriaId": "4A54C2C7-AA44-46E9-BF03-E00018084093",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:4.0.13:*:*:*:*:*:*:*",
"matchCriteriaId": "BECED922-3748-4534-9750-3A061B939A0B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:4.0.14:*:*:*:*:*:*:*",
"matchCriteriaId": "A8A5E5C6-AF2D-4C31-B422-63D0182EC21B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:4.0.15:*:*:*:*:*:*:*",
"matchCriteriaId": "E5487227-FD2D-45BE-B4AE-57BD25FF9260",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:4.0.16:*:*:*:*:*:*:*",
"matchCriteriaId": "9BF3A2DE-4E15-45E8-956E-B3368DBC4ED6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:4.0.17:*:*:*:*:*:*:*",
"matchCriteriaId": "710E220C-7E70-425D-B15C-945C35A65C92",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:4.0.18:*:*:*:*:*:*:*",
"matchCriteriaId": "F6DE24FD-5C6B-4B5E-A5F0-AED448F1BA98",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:4.2:*:*:*:*:*:*:*",
"matchCriteriaId": "7CE9B4E3-8044-4305-A517-E695D0831355",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:4.2.1:*:*:*:*:*:*:*",
"matchCriteriaId": "AD204F45-15FE-4677-BC4C-A53F322A3B15",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:4.2.2:*:*:*:*:*:*:*",
"matchCriteriaId": "22FAFCDF-C615-4958-9C6D-E74EC11E9A62",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:4.2.3:*:*:*:*:*:*:*",
"matchCriteriaId": "4D623AEB-622E-470E-898C-A447F9C4066A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:4.2.4:*:*:*:*:*:*:*",
"matchCriteriaId": "9019921A-B8D2-4774-AB6B-673FC2FD2197",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:4.2.5:*:*:*:*:*:*:*",
"matchCriteriaId": "1DC1A059-DDE4-4442-BD90-20AB3CE0E1CC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:4.2.6:*:*:*:*:*:*:*",
"matchCriteriaId": "4801DB4A-F828-4E95-8619-F909D5D39524",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:4.2.7:*:*:*:*:*:*:*",
"matchCriteriaId": "1E0D48CD-C77A-4D86-B091-2B8DF3ADA6D7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:4.2.8:*:*:*:*:*:*:*",
"matchCriteriaId": "956C5C97-E7A8-49F2-8AC6-9570A5948395",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:4.2.9:*:*:*:*:*:*:*",
"matchCriteriaId": "281A3D1A-1F92-454D-AE09-522114FF9D8D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:4.2.10:*:*:*:*:*:*:*",
"matchCriteriaId": "717B879A-EDEA-4917-A75E-2C40BB8D35D7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:4.2.11:*:*:*:*:*:*:*",
"matchCriteriaId": "F874FD21-1D5D-4F0F-BEE1-93229AA3E8A6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:4.2.12:*:*:*:*:*:*:*",
"matchCriteriaId": "62B10FC3-30EC-46C7-9324-D91127647809",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:4.2.13:*:*:*:*:*:*:*",
"matchCriteriaId": "E2F9B052-F50C-41E0-B4B5-A5A4A5B3CE5D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:4.2.14:*:*:*:*:*:*:*",
"matchCriteriaId": "56AB0583-0DE5-4229-9D35-6C3539341C3F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:4.2.15:*:*:*:*:*:*:*",
"matchCriteriaId": "FCF64AD5-022B-45AA-BE9E-D4457F7824BC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:4.4:*:*:*:*:*:*:*",
"matchCriteriaId": "D00AE646-61CC-4036-8B8F-35B818530BFC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:4.4.1:*:*:*:*:*:*:*",
"matchCriteriaId": "9FFFD96D-D0B5-47BB-91D9-3736E343711E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:4.4.2:*:*:*:*:*:*:*",
"matchCriteriaId": "4D710732-6D93-4143-874F-81B19F70FBEF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:4.4.3:*:*:*:*:*:*:*",
"matchCriteriaId": "FD56846F-40B5-4A45-99DB-44C56E3A20A3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:4.4.4:*:*:*:*:*:*:*",
"matchCriteriaId": "32C22A06-5F01-4C6A-886F-E3C0776C3C5B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:4.4.5:*:*:*:*:*:*:*",
"matchCriteriaId": "6457398E-A1C9-4F72-BBF7-FC54118FA91C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:4.4.6:*:*:*:*:*:*:*",
"matchCriteriaId": "47FF50AB-7156-4828-A6B5-6E7AF5152561",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:4.4.7:*:*:*:*:*:*:*",
"matchCriteriaId": "196B21CA-0EC5-4590-A584-01D667E31FD5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:4.4.8:*:*:*:*:*:*:*",
"matchCriteriaId": "A07C2A67-6D87-4451-BDCE-9570508386E8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:4.4.9:*:*:*:*:*:*:*",
"matchCriteriaId": "B1D189FB-9322-4E74-9B9E-26F0B3A235F9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:4.4.10:*:*:*:*:*:*:*",
"matchCriteriaId": "0EED9ABC-56B6-4953-B28A-394E6DF66990",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:5.0:*:*:*:*:*:*:*",
"matchCriteriaId": "8925480C-C23F-42B6-A525-FC49E6936F9E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:5.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "219D0E4C-222E-407F-BF4D-DD509DEFA22F",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Template.pm in Bugzilla 2.x, 3.x, and 4.x before 4.2.16, 4.3.x and 4.4.x before 4.4.11, and 4.5.x and 5.0.x before 5.0.2 does not properly construct CSV files, which allows remote attackers to obtain sensitive information by leveraging a web browser that interprets CSV data as JavaScript code."
},
{
"lang": "es",
"value": "Template.pm en Bugzilla 2.x, 3.x y 4.x en versiones anteriores a 4.2.16, 4.3.x y 4.4.x en versiones anteriores a 4.4.11 y 4.5.x y 5.0.x en versiones anteriores a 5.0.2 no construye adecuadamente archivos CSV, lo que permite a atacantes remotos obtener informaci\u00f3n sensible aprovechando un navegador web que interpreta datos CSV como c\u00f3digo JavaScript."
}
],
"id": "CVE-2015-8509",
"lastModified": "2025-04-12T10:46:40.837",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": true
}
],
"cvssMetricV30": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 3.5,
"baseSeverity": "LOW",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:N",
"version": "3.0"
},
"exploitabilityScore": 2.1,
"impactScore": 1.4,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2016-01-03T05:59:11.947",
"references": [
{
"source": "security@mozilla.org",
"url": "http://packetstormsecurity.com/files/135048/Bugzilla-Cross-Site-Scripting-Information-Leak.html"
},
{
"source": "security@mozilla.org",
"url": "http://seclists.org/bugtraq/2015/Dec/131"
},
{
"source": "security@mozilla.org",
"url": "http://www.securityfocus.com/bid/79662"
},
{
"source": "security@mozilla.org",
"url": "http://www.securitytracker.com/id/1034556"
},
{
"source": "security@mozilla.org",
"tags": [
"Exploit",
"Vendor Advisory"
],
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1232785"
},
{
"source": "security@mozilla.org",
"url": "https://www.bugzilla.org/security/4.2.15/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://packetstormsecurity.com/files/135048/Bugzilla-Cross-Site-Scripting-Information-Leak.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://seclists.org/bugtraq/2015/Dec/131"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securityfocus.com/bid/79662"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securitytracker.com/id/1034556"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Vendor Advisory"
],
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1232785"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://www.bugzilla.org/security/4.2.15/"
}
],
"sourceIdentifier": "security@mozilla.org",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-200"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
FKIE_CVE-2015-8508
Vulnerability from fkie_nvd - Published: 2016-01-03 05:59 - Updated: 2025-04-12 10:46{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "DC38A53F-60E6-4F7A-A953-C53D141E830D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.2:*:*:*:*:*:*:*",
"matchCriteriaId": "DAFEF951-3FE8-49DD-B3DD-E526D5B52998",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.4:*:*:*:*:*:*:*",
"matchCriteriaId": "8112FF13-B4CE-4DC7-85B1-C69D975F162B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.6:*:*:*:*:*:*:*",
"matchCriteriaId": "86F5A3CA-E4A6-4E51-AC83-0C8F3E5E2C4E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.8:*:*:*:*:*:*:*",
"matchCriteriaId": "F6E5E379-D475-42F3-B0DC-3D04C1D25566",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.10:*:*:*:*:*:*:*",
"matchCriteriaId": "893741D3-062B-45F9-B5A3-1B81058E7FD7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.12:*:*:*:*:*:*:*",
"matchCriteriaId": "E8D53B5F-6AEE-4192-B838-E1DA92C59285",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.14:*:*:*:*:*:*:*",
"matchCriteriaId": "1883A98C-E595-4F3C-87BF-A63393F9F561",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.14.1:*:*:*:*:*:*:*",
"matchCriteriaId": "DD49E53A-5676-4FAC-A8A2-30FAC04C33D7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.14.2:*:*:*:*:*:*:*",
"matchCriteriaId": "1084AF8E-5269-4EFF-BBD2-C5A77945FCF2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.14.3:*:*:*:*:*:*:*",
"matchCriteriaId": "D9A4B035-B73E-48E9-BBB9-83219F5D2A95",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.14.4:*:*:*:*:*:*:*",
"matchCriteriaId": "9452C271-2812-4775-8396-394C642EACFD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.14.5:*:*:*:*:*:*:*",
"matchCriteriaId": "2D351AF2-C0AB-4BB3-8692-677A3025A615",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.16:*:*:*:*:*:*:*",
"matchCriteriaId": "F16D338E-C5BC-46E1-95DD-D9B0E25EE56E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.16.1:*:*:*:*:*:*:*",
"matchCriteriaId": "19F19219-3AFD-4D8E-B02B-BFCBD1BC7C36",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.16.2:*:*:*:*:*:*:*",
"matchCriteriaId": "B900D9A7-913A-4176-90CF-C7C3B09A4261",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.16.3:*:*:*:*:*:*:*",
"matchCriteriaId": "B692910E-633D-4A88-B245-56A2B58DD4CB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.16.4:*:*:*:*:*:*:*",
"matchCriteriaId": "F86EE5DB-442B-4C78-8152-AF1048C6A974",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.16.5:*:*:*:*:*:*:*",
"matchCriteriaId": "19B82A1A-56EB-41D5-8619-2A717E3A6ECF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.16.6:*:*:*:*:*:*:*",
"matchCriteriaId": "83A0406C-AAF2-4A4C-9567-E21DF1B6C46E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.16.7:*:*:*:*:*:*:*",
"matchCriteriaId": "64434BFC-DDC0-4C7D-B578-472B0610C89E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.16.8:*:*:*:*:*:*:*",
"matchCriteriaId": "A30F28D9-B000-4C26-A911-5E1B8A867BF6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.16.9:*:*:*:*:*:*:*",
"matchCriteriaId": "4A123F78-A671-4FB5-AE78-83762E9323C7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.16.10:*:*:*:*:*:*:*",
"matchCriteriaId": "28C34288-A326-4B71-99B0-DA9FFD28160F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.16.11:*:*:*:*:*:*:*",
"matchCriteriaId": "73648879-BB08-4BE4-A7FF-1E8DF4E264B4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.18:*:*:*:*:*:*:*",
"matchCriteriaId": "DDB99B2D-CA05-4BC0-BCA4-9B94DF248333",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.18.1:*:*:*:*:*:*:*",
"matchCriteriaId": "BE5E8E72-D493-460D-B5A0-F90C291398A5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.18.2:*:*:*:*:*:*:*",
"matchCriteriaId": "04885D31-09F3-455F-A1A9-815E182ABCF9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.18.3:*:*:*:*:*:*:*",
"matchCriteriaId": "F153300E-42CC-4BDD-88EC-E8A0ADB4E3B7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.18.4:*:*:*:*:*:*:*",
"matchCriteriaId": "92BCD546-2A50-4F43-935C-B68459EE894E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.18.5:*:*:*:*:*:*:*",
"matchCriteriaId": "C535BAB7-6146-440B-ADBD-51007585CFC8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.18.6:*:*:*:*:*:*:*",
"matchCriteriaId": "7B6BA7E8-DEC7-4D94-B9F9-B70EC39FD892",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.20:*:*:*:*:*:*:*",
"matchCriteriaId": "A749C7AB-6F60-469C-BD95-759205DDA345",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.20.1:*:*:*:*:*:*:*",
"matchCriteriaId": "BEA9DE63-9951-4FE0-80BE-0F6F197303D7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.20.2:*:*:*:*:*:*:*",
"matchCriteriaId": "B0CEDD02-1CB8-4D5B-B82B-E300B4E39065",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.20.3:*:*:*:*:*:*:*",
"matchCriteriaId": "8E27101B-7985-4412-A14F-9ED11E4C874C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.20.4:*:*:*:*:*:*:*",
"matchCriteriaId": "8A74E8A2-223E-4877-989E-494362B513E9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.20.5:*:*:*:*:*:*:*",
"matchCriteriaId": "E0CAFB45-B115-4492-9919-60223304BB27",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.20.6:*:*:*:*:*:*:*",
"matchCriteriaId": "DC3F7C44-C734-419B-AB62-3AD52554FC7D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.20.7:*:*:*:*:*:*:*",
"matchCriteriaId": "695036D1-994C-451E-8D53-0A345702E4D1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.22:*:*:*:*:*:*:*",
"matchCriteriaId": "F2969731-8256-431B-9356-4BC873D98F6D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.22.1:*:*:*:*:*:*:*",
"matchCriteriaId": "E5177876-0FEC-481B-815F-84AF53968644",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.22.2:*:*:*:*:*:*:*",
"matchCriteriaId": "BC38566A-07F1-4F21-BAC1-259F844DC15C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.22.3:*:*:*:*:*:*:*",
"matchCriteriaId": "AE1684B8-3060-4139-BC06-707F27A05958",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.22.4:*:*:*:*:*:*:*",
"matchCriteriaId": "FF32C74C-3EA3-4E1F-BADA-BB4A92068266",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.22.5:*:*:*:*:*:*:*",
"matchCriteriaId": "D569A750-C649-4D40-89AB-D29773E66F66",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.22.6:*:*:*:*:*:*:*",
"matchCriteriaId": "95B69FA8-1182-46F1-952F-4610288ED409",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.22.7:*:*:*:*:*:*:*",
"matchCriteriaId": "5716BB97-7829-4FDE-92AC-69CA10332F45",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.0:*:*:*:*:*:*:*",
"matchCriteriaId": "D4D9F54A-15A7-4899-B695-D9D8B96C4A9B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "FF2DF96F-E45E-45AF-85E5-E939F923EC1B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "80EBAA09-F2C8-445E-8E3A-B5F937E1B1E2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.0.3:*:*:*:*:*:*:*",
"matchCriteriaId": "11C6713F-01ED-4AE9-AE42-89926067E6E6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.0.4:*:*:*:*:*:*:*",
"matchCriteriaId": "7AB5010D-37A3-4B6E-92B6-6F41A3708851",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.0.5:*:*:*:*:*:*:*",
"matchCriteriaId": "EEB09719-122F-4D25-B680-18029D5D9DE9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.0.6:*:*:*:*:*:*:*",
"matchCriteriaId": "AF585D92-9FAF-4858-A956-68AF77227333",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.0.7:*:*:*:*:*:*:*",
"matchCriteriaId": "7BA67823-C9D9-4C5B-A4ED-669E6F1851C0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.0.8:*:*:*:*:*:*:*",
"matchCriteriaId": "CB0F7531-A660-4604-80BD-15B01E2916BD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.0.9:*:*:*:*:*:*:*",
"matchCriteriaId": "A6FE6868-BB9F-4EB8-9E37-3438559CB01B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.0.10:*:*:*:*:*:*:*",
"matchCriteriaId": "1EC90352-C94A-4F47-AFB7-713B547373CC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.0.11:*:*:*:*:*:*:*",
"matchCriteriaId": "E5E77E01-D779-482A-9FAC-4AC210B68771",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.2:*:*:*:*:*:*:*",
"matchCriteriaId": "F248EA4D-1A39-40FD-8D3C-9701D36FD6B1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.2.1:*:*:*:*:*:*:*",
"matchCriteriaId": "14B5A433-526F-436E-9FCD-B71E661180FD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.2.2:*:*:*:*:*:*:*",
"matchCriteriaId": "48EDC5BC-AD4B-4E67-B79C-F44292307AB4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.2.3:*:*:*:*:*:*:*",
"matchCriteriaId": "6FEC62B7-2CAA-4A0D-A9B2-B4A6B105A6F7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.2.4:*:*:*:*:*:*:*",
"matchCriteriaId": "4B4A7A67-1355-4648-B8C9-3231BED96547",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.2.5:*:*:*:*:*:*:*",
"matchCriteriaId": "442AB3EE-61DF-4B25-ABEB-55905C01E376",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.2.6:*:*:*:*:*:*:*",
"matchCriteriaId": "7F825E34-D529-4ADC-A7D6-1BD9DAE86FC1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.2.7:*:*:*:*:*:*:*",
"matchCriteriaId": "C1F92D0C-AF71-4FD3-BC4B-C6D0F1F84F9B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.2.8:*:*:*:*:*:*:*",
"matchCriteriaId": "CBC26020-BFD7-493B-BDE2-1EC8DEA1A6DA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.2.9:*:*:*:*:*:*:*",
"matchCriteriaId": "984463B4-00A8-423B-B0C5-A7C4FECF064C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.2.10:*:*:*:*:*:*:*",
"matchCriteriaId": "6C7DC534-FF77-414C-A1DC-945F508CC3C9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.4:*:*:*:*:*:*:*",
"matchCriteriaId": "D6A71919-DC70-4AE2-9D16-76A177DAE331",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.4.1:*:*:*:*:*:*:*",
"matchCriteriaId": "EA43E47B-F474-4F5B-A91B-9AF99359FE5F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.4.2:*:*:*:*:*:*:*",
"matchCriteriaId": "A7A3A453-EE50-458C-8F31-D7AA232006FC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.4.3:*:*:*:*:*:*:*",
"matchCriteriaId": "3D920D39-683D-4F9F-AA85-3C4D1600DAD6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.4.5:*:*:*:*:*:*:*",
"matchCriteriaId": "EF6A3C0F-8778-4236-B4DC-41DBCF43EB62",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.4.6:*:*:*:*:*:*:*",
"matchCriteriaId": "7D134D4D-6A95-48FE-B8E5-4F90692CB4FD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.4.7:*:*:*:*:*:*:*",
"matchCriteriaId": "08C34E6F-8233-4575-AAE7-4DBFC27453F8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.4.8:*:*:*:*:*:*:*",
"matchCriteriaId": "6D8155F8-CAB1-4EED-B576-F4102253BD25",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.4.9:*:*:*:*:*:*:*",
"matchCriteriaId": "593D2F3B-A386-48D8-BF19-A12F1B4962A6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.4.10:*:*:*:*:*:*:*",
"matchCriteriaId": "F37C651D-8989-478B-A991-654FCDEC8B1D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.4.11:*:*:*:*:*:*:*",
"matchCriteriaId": "AE170AE5-37F5-4750-ACD9-13CA691A80C5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.4.12:*:*:*:*:*:*:*",
"matchCriteriaId": "1DE75B2F-A183-4ED9-A9E9-7ADF54C341FF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.4.13:*:*:*:*:*:*:*",
"matchCriteriaId": "A4D7380C-5608-4F96-82E3-4B36CDCD71EC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.4.14:*:*:*:*:*:*:*",
"matchCriteriaId": "4BC4AB19-CA33-4C58-A305-E970EEACEBAC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.6:*:*:*:*:*:*:*",
"matchCriteriaId": "03E40C09-0696-45BC-9AE8-9F6F20964600",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.6.1:*:*:*:*:*:*:*",
"matchCriteriaId": "BCAD5285-E485-4F49-99CF-287545260FDD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.6.2:*:*:*:*:*:*:*",
"matchCriteriaId": "5C193DF3-8D23-44A9-94DE-9F4F7358ED3F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.6.3:*:*:*:*:*:*:*",
"matchCriteriaId": "80BA8C84-32C3-4ECF-B4C7-573B12441D22",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.6.4:*:*:*:*:*:*:*",
"matchCriteriaId": "820EC9F1-B66C-43CE-B254-145F4AC23083",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.6.5:*:*:*:*:*:*:*",
"matchCriteriaId": "C4BDA6DC-8D53-417D-8320-CE266F8607B7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.6.6:*:*:*:*:*:*:*",
"matchCriteriaId": "5B01E0D5-3F26-4A71-A22C-FAD7CBF47283",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.6.7:*:*:*:*:*:*:*",
"matchCriteriaId": "6C33D8DA-86A4-4A70-82F8-27D5DE3881EA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.6.8:*:*:*:*:*:*:*",
"matchCriteriaId": "884D0728-8E3C-47F3-9DDD-FA976E1553EB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.6.9:*:*:*:*:*:*:*",
"matchCriteriaId": "C47C594A-D3B6-44FD-93D7-7E69212050BF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.6.10:*:*:*:*:*:*:*",
"matchCriteriaId": "551303CA-63C5-4A3A-9280-ADB2B77C05F7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.6.11:*:*:*:*:*:*:*",
"matchCriteriaId": "0777EB93-D11C-4837-BB7F-96DEC716E1BB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.6.12:*:*:*:*:*:*:*",
"matchCriteriaId": "10FFAD30-56A0-40C8-AE70-70DD9904C528",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.6.13:*:*:*:*:*:*:*",
"matchCriteriaId": "3620DE78-AF48-44EC-B211-E0C26F4E951F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:4.0:*:*:*:*:*:*:*",
"matchCriteriaId": "DABC1683-0E04-456E-9500-68D0D35815E6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:4.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "A367BFF0-397D-416F-960C-602E8B66421A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:4.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "A6229B76-3EB0-45D9-9667-7E94D0880AE7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:4.0.3:*:*:*:*:*:*:*",
"matchCriteriaId": "4FCD8B47-9BF6-4F3E-AF88-0416BE31EC65",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:4.0.4:*:*:*:*:*:*:*",
"matchCriteriaId": "C8D0ED4E-F1A7-43B7-B9D2-D6D6AA145459",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:4.0.5:*:*:*:*:*:*:*",
"matchCriteriaId": "93FE2861-A397-4439-9BB8-7B67D7F9D211",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:4.0.6:*:*:*:*:*:*:*",
"matchCriteriaId": "3AF08887-66BF-4B3C-81E9-F8443E7D3285",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:4.0.7:*:*:*:*:*:*:*",
"matchCriteriaId": "D2D243D2-0FD9-45E5-BE52-A2956F587122",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:4.0.8:*:*:*:*:*:*:*",
"matchCriteriaId": "6038EF72-2CDC-42A1-A20A-B23459776E21",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:4.0.9:*:*:*:*:*:*:*",
"matchCriteriaId": "66959932-AB8A-43C7-83CE-07EE576BF2F6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:4.0.10:*:*:*:*:*:*:*",
"matchCriteriaId": "145D0FF7-1691-4A73-95FA-284A9EF79F65",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:4.0.11:*:*:*:*:*:*:*",
"matchCriteriaId": "A9C9A0A8-139B-469D-ABE8-2724D65F7EAA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:4.0.12:*:*:*:*:*:*:*",
"matchCriteriaId": "4A54C2C7-AA44-46E9-BF03-E00018084093",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:4.0.13:*:*:*:*:*:*:*",
"matchCriteriaId": "BECED922-3748-4534-9750-3A061B939A0B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:4.0.14:*:*:*:*:*:*:*",
"matchCriteriaId": "A8A5E5C6-AF2D-4C31-B422-63D0182EC21B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:4.0.15:*:*:*:*:*:*:*",
"matchCriteriaId": "E5487227-FD2D-45BE-B4AE-57BD25FF9260",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:4.0.16:*:*:*:*:*:*:*",
"matchCriteriaId": "9BF3A2DE-4E15-45E8-956E-B3368DBC4ED6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:4.0.17:*:*:*:*:*:*:*",
"matchCriteriaId": "710E220C-7E70-425D-B15C-945C35A65C92",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:4.0.18:*:*:*:*:*:*:*",
"matchCriteriaId": "F6DE24FD-5C6B-4B5E-A5F0-AED448F1BA98",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:4.2:*:*:*:*:*:*:*",
"matchCriteriaId": "7CE9B4E3-8044-4305-A517-E695D0831355",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:4.2.1:*:*:*:*:*:*:*",
"matchCriteriaId": "AD204F45-15FE-4677-BC4C-A53F322A3B15",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:4.2.2:*:*:*:*:*:*:*",
"matchCriteriaId": "22FAFCDF-C615-4958-9C6D-E74EC11E9A62",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:4.2.3:*:*:*:*:*:*:*",
"matchCriteriaId": "4D623AEB-622E-470E-898C-A447F9C4066A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:4.2.4:*:*:*:*:*:*:*",
"matchCriteriaId": "9019921A-B8D2-4774-AB6B-673FC2FD2197",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:4.2.5:*:*:*:*:*:*:*",
"matchCriteriaId": "1DC1A059-DDE4-4442-BD90-20AB3CE0E1CC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:4.2.6:*:*:*:*:*:*:*",
"matchCriteriaId": "4801DB4A-F828-4E95-8619-F909D5D39524",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:4.2.7:*:*:*:*:*:*:*",
"matchCriteriaId": "1E0D48CD-C77A-4D86-B091-2B8DF3ADA6D7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:4.2.8:*:*:*:*:*:*:*",
"matchCriteriaId": "956C5C97-E7A8-49F2-8AC6-9570A5948395",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:4.2.9:*:*:*:*:*:*:*",
"matchCriteriaId": "281A3D1A-1F92-454D-AE09-522114FF9D8D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:4.2.10:*:*:*:*:*:*:*",
"matchCriteriaId": "717B879A-EDEA-4917-A75E-2C40BB8D35D7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:4.2.11:*:*:*:*:*:*:*",
"matchCriteriaId": "F874FD21-1D5D-4F0F-BEE1-93229AA3E8A6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:4.2.12:*:*:*:*:*:*:*",
"matchCriteriaId": "62B10FC3-30EC-46C7-9324-D91127647809",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:4.2.13:*:*:*:*:*:*:*",
"matchCriteriaId": "E2F9B052-F50C-41E0-B4B5-A5A4A5B3CE5D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:4.2.14:*:*:*:*:*:*:*",
"matchCriteriaId": "56AB0583-0DE5-4229-9D35-6C3539341C3F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:4.2.15:*:*:*:*:*:*:*",
"matchCriteriaId": "FCF64AD5-022B-45AA-BE9E-D4457F7824BC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:4.4:*:*:*:*:*:*:*",
"matchCriteriaId": "D00AE646-61CC-4036-8B8F-35B818530BFC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:4.4.1:*:*:*:*:*:*:*",
"matchCriteriaId": "9FFFD96D-D0B5-47BB-91D9-3736E343711E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:4.4.2:*:*:*:*:*:*:*",
"matchCriteriaId": "4D710732-6D93-4143-874F-81B19F70FBEF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:4.4.3:*:*:*:*:*:*:*",
"matchCriteriaId": "FD56846F-40B5-4A45-99DB-44C56E3A20A3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:4.4.4:*:*:*:*:*:*:*",
"matchCriteriaId": "32C22A06-5F01-4C6A-886F-E3C0776C3C5B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:4.4.5:*:*:*:*:*:*:*",
"matchCriteriaId": "6457398E-A1C9-4F72-BBF7-FC54118FA91C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:4.4.6:*:*:*:*:*:*:*",
"matchCriteriaId": "47FF50AB-7156-4828-A6B5-6E7AF5152561",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:4.4.7:*:*:*:*:*:*:*",
"matchCriteriaId": "196B21CA-0EC5-4590-A584-01D667E31FD5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:4.4.8:*:*:*:*:*:*:*",
"matchCriteriaId": "A07C2A67-6D87-4451-BDCE-9570508386E8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:4.4.9:*:*:*:*:*:*:*",
"matchCriteriaId": "B1D189FB-9322-4E74-9B9E-26F0B3A235F9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:4.4.10:*:*:*:*:*:*:*",
"matchCriteriaId": "0EED9ABC-56B6-4953-B28A-394E6DF66990",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:5.0:*:*:*:*:*:*:*",
"matchCriteriaId": "8925480C-C23F-42B6-A525-FC49E6936F9E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:5.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "219D0E4C-222E-407F-BF4D-DD509DEFA22F",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Cross-site scripting (XSS) vulnerability in showdependencygraph.cgi in Bugzilla 2.x, 3.x, and 4.x before 4.2.16, 4.3.x and 4.4.x before 4.4.11, and 4.5.x and 5.0.x before 5.0.2, when a local dot configuration is used, allows remote attackers to inject arbitrary web script or HTML via a crafted bug summary."
},
{
"lang": "es",
"value": "Vulnerabilidad de XSS en showdependencygraph.cgi en Bugzilla 2.x, 3.x y 4.x en versiones anteriores a 4.2.16, 4.3.x y 4.4.x en versiones anteriores a 4.4.11 y 4.5.x y 5.0.x en versiones anteriores a 5.0.2, cuando se utiliza una configuraci\u00f3n dot local, permite a atacantes remotos inyectar secuencias de comandos web o HTML arbitrarios a trav\u00e9s de un resumen de error manipulado."
}
],
"id": "CVE-2015-8508",
"lastModified": "2025-04-12T10:46:40.837",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "LOW",
"cvssData": {
"accessComplexity": "HIGH",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 2.6,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:H/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
"exploitabilityScore": 4.9,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": true
}
],
"cvssMetricV30": [
{
"cvssData": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:N",
"version": "3.0"
},
"exploitabilityScore": 1.6,
"impactScore": 2.7,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2016-01-03T05:59:10.990",
"references": [
{
"source": "security@mozilla.org",
"url": "http://packetstormsecurity.com/files/135048/Bugzilla-Cross-Site-Scripting-Information-Leak.html"
},
{
"source": "security@mozilla.org",
"url": "http://seclists.org/bugtraq/2015/Dec/131"
},
{
"source": "security@mozilla.org",
"url": "http://www.securityfocus.com/bid/79660"
},
{
"source": "security@mozilla.org",
"url": "http://www.securitytracker.com/id/1034556"
},
{
"source": "security@mozilla.org",
"tags": [
"Exploit",
"Vendor Advisory"
],
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1221518"
},
{
"source": "security@mozilla.org",
"url": "https://www.bugzilla.org/security/4.2.15/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://packetstormsecurity.com/files/135048/Bugzilla-Cross-Site-Scripting-Information-Leak.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://seclists.org/bugtraq/2015/Dec/131"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securityfocus.com/bid/79660"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securitytracker.com/id/1034556"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Vendor Advisory"
],
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1221518"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://www.bugzilla.org/security/4.2.15/"
}
],
"sourceIdentifier": "security@mozilla.org",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-79"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
FKIE_CVE-2015-4499
Vulnerability from fkie_nvd - Published: 2015-09-14 01:59 - Updated: 2025-04-12 10:46{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "DC38A53F-60E6-4F7A-A953-C53D141E830D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.2:*:*:*:*:*:*:*",
"matchCriteriaId": "DAFEF951-3FE8-49DD-B3DD-E526D5B52998",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.4:*:*:*:*:*:*:*",
"matchCriteriaId": "8112FF13-B4CE-4DC7-85B1-C69D975F162B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.6:*:*:*:*:*:*:*",
"matchCriteriaId": "86F5A3CA-E4A6-4E51-AC83-0C8F3E5E2C4E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.8:*:*:*:*:*:*:*",
"matchCriteriaId": "F6E5E379-D475-42F3-B0DC-3D04C1D25566",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.10:*:*:*:*:*:*:*",
"matchCriteriaId": "893741D3-062B-45F9-B5A3-1B81058E7FD7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.12:*:*:*:*:*:*:*",
"matchCriteriaId": "E8D53B5F-6AEE-4192-B838-E1DA92C59285",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.14:*:*:*:*:*:*:*",
"matchCriteriaId": "1883A98C-E595-4F3C-87BF-A63393F9F561",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.14.1:*:*:*:*:*:*:*",
"matchCriteriaId": "DD49E53A-5676-4FAC-A8A2-30FAC04C33D7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.14.2:*:*:*:*:*:*:*",
"matchCriteriaId": "1084AF8E-5269-4EFF-BBD2-C5A77945FCF2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.14.3:*:*:*:*:*:*:*",
"matchCriteriaId": "D9A4B035-B73E-48E9-BBB9-83219F5D2A95",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.14.4:*:*:*:*:*:*:*",
"matchCriteriaId": "9452C271-2812-4775-8396-394C642EACFD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.14.5:*:*:*:*:*:*:*",
"matchCriteriaId": "2D351AF2-C0AB-4BB3-8692-677A3025A615",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.16:*:*:*:*:*:*:*",
"matchCriteriaId": "F16D338E-C5BC-46E1-95DD-D9B0E25EE56E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.16:rc1:*:*:*:*:*:*",
"matchCriteriaId": "5877CECA-F758-4F48-B4F4-2C4C1DF01FA0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.16:rc2:*:*:*:*:*:*",
"matchCriteriaId": "D63CE086-5872-4594-8F4B-8D812E7EF09C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.16.1:*:*:*:*:*:*:*",
"matchCriteriaId": "19F19219-3AFD-4D8E-B02B-BFCBD1BC7C36",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.16.2:*:*:*:*:*:*:*",
"matchCriteriaId": "B900D9A7-913A-4176-90CF-C7C3B09A4261",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.16.3:*:*:*:*:*:*:*",
"matchCriteriaId": "B692910E-633D-4A88-B245-56A2B58DD4CB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.16.4:*:*:*:*:*:*:*",
"matchCriteriaId": "F86EE5DB-442B-4C78-8152-AF1048C6A974",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.16.5:*:*:*:*:*:*:*",
"matchCriteriaId": "19B82A1A-56EB-41D5-8619-2A717E3A6ECF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.16.6:*:*:*:*:*:*:*",
"matchCriteriaId": "83A0406C-AAF2-4A4C-9567-E21DF1B6C46E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.16.7:*:*:*:*:*:*:*",
"matchCriteriaId": "64434BFC-DDC0-4C7D-B578-472B0610C89E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.16.8:*:*:*:*:*:*:*",
"matchCriteriaId": "A30F28D9-B000-4C26-A911-5E1B8A867BF6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.16.9:*:*:*:*:*:*:*",
"matchCriteriaId": "4A123F78-A671-4FB5-AE78-83762E9323C7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.16.10:*:*:*:*:*:*:*",
"matchCriteriaId": "28C34288-A326-4B71-99B0-DA9FFD28160F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.16.11:*:*:*:*:*:*:*",
"matchCriteriaId": "73648879-BB08-4BE4-A7FF-1E8DF4E264B4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.17:*:*:*:*:*:*:*",
"matchCriteriaId": "9B2FC5C7-B218-4B87-9805-F90AC0E7A281",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.17.1:*:*:*:*:*:*:*",
"matchCriteriaId": "BBCDA64F-C49A-4F5B-B285-4079D8E3A499",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.17.2:*:*:*:*:*:*:*",
"matchCriteriaId": "930AF809-CA52-41CB-985A-066B8239C7CD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.17.3:*:*:*:*:*:*:*",
"matchCriteriaId": "85ED3457-CC21-4DB3-931F-677F723E1B2A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.17.4:*:*:*:*:*:*:*",
"matchCriteriaId": "6C8711D3-55CF-4131-BBAC-6BE07068219F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.17.5:*:*:*:*:*:*:*",
"matchCriteriaId": "DF54FFA5-5177-46E6-9AFA-BA3345C16E8A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.17.6:*:*:*:*:*:*:*",
"matchCriteriaId": "69D7EA7C-B401-4F5A-AC08-2199DD117403",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.17.7:*:*:*:*:*:*:*",
"matchCriteriaId": "DC2DDC7C-CD2B-4597-A5E0-266A884958FC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.18:*:*:*:*:*:*:*",
"matchCriteriaId": "DDB99B2D-CA05-4BC0-BCA4-9B94DF248333",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.18:rc1:*:*:*:*:*:*",
"matchCriteriaId": "3635C0E9-2E43-4BAE-8267-2BB2F68B03BD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.18:rc2:*:*:*:*:*:*",
"matchCriteriaId": "4869A709-AF79-49BD-A7D2-D48A8D79A085",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.18:rc3:*:*:*:*:*:*",
"matchCriteriaId": "EAC72143-27C3-498F-AFAB-98AE043C0545",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.18.1:*:*:*:*:*:*:*",
"matchCriteriaId": "BE5E8E72-D493-460D-B5A0-F90C291398A5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.18.2:*:*:*:*:*:*:*",
"matchCriteriaId": "04885D31-09F3-455F-A1A9-815E182ABCF9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.18.3:*:*:*:*:*:*:*",
"matchCriteriaId": "F153300E-42CC-4BDD-88EC-E8A0ADB4E3B7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.18.4:*:*:*:*:*:*:*",
"matchCriteriaId": "92BCD546-2A50-4F43-935C-B68459EE894E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.18.5:*:*:*:*:*:*:*",
"matchCriteriaId": "C535BAB7-6146-440B-ADBD-51007585CFC8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.18.6:*:*:*:*:*:*:*",
"matchCriteriaId": "7B6BA7E8-DEC7-4D94-B9F9-B70EC39FD892",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.19:*:*:*:*:*:*:*",
"matchCriteriaId": "725BD7BE-1769-4032-ADA8-9ED15528C770",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.19.1:*:*:*:*:*:*:*",
"matchCriteriaId": "239D70F4-7D86-4A57-ACEF-440F68994FB6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.19.2:*:*:*:*:*:*:*",
"matchCriteriaId": "ABEE2C94-DA69-4A78-A15F-538383A7460E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.19.3:*:*:*:*:*:*:*",
"matchCriteriaId": "4F7CD64E-7FAA-40DC-B36E-8B7EB9D620FB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.20:*:*:*:*:*:*:*",
"matchCriteriaId": "A749C7AB-6F60-469C-BD95-759205DDA345",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.20:rc1:*:*:*:*:*:*",
"matchCriteriaId": "B45F6C27-D89A-42A0-A304-5B0C57D2A9F1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.20:rc2:*:*:*:*:*:*",
"matchCriteriaId": "196B7CD8-D721-4CFB-B126-78758128E900",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.20.1:*:*:*:*:*:*:*",
"matchCriteriaId": "BEA9DE63-9951-4FE0-80BE-0F6F197303D7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.20.2:*:*:*:*:*:*:*",
"matchCriteriaId": "B0CEDD02-1CB8-4D5B-B82B-E300B4E39065",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.20.3:*:*:*:*:*:*:*",
"matchCriteriaId": "8E27101B-7985-4412-A14F-9ED11E4C874C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.20.4:*:*:*:*:*:*:*",
"matchCriteriaId": "8A74E8A2-223E-4877-989E-494362B513E9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.20.5:*:*:*:*:*:*:*",
"matchCriteriaId": "E0CAFB45-B115-4492-9919-60223304BB27",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.20.6:*:*:*:*:*:*:*",
"matchCriteriaId": "DC3F7C44-C734-419B-AB62-3AD52554FC7D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.20.7:*:*:*:*:*:*:*",
"matchCriteriaId": "695036D1-994C-451E-8D53-0A345702E4D1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.21:*:*:*:*:*:*:*",
"matchCriteriaId": "2053CFB4-602E-4141-BB3D-A440E2A31D85",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.21.1:*:*:*:*:*:*:*",
"matchCriteriaId": "31ACBA13-AC13-4469-862F-B3DD2327B6FC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.22:*:*:*:*:*:*:*",
"matchCriteriaId": "F2969731-8256-431B-9356-4BC873D98F6D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.22:rc1:*:*:*:*:*:*",
"matchCriteriaId": "1C166E42-9B36-4883-B738-EEBEF3056D98",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.22.1:*:*:*:*:*:*:*",
"matchCriteriaId": "E5177876-0FEC-481B-815F-84AF53968644",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.22.2:*:*:*:*:*:*:*",
"matchCriteriaId": "BC38566A-07F1-4F21-BAC1-259F844DC15C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.22.3:*:*:*:*:*:*:*",
"matchCriteriaId": "AE1684B8-3060-4139-BC06-707F27A05958",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.22.4:*:*:*:*:*:*:*",
"matchCriteriaId": "FF32C74C-3EA3-4E1F-BADA-BB4A92068266",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.22.5:*:*:*:*:*:*:*",
"matchCriteriaId": "D569A750-C649-4D40-89AB-D29773E66F66",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.22.6:*:*:*:*:*:*:*",
"matchCriteriaId": "95B69FA8-1182-46F1-952F-4610288ED409",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.22.7:*:*:*:*:*:*:*",
"matchCriteriaId": "5716BB97-7829-4FDE-92AC-69CA10332F45",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.23:*:*:*:*:*:*:*",
"matchCriteriaId": "02846865-D124-4C72-85C8-59A7C6F43E2E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.23.1:*:*:*:*:*:*:*",
"matchCriteriaId": "99B59422-ED6E-4F82-8D0C-091058D1C438",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.23.2:*:*:*:*:*:*:*",
"matchCriteriaId": "F658844A-6253-4A18-8A5D-1E818BE7A367",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.23.3:*:*:*:*:*:*:*",
"matchCriteriaId": "4753AB35-B95C-4544-A874-5E6D83929AC1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.23.4:*:*:*:*:*:*:*",
"matchCriteriaId": "C4880D54-CA42-4CCA-B01E-2C125002BF5C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.0:*:*:*:*:*:*:*",
"matchCriteriaId": "D4D9F54A-15A7-4899-B695-D9D8B96C4A9B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.0:rc1:*:*:*:*:*:*",
"matchCriteriaId": "BD56D9C0-38C6-4679-8104-1A0B88B71C0E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "45C36666-518F-4956-816A-940930425955",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "FF2DF96F-E45E-45AF-85E5-E939F923EC1B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "80EBAA09-F2C8-445E-8E3A-B5F937E1B1E2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.0.3:*:*:*:*:*:*:*",
"matchCriteriaId": "11C6713F-01ED-4AE9-AE42-89926067E6E6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.0.4:*:*:*:*:*:*:*",
"matchCriteriaId": "7AB5010D-37A3-4B6E-92B6-6F41A3708851",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.0.5:*:*:*:*:*:*:*",
"matchCriteriaId": "EEB09719-122F-4D25-B680-18029D5D9DE9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.0.6:*:*:*:*:*:*:*",
"matchCriteriaId": "AF585D92-9FAF-4858-A956-68AF77227333",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.0.7:*:*:*:*:*:*:*",
"matchCriteriaId": "7BA67823-C9D9-4C5B-A4ED-669E6F1851C0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.0.8:*:*:*:*:*:*:*",
"matchCriteriaId": "CB0F7531-A660-4604-80BD-15B01E2916BD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.0.9:*:*:*:*:*:*:*",
"matchCriteriaId": "A6FE6868-BB9F-4EB8-9E37-3438559CB01B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.0.10:*:*:*:*:*:*:*",
"matchCriteriaId": "1EC90352-C94A-4F47-AFB7-713B547373CC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.0.11:*:*:*:*:*:*:*",
"matchCriteriaId": "E5E77E01-D779-482A-9FAC-4AC210B68771",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "154EA18F-534C-4095-837D-BB9865D25F23",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "585F05F2-B294-4218-9209-C487B4D2994B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.1.2:*:*:*:*:*:*:*",
"matchCriteriaId": "F3246890-8D66-474F-AC9C-BC556426467D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.1.3:*:*:*:*:*:*:*",
"matchCriteriaId": "7090332F-4CC2-4ADD-AEEC-75238BCA55CC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.1.4:*:*:*:*:*:*:*",
"matchCriteriaId": "F960BE59-05B1-4438-A854-279612E13A7B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.2:*:*:*:*:*:*:*",
"matchCriteriaId": "F248EA4D-1A39-40FD-8D3C-9701D36FD6B1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.2:rc1:*:*:*:*:*:*",
"matchCriteriaId": "170EB43B-9488-4E25-9401-B84DE838247B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.2:rc2:*:*:*:*:*:*",
"matchCriteriaId": "B1ED7682-A315-4F92-9F9F-38290BCC058E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.2.1:*:*:*:*:*:*:*",
"matchCriteriaId": "14B5A433-526F-436E-9FCD-B71E661180FD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.2.2:*:*:*:*:*:*:*",
"matchCriteriaId": "48EDC5BC-AD4B-4E67-B79C-F44292307AB4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.2.3:*:*:*:*:*:*:*",
"matchCriteriaId": "6FEC62B7-2CAA-4A0D-A9B2-B4A6B105A6F7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.2.4:*:*:*:*:*:*:*",
"matchCriteriaId": "4B4A7A67-1355-4648-B8C9-3231BED96547",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.2.5:*:*:*:*:*:*:*",
"matchCriteriaId": "442AB3EE-61DF-4B25-ABEB-55905C01E376",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.2.6:*:*:*:*:*:*:*",
"matchCriteriaId": "7F825E34-D529-4ADC-A7D6-1BD9DAE86FC1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.2.7:*:*:*:*:*:*:*",
"matchCriteriaId": "C1F92D0C-AF71-4FD3-BC4B-C6D0F1F84F9B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.2.8:*:*:*:*:*:*:*",
"matchCriteriaId": "CBC26020-BFD7-493B-BDE2-1EC8DEA1A6DA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.2.9:*:*:*:*:*:*:*",
"matchCriteriaId": "984463B4-00A8-423B-B0C5-A7C4FECF064C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.2.10:*:*:*:*:*:*:*",
"matchCriteriaId": "6C7DC534-FF77-414C-A1DC-945F508CC3C9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.3:*:*:*:*:*:*:*",
"matchCriteriaId": "BEB4EF1D-D4D0-40DA-BE78-24FD48030EE0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.3.1:*:*:*:*:*:*:*",
"matchCriteriaId": "B2962084-F778-4574-8105-8C5A260CCBD7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.3.2:*:*:*:*:*:*:*",
"matchCriteriaId": "FF288A74-070E-4EB4-BB92-7D4D41635DD1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.3.3:*:*:*:*:*:*:*",
"matchCriteriaId": "5B8B31F0-6FCC-4258-865B-B65ECBFAF252",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.3.4:*:*:*:*:*:*:*",
"matchCriteriaId": "7A0CCF96-777F-4CEE-BC04-2974663CF5E7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.4:*:*:*:*:*:*:*",
"matchCriteriaId": "D6A71919-DC70-4AE2-9D16-76A177DAE331",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.4:rc1:*:*:*:*:*:*",
"matchCriteriaId": "780896D3-3B49-486F-A136-D3D175C00A34",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.4.1:*:*:*:*:*:*:*",
"matchCriteriaId": "EA43E47B-F474-4F5B-A91B-9AF99359FE5F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.4.2:*:*:*:*:*:*:*",
"matchCriteriaId": "A7A3A453-EE50-458C-8F31-D7AA232006FC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.4.3:*:*:*:*:*:*:*",
"matchCriteriaId": "3D920D39-683D-4F9F-AA85-3C4D1600DAD6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.4.4:*:*:*:*:*:*:*",
"matchCriteriaId": "E7A4F1FD-2B00-4A99-AAA1-DBBFE3748D87",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.4.5:*:*:*:*:*:*:*",
"matchCriteriaId": "EF6A3C0F-8778-4236-B4DC-41DBCF43EB62",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.4.6:*:*:*:*:*:*:*",
"matchCriteriaId": "7D134D4D-6A95-48FE-B8E5-4F90692CB4FD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.4.7:*:*:*:*:*:*:*",
"matchCriteriaId": "08C34E6F-8233-4575-AAE7-4DBFC27453F8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.4.8:*:*:*:*:*:*:*",
"matchCriteriaId": "6D8155F8-CAB1-4EED-B576-F4102253BD25",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.4.9:*:*:*:*:*:*:*",
"matchCriteriaId": "593D2F3B-A386-48D8-BF19-A12F1B4962A6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.4.10:*:*:*:*:*:*:*",
"matchCriteriaId": "F37C651D-8989-478B-A991-654FCDEC8B1D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.4.11:*:*:*:*:*:*:*",
"matchCriteriaId": "AE170AE5-37F5-4750-ACD9-13CA691A80C5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.4.12:*:*:*:*:*:*:*",
"matchCriteriaId": "1DE75B2F-A183-4ED9-A9E9-7ADF54C341FF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.4.13:*:*:*:*:*:*:*",
"matchCriteriaId": "A4D7380C-5608-4F96-82E3-4B36CDCD71EC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.5:*:*:*:*:*:*:*",
"matchCriteriaId": "850ADB66-21F2-49CB-B105-BDA16A286CFC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.5.1:*:*:*:*:*:*:*",
"matchCriteriaId": "1907D4D0-9D6E-476E-BD1A-88A32D3EFE38",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.5.2:*:*:*:*:*:*:*",
"matchCriteriaId": "61DD0779-786E-4714-AA73-86FB19E26028",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.5.3:*:*:*:*:*:*:*",
"matchCriteriaId": "A8E8DD97-5799-465D-8B99-F2BD6AA681AB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.6:*:*:*:*:*:*:*",
"matchCriteriaId": "03E40C09-0696-45BC-9AE8-9F6F20964600",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.6:rc1:*:*:*:*:*:*",
"matchCriteriaId": "397E07B5-3D9D-44C7-B8B3-18D04EE84405",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.6.0:*:*:*:*:*:*:*",
"matchCriteriaId": "4A1AD503-7F78-4597-AECD-6DC530AD4D3C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.6.1:*:*:*:*:*:*:*",
"matchCriteriaId": "BCAD5285-E485-4F49-99CF-287545260FDD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.6.2:*:*:*:*:*:*:*",
"matchCriteriaId": "5C193DF3-8D23-44A9-94DE-9F4F7358ED3F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.6.3:*:*:*:*:*:*:*",
"matchCriteriaId": "80BA8C84-32C3-4ECF-B4C7-573B12441D22",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.6.4:*:*:*:*:*:*:*",
"matchCriteriaId": "820EC9F1-B66C-43CE-B254-145F4AC23083",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.6.5:*:*:*:*:*:*:*",
"matchCriteriaId": "C4BDA6DC-8D53-417D-8320-CE266F8607B7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.6.6:*:*:*:*:*:*:*",
"matchCriteriaId": "5B01E0D5-3F26-4A71-A22C-FAD7CBF47283",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.6.7:*:*:*:*:*:*:*",
"matchCriteriaId": "6C33D8DA-86A4-4A70-82F8-27D5DE3881EA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.6.8:*:*:*:*:*:*:*",
"matchCriteriaId": "884D0728-8E3C-47F3-9DDD-FA976E1553EB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.6.9:*:*:*:*:*:*:*",
"matchCriteriaId": "C47C594A-D3B6-44FD-93D7-7E69212050BF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.6.10:*:*:*:*:*:*:*",
"matchCriteriaId": "551303CA-63C5-4A3A-9280-ADB2B77C05F7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.6.11:*:*:*:*:*:*:*",
"matchCriteriaId": "0777EB93-D11C-4837-BB7F-96DEC716E1BB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.6.12:*:*:*:*:*:*:*",
"matchCriteriaId": "10FFAD30-56A0-40C8-AE70-70DD9904C528",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.6.13:*:*:*:*:*:*:*",
"matchCriteriaId": "3620DE78-AF48-44EC-B211-E0C26F4E951F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.7:*:*:*:*:*:*:*",
"matchCriteriaId": "2757B2A7-5232-4245-9CC6-91BF9E3ECA09",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.7.1:*:*:*:*:*:*:*",
"matchCriteriaId": "740ADCB7-B296-4728-A73A-9691265B8F07",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.7.2:*:*:*:*:*:*:*",
"matchCriteriaId": "6187C92D-FEE9-4B1B-B7ED-9A1DD360B204",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.7.3:*:*:*:*:*:*:*",
"matchCriteriaId": "71213AF6-48CC-469F-9FBA-CAF1D3237657",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:4.0:*:*:*:*:*:*:*",
"matchCriteriaId": "DABC1683-0E04-456E-9500-68D0D35815E6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:4.0:rc1:*:*:*:*:*:*",
"matchCriteriaId": "38D71912-DCD6-44BB-8A86-72D207B49E58",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:4.0:rc2:*:*:*:*:*:*",
"matchCriteriaId": "D5A8816A-84EE-44B0-AD3B-5C9BC9B3E71E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:4.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "A367BFF0-397D-416F-960C-602E8B66421A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:4.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "A6229B76-3EB0-45D9-9667-7E94D0880AE7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:4.0.3:*:*:*:*:*:*:*",
"matchCriteriaId": "4FCD8B47-9BF6-4F3E-AF88-0416BE31EC65",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:4.0.4:*:*:*:*:*:*:*",
"matchCriteriaId": "C8D0ED4E-F1A7-43B7-B9D2-D6D6AA145459",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:4.0.5:*:*:*:*:*:*:*",
"matchCriteriaId": "93FE2861-A397-4439-9BB8-7B67D7F9D211",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:4.0.6:*:*:*:*:*:*:*",
"matchCriteriaId": "3AF08887-66BF-4B3C-81E9-F8443E7D3285",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:4.0.7:*:*:*:*:*:*:*",
"matchCriteriaId": "D2D243D2-0FD9-45E5-BE52-A2956F587122",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:4.0.8:*:*:*:*:*:*:*",
"matchCriteriaId": "6038EF72-2CDC-42A1-A20A-B23459776E21",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:4.0.9:*:*:*:*:*:*:*",
"matchCriteriaId": "66959932-AB8A-43C7-83CE-07EE576BF2F6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:4.0.10:*:*:*:*:*:*:*",
"matchCriteriaId": "145D0FF7-1691-4A73-95FA-284A9EF79F65",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:4.0.11:*:*:*:*:*:*:*",
"matchCriteriaId": "A9C9A0A8-139B-469D-ABE8-2724D65F7EAA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:4.0.12:*:*:*:*:*:*:*",
"matchCriteriaId": "4A54C2C7-AA44-46E9-BF03-E00018084093",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:4.0.13:*:*:*:*:*:*:*",
"matchCriteriaId": "BECED922-3748-4534-9750-3A061B939A0B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:4.0.16:*:*:*:*:*:*:*",
"matchCriteriaId": "9BF3A2DE-4E15-45E8-956E-B3368DBC4ED6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:4.1:*:*:*:*:*:*:*",
"matchCriteriaId": "85CDC579-6967-4E5C-B716-B2BC04F6DBF2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:4.1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "27783033-F558-427C-89A7-C3638C57F2A0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:4.1.2:*:*:*:*:*:*:*",
"matchCriteriaId": "E91557C7-8C53-49C4-8BC5-7F86D4AA09B8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:4.1.3:*:*:*:*:*:*:*",
"matchCriteriaId": "50448355-F1D3-48AB-AED0-5FE027D7C199",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:4.2:*:*:*:*:*:*:*",
"matchCriteriaId": "7CE9B4E3-8044-4305-A517-E695D0831355",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:4.2:rc1:*:*:*:*:*:*",
"matchCriteriaId": "4BDA28D1-5B26-4FBA-B685-C230569AF024",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:4.2:rc2:*:*:*:*:*:*",
"matchCriteriaId": "F61B90BF-3548-4D3A-BF70-A9DC96C11775",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:4.2.1:*:*:*:*:*:*:*",
"matchCriteriaId": "AD204F45-15FE-4677-BC4C-A53F322A3B15",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:4.2.2:*:*:*:*:*:*:*",
"matchCriteriaId": "22FAFCDF-C615-4958-9C6D-E74EC11E9A62",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:4.2.3:*:*:*:*:*:*:*",
"matchCriteriaId": "4D623AEB-622E-470E-898C-A447F9C4066A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:4.2.4:*:*:*:*:*:*:*",
"matchCriteriaId": "9019921A-B8D2-4774-AB6B-673FC2FD2197",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:4.2.5:*:*:*:*:*:*:*",
"matchCriteriaId": "1DC1A059-DDE4-4442-BD90-20AB3CE0E1CC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:4.2.6:*:*:*:*:*:*:*",
"matchCriteriaId": "4801DB4A-F828-4E95-8619-F909D5D39524",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:4.2.7:*:*:*:*:*:*:*",
"matchCriteriaId": "1E0D48CD-C77A-4D86-B091-2B8DF3ADA6D7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:4.2.8:*:*:*:*:*:*:*",
"matchCriteriaId": "956C5C97-E7A8-49F2-8AC6-9570A5948395",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:4.2.9:*:*:*:*:*:*:*",
"matchCriteriaId": "281A3D1A-1F92-454D-AE09-522114FF9D8D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:4.2.11:*:*:*:*:*:*:*",
"matchCriteriaId": "F874FD21-1D5D-4F0F-BEE1-93229AA3E8A6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:4.2.12:*:*:*:*:*:*:*",
"matchCriteriaId": "62B10FC3-30EC-46C7-9324-D91127647809",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:4.2.13:*:*:*:*:*:*:*",
"matchCriteriaId": "E2F9B052-F50C-41E0-B4B5-A5A4A5B3CE5D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:4.2.14:*:*:*:*:*:*:*",
"matchCriteriaId": "56AB0583-0DE5-4229-9D35-6C3539341C3F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:4.3:*:*:*:*:*:*:*",
"matchCriteriaId": "F119CA93-4D32-4852-90AD-A23215D6CBAC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:4.3.1:*:*:*:*:*:*:*",
"matchCriteriaId": "6CA9A1C4-412D-4EED-8259-04F48322238B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:4.3.2:*:*:*:*:*:*:*",
"matchCriteriaId": "27847E43-22AD-468D-8E64-8D56EA8CBE50",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:4.3.3:*:*:*:*:*:*:*",
"matchCriteriaId": "8DBB66FA-6E99-4F08-A223-6070E193B869",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:4.4:-:*:*:*:*:*:*",
"matchCriteriaId": "4ED67179-EEEB-488A-BD1C-9AE336D16AB5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:4.4:rc1:*:*:*:*:*:*",
"matchCriteriaId": "FF326273-99CF-40C3-B112-F5F18C94978F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:4.4:rc2:*:*:*:*:*:*",
"matchCriteriaId": "ECED66BE-C877-4250-AC7A-FAEAD9DAAC31",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:4.4.1:*:*:*:*:*:*:*",
"matchCriteriaId": "9FFFD96D-D0B5-47BB-91D9-3736E343711E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:4.4.2:*:*:*:*:*:*:*",
"matchCriteriaId": "4D710732-6D93-4143-874F-81B19F70FBEF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:4.4.3:*:*:*:*:*:*:*",
"matchCriteriaId": "FD56846F-40B5-4A45-99DB-44C56E3A20A3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:4.4.4:*:*:*:*:*:*:*",
"matchCriteriaId": "32C22A06-5F01-4C6A-886F-E3C0776C3C5B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:4.4.5:*:*:*:*:*:*:*",
"matchCriteriaId": "6457398E-A1C9-4F72-BBF7-FC54118FA91C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:4.4.6:*:*:*:*:*:*:*",
"matchCriteriaId": "47FF50AB-7156-4828-A6B5-6E7AF5152561",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:4.4.7:*:*:*:*:*:*:*",
"matchCriteriaId": "196B21CA-0EC5-4590-A584-01D667E31FD5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:4.4.8:*:*:*:*:*:*:*",
"matchCriteriaId": "A07C2A67-6D87-4451-BDCE-9570508386E8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:4.4.9:*:*:*:*:*:*:*",
"matchCriteriaId": "B1D189FB-9322-4E74-9B9E-26F0B3A235F9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:5.0:*:*:*:*:*:*:*",
"matchCriteriaId": "8925480C-C23F-42B6-A525-FC49E6936F9E",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Util.pm in Bugzilla 2.x, 3.x, and 4.x before 4.2.15, 4.3.x and 4.4.x before 4.4.10, and 5.x before 5.0.1 mishandles long e-mail addresses during account registration, which allows remote attackers to obtain the default privileges for an arbitrary domain name by placing that name in a substring of an address, as demonstrated by truncation of an @mozilla.com.example.com address to an @mozilla.com address."
},
{
"lang": "es",
"value": "Vulnerabilidad en Util.pm en Bugzilla 2.x, 3.x, y 4.x en versiones anteriores a 4.2.15, 4.3.x y 4.4.x en versiones anteriores a 4.4.10, y 5.x en versiones anteriores a 5.0.1, no gestiona correctamente direcciones de correo electr\u00f3nico de gran tama\u00f1o durante el registro de la cuenta, lo que permite a atacantes remotos obtener los privilegios predeterminados para un nombre de dominio arbitrario poniendo ese nombre en una subcadena de una direcci\u00f3n, seg\u00fan lo demostrado por el truncado de una cuenta @mozilla.com.example.com a una cuenta @mozilla.com."
}
],
"id": "CVE-2015-4499",
"lastModified": "2025-04-12T10:46:40.837",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
]
},
"published": "2015-09-14T01:59:01.607",
"references": [
{
"source": "security@mozilla.org",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-October/168725.html"
},
{
"source": "security@mozilla.org",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-October/169946.html"
},
{
"source": "security@mozilla.org",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-October/169983.html"
},
{
"source": "security@mozilla.org",
"url": "http://packetstormsecurity.com/files/133578/Bugzilla-Unauthorized-Account-Creation.html"
},
{
"source": "security@mozilla.org",
"tags": [
"Patch"
],
"url": "http://seclists.org/bugtraq/2015/Sep/48"
},
{
"source": "security@mozilla.org",
"tags": [
"Patch"
],
"url": "http://seclists.org/bugtraq/2015/Sep/49"
},
{
"source": "security@mozilla.org",
"url": "http://www.securitytracker.com/id/1033542"
},
{
"source": "security@mozilla.org",
"url": "https://bug1202447.bmoattachments.org/attachment.cgi?id=8657861"
},
{
"source": "security@mozilla.org",
"tags": [
"Exploit"
],
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1202447"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-October/168725.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-October/169946.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-October/169983.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://packetstormsecurity.com/files/133578/Bugzilla-Unauthorized-Account-Creation.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
],
"url": "http://seclists.org/bugtraq/2015/Sep/48"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
],
"url": "http://seclists.org/bugtraq/2015/Sep/49"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securitytracker.com/id/1033542"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://bug1202447.bmoattachments.org/attachment.cgi?id=8657861"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit"
],
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1202447"
}
],
"sourceIdentifier": "security@mozilla.org",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-20"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
FKIE_CVE-2014-8630
Vulnerability from fkie_nvd - Published: 2015-02-01 15:59 - Updated: 2025-04-12 10:46| Vendor | Product | Version | |
|---|---|---|---|
| mozilla | bugzilla | * | |
| mozilla | bugzilla | 4.1 | |
| mozilla | bugzilla | 4.1.1 | |
| mozilla | bugzilla | 4.1.2 | |
| mozilla | bugzilla | 4.1.3 | |
| mozilla | bugzilla | 4.2 | |
| mozilla | bugzilla | 4.2 | |
| mozilla | bugzilla | 4.2 | |
| mozilla | bugzilla | 4.2.1 | |
| mozilla | bugzilla | 4.2.2 | |
| mozilla | bugzilla | 4.2.3 | |
| mozilla | bugzilla | 4.2.4 | |
| mozilla | bugzilla | 4.2.5 | |
| mozilla | bugzilla | 4.2.6 | |
| mozilla | bugzilla | 4.2.7 | |
| mozilla | bugzilla | 4.2.8 | |
| mozilla | bugzilla | 4.2.9 | |
| mozilla | bugzilla | 4.2.10 | |
| mozilla | bugzilla | 4.2.11 | |
| mozilla | bugzilla | 4.3 | |
| mozilla | bugzilla | 4.3.1 | |
| mozilla | bugzilla | 4.3.2 | |
| mozilla | bugzilla | 4.3.3 | |
| mozilla | bugzilla | 4.4 | |
| mozilla | bugzilla | 4.4 | |
| mozilla | bugzilla | 4.4 | |
| mozilla | bugzilla | 4.4.1 | |
| mozilla | bugzilla | 4.4.2 | |
| mozilla | bugzilla | 4.4.3 | |
| mozilla | bugzilla | 4.4.4 | |
| mozilla | bugzilla | 4.4.5 | |
| mozilla | bugzilla | 4.4.6 | |
| mozilla | bugzilla | 4.5 | |
| mozilla | bugzilla | 4.5.1 | |
| mozilla | bugzilla | 4.5.2 | |
| mozilla | bugzilla | 4.5.3 | |
| mozilla | bugzilla | 4.5.4 | |
| mozilla | bugzilla | 4.5.5 | |
| mozilla | bugzilla | 4.5.6 | |
| fedoraproject | fedora | 20 | |
| fedoraproject | fedora | 21 |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:*:*:*:*:*:*:*:*",
"matchCriteriaId": "2A5B0526-E225-4A59-9396-01D73DE030E7",
"versionEndIncluding": "4.0.16",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:4.1:*:*:*:*:*:*:*",
"matchCriteriaId": "85CDC579-6967-4E5C-B716-B2BC04F6DBF2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:4.1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "27783033-F558-427C-89A7-C3638C57F2A0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:4.1.2:*:*:*:*:*:*:*",
"matchCriteriaId": "E91557C7-8C53-49C4-8BC5-7F86D4AA09B8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:4.1.3:*:*:*:*:*:*:*",
"matchCriteriaId": "50448355-F1D3-48AB-AED0-5FE027D7C199",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:4.2:*:*:*:*:*:*:*",
"matchCriteriaId": "7CE9B4E3-8044-4305-A517-E695D0831355",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:4.2:rc1:*:*:*:*:*:*",
"matchCriteriaId": "4BDA28D1-5B26-4FBA-B685-C230569AF024",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:4.2:rc2:*:*:*:*:*:*",
"matchCriteriaId": "F61B90BF-3548-4D3A-BF70-A9DC96C11775",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:4.2.1:*:*:*:*:*:*:*",
"matchCriteriaId": "AD204F45-15FE-4677-BC4C-A53F322A3B15",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:4.2.2:*:*:*:*:*:*:*",
"matchCriteriaId": "22FAFCDF-C615-4958-9C6D-E74EC11E9A62",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:4.2.3:*:*:*:*:*:*:*",
"matchCriteriaId": "4D623AEB-622E-470E-898C-A447F9C4066A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:4.2.4:*:*:*:*:*:*:*",
"matchCriteriaId": "9019921A-B8D2-4774-AB6B-673FC2FD2197",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:4.2.5:*:*:*:*:*:*:*",
"matchCriteriaId": "1DC1A059-DDE4-4442-BD90-20AB3CE0E1CC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:4.2.6:*:*:*:*:*:*:*",
"matchCriteriaId": "4801DB4A-F828-4E95-8619-F909D5D39524",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:4.2.7:*:*:*:*:*:*:*",
"matchCriteriaId": "1E0D48CD-C77A-4D86-B091-2B8DF3ADA6D7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:4.2.8:*:*:*:*:*:*:*",
"matchCriteriaId": "956C5C97-E7A8-49F2-8AC6-9570A5948395",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:4.2.9:*:*:*:*:*:*:*",
"matchCriteriaId": "281A3D1A-1F92-454D-AE09-522114FF9D8D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:4.2.10:*:*:*:*:*:*:*",
"matchCriteriaId": "717B879A-EDEA-4917-A75E-2C40BB8D35D7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:4.2.11:*:*:*:*:*:*:*",
"matchCriteriaId": "F874FD21-1D5D-4F0F-BEE1-93229AA3E8A6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:4.3:*:*:*:*:*:*:*",
"matchCriteriaId": "F119CA93-4D32-4852-90AD-A23215D6CBAC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:4.3.1:*:*:*:*:*:*:*",
"matchCriteriaId": "6CA9A1C4-412D-4EED-8259-04F48322238B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:4.3.2:*:*:*:*:*:*:*",
"matchCriteriaId": "27847E43-22AD-468D-8E64-8D56EA8CBE50",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:4.3.3:*:*:*:*:*:*:*",
"matchCriteriaId": "8DBB66FA-6E99-4F08-A223-6070E193B869",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:4.4:*:*:*:*:*:*:*",
"matchCriteriaId": "D00AE646-61CC-4036-8B8F-35B818530BFC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:4.4:rc1:*:*:*:*:*:*",
"matchCriteriaId": "FF326273-99CF-40C3-B112-F5F18C94978F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:4.4:rc2:*:*:*:*:*:*",
"matchCriteriaId": "ECED66BE-C877-4250-AC7A-FAEAD9DAAC31",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:4.4.1:*:*:*:*:*:*:*",
"matchCriteriaId": "9FFFD96D-D0B5-47BB-91D9-3736E343711E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:4.4.2:*:*:*:*:*:*:*",
"matchCriteriaId": "4D710732-6D93-4143-874F-81B19F70FBEF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:4.4.3:*:*:*:*:*:*:*",
"matchCriteriaId": "FD56846F-40B5-4A45-99DB-44C56E3A20A3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:4.4.4:*:*:*:*:*:*:*",
"matchCriteriaId": "32C22A06-5F01-4C6A-886F-E3C0776C3C5B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:4.4.5:*:*:*:*:*:*:*",
"matchCriteriaId": "6457398E-A1C9-4F72-BBF7-FC54118FA91C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:4.4.6:*:*:*:*:*:*:*",
"matchCriteriaId": "47FF50AB-7156-4828-A6B5-6E7AF5152561",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:4.5:*:*:*:*:*:*:*",
"matchCriteriaId": "5FA8C43E-AD0C-45F7-BC20-61358C7F23EA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:4.5.1:*:*:*:*:*:*:*",
"matchCriteriaId": "E86608A6-8B14-4D27-A86B-1DD10E1F7825",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:4.5.2:*:*:*:*:*:*:*",
"matchCriteriaId": "D7F176CD-2EE5-4C7D-A376-4EA8918610C3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:4.5.3:*:*:*:*:*:*:*",
"matchCriteriaId": "0BD5F23A-33EC-4D8A-B39D-972A048DAB0A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:4.5.4:*:*:*:*:*:*:*",
"matchCriteriaId": "D1F3C39E-50A1-4005-AC0B-097A1FA6E1C2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:4.5.5:*:*:*:*:*:*:*",
"matchCriteriaId": "47A322B9-DA3A-448C-BD61-3E67A98AC74E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:4.5.6:*:*:*:*:*:*:*",
"matchCriteriaId": "482DEB13-B194-4D5E-9C5A-E1502108741C",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:fedoraproject:fedora:20:*:*:*:*:*:*:*",
"matchCriteriaId": "FF47C9F0-D8DA-4B55-89EB-9B2C9383ADB9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:fedoraproject:fedora:21:*:*:*:*:*:*:*",
"matchCriteriaId": "56BDB5A0-0839-4A20-A003-B8CD56F48171",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Bugzilla before 4.0.16, 4.1.x and 4.2.x before 4.2.12, 4.3.x and 4.4.x before 4.4.7, and 5.x before 5.0rc1 allows remote authenticated users to execute arbitrary commands by leveraging the editcomponents privilege and triggering crafted input to a two-argument Perl open call, as demonstrated by shell metacharacters in a product name."
},
{
"lang": "es",
"value": "Bugzilla anterior a 4.0.16, 4.1.x y 4.2.x anterior a 4.2.12, 4.3.x y 4.4.x anterior a 4.4.7, y 5.x anterior a 5.0rc1 permite a usuarios remotos autenticados ejecutar comandos arbitrarios mediante el aprovechamiento del privilegio editcomponents y la provocaci\u00f3n de entradas manipuladas en una llamada abierta de doble argumento Perl, tal y como fue demostrado mediante megacaracteres de shell en el nombre de un producto."
}
],
"id": "CVE-2014-8630",
"lastModified": "2025-04-12T10:46:40.837",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.5,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 8.0,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
]
},
"published": "2015-02-01T15:59:04.353",
"references": [
{
"source": "security@mozilla.org",
"url": "http://advisories.mageia.org/MGASA-2015-0048.html"
},
{
"source": "security@mozilla.org",
"tags": [
"Third Party Advisory"
],
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-February/149921.html"
},
{
"source": "security@mozilla.org",
"tags": [
"Third Party Advisory"
],
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-February/149925.html"
},
{
"source": "security@mozilla.org",
"tags": [
"Issue Tracking",
"Patch",
"Vendor Advisory"
],
"url": "http://www.bugzilla.org/security/4.0.15/"
},
{
"source": "security@mozilla.org",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:030"
},
{
"source": "security@mozilla.org",
"tags": [
"Issue Tracking",
"Vendor Advisory"
],
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1079065"
},
{
"source": "security@mozilla.org",
"url": "https://security.gentoo.org/glsa/201607-11"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://advisories.mageia.org/MGASA-2015-0048.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-February/149921.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-February/149925.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Issue Tracking",
"Patch",
"Vendor Advisory"
],
"url": "http://www.bugzilla.org/security/4.0.15/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:030"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Issue Tracking",
"Vendor Advisory"
],
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1079065"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://security.gentoo.org/glsa/201607-11"
}
],
"sourceIdentifier": "security@mozilla.org",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-77"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
FKIE_CVE-2014-1573
Vulnerability from fkie_nvd - Published: 2014-10-13 01:55 - Updated: 2025-04-12 10:46{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:fedoraproject:fedora:19:*:*:*:*:*:*:*",
"matchCriteriaId": "5991814D-CA77-4C25-90D2-DB542B17E0AD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:fedoraproject:fedora:20:*:*:*:*:*:*:*",
"matchCriteriaId": "FF47C9F0-D8DA-4B55-89EB-9B2C9383ADB9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:fedoraproject:fedora:21:*:*:*:*:*:*:*",
"matchCriteriaId": "56BDB5A0-0839-4A20-A003-B8CD56F48171",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "DC38A53F-60E6-4F7A-A953-C53D141E830D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.2:*:*:*:*:*:*:*",
"matchCriteriaId": "DAFEF951-3FE8-49DD-B3DD-E526D5B52998",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.4:*:*:*:*:*:*:*",
"matchCriteriaId": "8112FF13-B4CE-4DC7-85B1-C69D975F162B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.6:*:*:*:*:*:*:*",
"matchCriteriaId": "86F5A3CA-E4A6-4E51-AC83-0C8F3E5E2C4E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.8:*:*:*:*:*:*:*",
"matchCriteriaId": "F6E5E379-D475-42F3-B0DC-3D04C1D25566",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.9:*:*:*:*:*:*:*",
"matchCriteriaId": "A3B3EF74-4784-47A7-8994-21EF489F4008",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.10:*:*:*:*:*:*:*",
"matchCriteriaId": "893741D3-062B-45F9-B5A3-1B81058E7FD7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.12:*:*:*:*:*:*:*",
"matchCriteriaId": "E8D53B5F-6AEE-4192-B838-E1DA92C59285",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.14:*:*:*:*:*:*:*",
"matchCriteriaId": "1883A98C-E595-4F3C-87BF-A63393F9F561",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.14.1:*:*:*:*:*:*:*",
"matchCriteriaId": "DD49E53A-5676-4FAC-A8A2-30FAC04C33D7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.14.2:*:*:*:*:*:*:*",
"matchCriteriaId": "1084AF8E-5269-4EFF-BBD2-C5A77945FCF2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.14.3:*:*:*:*:*:*:*",
"matchCriteriaId": "D9A4B035-B73E-48E9-BBB9-83219F5D2A95",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.14.4:*:*:*:*:*:*:*",
"matchCriteriaId": "9452C271-2812-4775-8396-394C642EACFD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.14.5:*:*:*:*:*:*:*",
"matchCriteriaId": "2D351AF2-C0AB-4BB3-8692-677A3025A615",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.16:*:*:*:*:*:*:*",
"matchCriteriaId": "F16D338E-C5BC-46E1-95DD-D9B0E25EE56E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.16:rc1:*:*:*:*:*:*",
"matchCriteriaId": "5877CECA-F758-4F48-B4F4-2C4C1DF01FA0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.16:rc2:*:*:*:*:*:*",
"matchCriteriaId": "D63CE086-5872-4594-8F4B-8D812E7EF09C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.16.1:*:*:*:*:*:*:*",
"matchCriteriaId": "19F19219-3AFD-4D8E-B02B-BFCBD1BC7C36",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.16.2:*:*:*:*:*:*:*",
"matchCriteriaId": "B900D9A7-913A-4176-90CF-C7C3B09A4261",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.16.3:*:*:*:*:*:*:*",
"matchCriteriaId": "B692910E-633D-4A88-B245-56A2B58DD4CB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.16.4:*:*:*:*:*:*:*",
"matchCriteriaId": "F86EE5DB-442B-4C78-8152-AF1048C6A974",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.16.5:*:*:*:*:*:*:*",
"matchCriteriaId": "19B82A1A-56EB-41D5-8619-2A717E3A6ECF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.16.6:*:*:*:*:*:*:*",
"matchCriteriaId": "83A0406C-AAF2-4A4C-9567-E21DF1B6C46E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.16.7:*:*:*:*:*:*:*",
"matchCriteriaId": "64434BFC-DDC0-4C7D-B578-472B0610C89E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.16.8:*:*:*:*:*:*:*",
"matchCriteriaId": "A30F28D9-B000-4C26-A911-5E1B8A867BF6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.16.9:*:*:*:*:*:*:*",
"matchCriteriaId": "4A123F78-A671-4FB5-AE78-83762E9323C7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.16.10:*:*:*:*:*:*:*",
"matchCriteriaId": "28C34288-A326-4B71-99B0-DA9FFD28160F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.16.11:*:*:*:*:*:*:*",
"matchCriteriaId": "73648879-BB08-4BE4-A7FF-1E8DF4E264B4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.16_rc2:*:*:*:*:*:*:*",
"matchCriteriaId": "1B4CC7E4-617D-498E-A367-374478158FA5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.17:*:*:*:*:*:*:*",
"matchCriteriaId": "9B2FC5C7-B218-4B87-9805-F90AC0E7A281",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.17.1:*:*:*:*:*:*:*",
"matchCriteriaId": "BBCDA64F-C49A-4F5B-B285-4079D8E3A499",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.17.2:*:*:*:*:*:*:*",
"matchCriteriaId": "930AF809-CA52-41CB-985A-066B8239C7CD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.17.3:*:*:*:*:*:*:*",
"matchCriteriaId": "85ED3457-CC21-4DB3-931F-677F723E1B2A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.17.4:*:*:*:*:*:*:*",
"matchCriteriaId": "6C8711D3-55CF-4131-BBAC-6BE07068219F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.17.5:*:*:*:*:*:*:*",
"matchCriteriaId": "DF54FFA5-5177-46E6-9AFA-BA3345C16E8A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.17.6:*:*:*:*:*:*:*",
"matchCriteriaId": "69D7EA7C-B401-4F5A-AC08-2199DD117403",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.17.7:*:*:*:*:*:*:*",
"matchCriteriaId": "DC2DDC7C-CD2B-4597-A5E0-266A884958FC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.18:*:*:*:*:*:*:*",
"matchCriteriaId": "DDB99B2D-CA05-4BC0-BCA4-9B94DF248333",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.18:rc1:*:*:*:*:*:*",
"matchCriteriaId": "3635C0E9-2E43-4BAE-8267-2BB2F68B03BD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.18:rc2:*:*:*:*:*:*",
"matchCriteriaId": "4869A709-AF79-49BD-A7D2-D48A8D79A085",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.18:rc3:*:*:*:*:*:*",
"matchCriteriaId": "EAC72143-27C3-498F-AFAB-98AE043C0545",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.18.1:*:*:*:*:*:*:*",
"matchCriteriaId": "BE5E8E72-D493-460D-B5A0-F90C291398A5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.18.2:*:*:*:*:*:*:*",
"matchCriteriaId": "04885D31-09F3-455F-A1A9-815E182ABCF9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.18.3:*:*:*:*:*:*:*",
"matchCriteriaId": "F153300E-42CC-4BDD-88EC-E8A0ADB4E3B7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.18.4:*:*:*:*:*:*:*",
"matchCriteriaId": "92BCD546-2A50-4F43-935C-B68459EE894E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.18.5:*:*:*:*:*:*:*",
"matchCriteriaId": "C535BAB7-6146-440B-ADBD-51007585CFC8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.18.6:*:*:*:*:*:*:*",
"matchCriteriaId": "7B6BA7E8-DEC7-4D94-B9F9-B70EC39FD892",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.18.6\\+:*:*:*:*:*:*:*",
"matchCriteriaId": "15E6F17A-7292-4640-A5E6-59865D1CDD7B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.18.7:*:*:*:*:*:*:*",
"matchCriteriaId": "E9130B6B-764B-4B83-A2BD-E16013682875",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.18.8:*:*:*:*:*:*:*",
"matchCriteriaId": "7C7A5111-8729-48DF-B308-7A489BEFA6D0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.18.9:*:*:*:*:*:*:*",
"matchCriteriaId": "15E24C39-0E61-4A57-B93F-F0ABF4CEAEEB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.19:*:*:*:*:*:*:*",
"matchCriteriaId": "725BD7BE-1769-4032-ADA8-9ED15528C770",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.19.1:*:*:*:*:*:*:*",
"matchCriteriaId": "239D70F4-7D86-4A57-ACEF-440F68994FB6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.19.2:*:*:*:*:*:*:*",
"matchCriteriaId": "ABEE2C94-DA69-4A78-A15F-538383A7460E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.19.3:*:*:*:*:*:*:*",
"matchCriteriaId": "4F7CD64E-7FAA-40DC-B36E-8B7EB9D620FB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.20:*:*:*:*:*:*:*",
"matchCriteriaId": "A749C7AB-6F60-469C-BD95-759205DDA345",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.20:rc1:*:*:*:*:*:*",
"matchCriteriaId": "B45F6C27-D89A-42A0-A304-5B0C57D2A9F1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.20:rc2:*:*:*:*:*:*",
"matchCriteriaId": "196B7CD8-D721-4CFB-B126-78758128E900",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.20.1:*:*:*:*:*:*:*",
"matchCriteriaId": "BEA9DE63-9951-4FE0-80BE-0F6F197303D7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.20.2:*:*:*:*:*:*:*",
"matchCriteriaId": "B0CEDD02-1CB8-4D5B-B82B-E300B4E39065",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.20.3:*:*:*:*:*:*:*",
"matchCriteriaId": "8E27101B-7985-4412-A14F-9ED11E4C874C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.20.4:*:*:*:*:*:*:*",
"matchCriteriaId": "8A74E8A2-223E-4877-989E-494362B513E9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.20.5:*:*:*:*:*:*:*",
"matchCriteriaId": "E0CAFB45-B115-4492-9919-60223304BB27",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.20.6:*:*:*:*:*:*:*",
"matchCriteriaId": "DC3F7C44-C734-419B-AB62-3AD52554FC7D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.20.7:*:*:*:*:*:*:*",
"matchCriteriaId": "695036D1-994C-451E-8D53-0A345702E4D1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.21:*:*:*:*:*:*:*",
"matchCriteriaId": "2053CFB4-602E-4141-BB3D-A440E2A31D85",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.21.1:*:*:*:*:*:*:*",
"matchCriteriaId": "31ACBA13-AC13-4469-862F-B3DD2327B6FC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.21.2:*:*:*:*:*:*:*",
"matchCriteriaId": "9E9EC243-3E25-4234-A88A-FDD5B594BFBA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.21.2:rc1:*:*:*:*:*:*",
"matchCriteriaId": "AE0570E9-B967-4325-92CB-2FB6CA010C4F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.22:*:*:*:*:*:*:*",
"matchCriteriaId": "F2969731-8256-431B-9356-4BC873D98F6D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.22:rc1:*:*:*:*:*:*",
"matchCriteriaId": "1C166E42-9B36-4883-B738-EEBEF3056D98",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.22.1:*:*:*:*:*:*:*",
"matchCriteriaId": "E5177876-0FEC-481B-815F-84AF53968644",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.22.2:*:*:*:*:*:*:*",
"matchCriteriaId": "BC38566A-07F1-4F21-BAC1-259F844DC15C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.22.3:*:*:*:*:*:*:*",
"matchCriteriaId": "AE1684B8-3060-4139-BC06-707F27A05958",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.22.4:*:*:*:*:*:*:*",
"matchCriteriaId": "FF32C74C-3EA3-4E1F-BADA-BB4A92068266",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.22.5:*:*:*:*:*:*:*",
"matchCriteriaId": "D569A750-C649-4D40-89AB-D29773E66F66",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.22.6:*:*:*:*:*:*:*",
"matchCriteriaId": "95B69FA8-1182-46F1-952F-4610288ED409",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.22.7:*:*:*:*:*:*:*",
"matchCriteriaId": "5716BB97-7829-4FDE-92AC-69CA10332F45",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.23:*:*:*:*:*:*:*",
"matchCriteriaId": "02846865-D124-4C72-85C8-59A7C6F43E2E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.23.1:*:*:*:*:*:*:*",
"matchCriteriaId": "99B59422-ED6E-4F82-8D0C-091058D1C438",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.23.2:*:*:*:*:*:*:*",
"matchCriteriaId": "F658844A-6253-4A18-8A5D-1E818BE7A367",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.23.3:*:*:*:*:*:*:*",
"matchCriteriaId": "4753AB35-B95C-4544-A874-5E6D83929AC1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.23.4:*:*:*:*:*:*:*",
"matchCriteriaId": "C4880D54-CA42-4CCA-B01E-2C125002BF5C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.0:*:*:*:*:*:*:*",
"matchCriteriaId": "D4D9F54A-15A7-4899-B695-D9D8B96C4A9B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.0:rc1:*:*:*:*:*:*",
"matchCriteriaId": "BD56D9C0-38C6-4679-8104-1A0B88B71C0E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "45C36666-518F-4956-816A-940930425955",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "FF2DF96F-E45E-45AF-85E5-E939F923EC1B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "80EBAA09-F2C8-445E-8E3A-B5F937E1B1E2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.0.3:*:*:*:*:*:*:*",
"matchCriteriaId": "11C6713F-01ED-4AE9-AE42-89926067E6E6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.0.4:*:*:*:*:*:*:*",
"matchCriteriaId": "7AB5010D-37A3-4B6E-92B6-6F41A3708851",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.0.5:*:*:*:*:*:*:*",
"matchCriteriaId": "EEB09719-122F-4D25-B680-18029D5D9DE9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.0.6:*:*:*:*:*:*:*",
"matchCriteriaId": "AF585D92-9FAF-4858-A956-68AF77227333",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.0.7:*:*:*:*:*:*:*",
"matchCriteriaId": "7BA67823-C9D9-4C5B-A4ED-669E6F1851C0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.0.8:*:*:*:*:*:*:*",
"matchCriteriaId": "CB0F7531-A660-4604-80BD-15B01E2916BD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.0.9:*:*:*:*:*:*:*",
"matchCriteriaId": "A6FE6868-BB9F-4EB8-9E37-3438559CB01B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.0.10:*:*:*:*:*:*:*",
"matchCriteriaId": "1EC90352-C94A-4F47-AFB7-713B547373CC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.0.11:*:*:*:*:*:*:*",
"matchCriteriaId": "E5E77E01-D779-482A-9FAC-4AC210B68771",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.0_rc1:*:*:*:*:*:*:*",
"matchCriteriaId": "5E608E27-D43C-4F34-952D-2F49A71B1E2B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "154EA18F-534C-4095-837D-BB9865D25F23",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "585F05F2-B294-4218-9209-C487B4D2994B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.1.2:*:*:*:*:*:*:*",
"matchCriteriaId": "F3246890-8D66-474F-AC9C-BC556426467D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.1.3:*:*:*:*:*:*:*",
"matchCriteriaId": "7090332F-4CC2-4ADD-AEEC-75238BCA55CC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.1.4:*:*:*:*:*:*:*",
"matchCriteriaId": "F960BE59-05B1-4438-A854-279612E13A7B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.2:*:*:*:*:*:*:*",
"matchCriteriaId": "F248EA4D-1A39-40FD-8D3C-9701D36FD6B1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.2:rc1:*:*:*:*:*:*",
"matchCriteriaId": "170EB43B-9488-4E25-9401-B84DE838247B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.2:rc2:*:*:*:*:*:*",
"matchCriteriaId": "B1ED7682-A315-4F92-9F9F-38290BCC058E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.2.1:*:*:*:*:*:*:*",
"matchCriteriaId": "14B5A433-526F-436E-9FCD-B71E661180FD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.2.2:*:*:*:*:*:*:*",
"matchCriteriaId": "48EDC5BC-AD4B-4E67-B79C-F44292307AB4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.2.3:*:*:*:*:*:*:*",
"matchCriteriaId": "6FEC62B7-2CAA-4A0D-A9B2-B4A6B105A6F7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.2.4:*:*:*:*:*:*:*",
"matchCriteriaId": "4B4A7A67-1355-4648-B8C9-3231BED96547",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.2.5:*:*:*:*:*:*:*",
"matchCriteriaId": "442AB3EE-61DF-4B25-ABEB-55905C01E376",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.2.6:*:*:*:*:*:*:*",
"matchCriteriaId": "7F825E34-D529-4ADC-A7D6-1BD9DAE86FC1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.2.7:*:*:*:*:*:*:*",
"matchCriteriaId": "C1F92D0C-AF71-4FD3-BC4B-C6D0F1F84F9B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.2.8:*:*:*:*:*:*:*",
"matchCriteriaId": "CBC26020-BFD7-493B-BDE2-1EC8DEA1A6DA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.2.9:*:*:*:*:*:*:*",
"matchCriteriaId": "984463B4-00A8-423B-B0C5-A7C4FECF064C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.2.10:*:*:*:*:*:*:*",
"matchCriteriaId": "6C7DC534-FF77-414C-A1DC-945F508CC3C9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.3:*:*:*:*:*:*:*",
"matchCriteriaId": "BEB4EF1D-D4D0-40DA-BE78-24FD48030EE0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.3.1:*:*:*:*:*:*:*",
"matchCriteriaId": "B2962084-F778-4574-8105-8C5A260CCBD7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.3.2:*:*:*:*:*:*:*",
"matchCriteriaId": "FF288A74-070E-4EB4-BB92-7D4D41635DD1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.3.3:*:*:*:*:*:*:*",
"matchCriteriaId": "5B8B31F0-6FCC-4258-865B-B65ECBFAF252",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.3.4:*:*:*:*:*:*:*",
"matchCriteriaId": "7A0CCF96-777F-4CEE-BC04-2974663CF5E7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.4:*:*:*:*:*:*:*",
"matchCriteriaId": "D6A71919-DC70-4AE2-9D16-76A177DAE331",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.4:rc1:*:*:*:*:*:*",
"matchCriteriaId": "780896D3-3B49-486F-A136-D3D175C00A34",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.4.1:*:*:*:*:*:*:*",
"matchCriteriaId": "EA43E47B-F474-4F5B-A91B-9AF99359FE5F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.4.2:*:*:*:*:*:*:*",
"matchCriteriaId": "A7A3A453-EE50-458C-8F31-D7AA232006FC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.4.3:*:*:*:*:*:*:*",
"matchCriteriaId": "3D920D39-683D-4F9F-AA85-3C4D1600DAD6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.4.4:*:*:*:*:*:*:*",
"matchCriteriaId": "E7A4F1FD-2B00-4A99-AAA1-DBBFE3748D87",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.4.5:*:*:*:*:*:*:*",
"matchCriteriaId": "EF6A3C0F-8778-4236-B4DC-41DBCF43EB62",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.4.6:*:*:*:*:*:*:*",
"matchCriteriaId": "7D134D4D-6A95-48FE-B8E5-4F90692CB4FD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.4.7:*:*:*:*:*:*:*",
"matchCriteriaId": "08C34E6F-8233-4575-AAE7-4DBFC27453F8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.4.8:*:*:*:*:*:*:*",
"matchCriteriaId": "6D8155F8-CAB1-4EED-B576-F4102253BD25",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.4.9:*:*:*:*:*:*:*",
"matchCriteriaId": "593D2F3B-A386-48D8-BF19-A12F1B4962A6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.4.10:*:*:*:*:*:*:*",
"matchCriteriaId": "F37C651D-8989-478B-A991-654FCDEC8B1D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.4.11:*:*:*:*:*:*:*",
"matchCriteriaId": "AE170AE5-37F5-4750-ACD9-13CA691A80C5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.4.12:*:*:*:*:*:*:*",
"matchCriteriaId": "1DE75B2F-A183-4ED9-A9E9-7ADF54C341FF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.4.13:*:*:*:*:*:*:*",
"matchCriteriaId": "A4D7380C-5608-4F96-82E3-4B36CDCD71EC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.5:*:*:*:*:*:*:*",
"matchCriteriaId": "850ADB66-21F2-49CB-B105-BDA16A286CFC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.5.1:*:*:*:*:*:*:*",
"matchCriteriaId": "1907D4D0-9D6E-476E-BD1A-88A32D3EFE38",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.5.2:*:*:*:*:*:*:*",
"matchCriteriaId": "61DD0779-786E-4714-AA73-86FB19E26028",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.5.3:*:*:*:*:*:*:*",
"matchCriteriaId": "A8E8DD97-5799-465D-8B99-F2BD6AA681AB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.6:*:*:*:*:*:*:*",
"matchCriteriaId": "03E40C09-0696-45BC-9AE8-9F6F20964600",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.6:rc1:*:*:*:*:*:*",
"matchCriteriaId": "397E07B5-3D9D-44C7-B8B3-18D04EE84405",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.6.0:*:*:*:*:*:*:*",
"matchCriteriaId": "4A1AD503-7F78-4597-AECD-6DC530AD4D3C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.6.1:*:*:*:*:*:*:*",
"matchCriteriaId": "BCAD5285-E485-4F49-99CF-287545260FDD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.6.2:*:*:*:*:*:*:*",
"matchCriteriaId": "5C193DF3-8D23-44A9-94DE-9F4F7358ED3F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.6.3:*:*:*:*:*:*:*",
"matchCriteriaId": "80BA8C84-32C3-4ECF-B4C7-573B12441D22",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.6.4:*:*:*:*:*:*:*",
"matchCriteriaId": "820EC9F1-B66C-43CE-B254-145F4AC23083",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.6.5:*:*:*:*:*:*:*",
"matchCriteriaId": "C4BDA6DC-8D53-417D-8320-CE266F8607B7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.6.6:*:*:*:*:*:*:*",
"matchCriteriaId": "5B01E0D5-3F26-4A71-A22C-FAD7CBF47283",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.6.7:*:*:*:*:*:*:*",
"matchCriteriaId": "6C33D8DA-86A4-4A70-82F8-27D5DE3881EA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.6.8:*:*:*:*:*:*:*",
"matchCriteriaId": "884D0728-8E3C-47F3-9DDD-FA976E1553EB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.6.9:*:*:*:*:*:*:*",
"matchCriteriaId": "C47C594A-D3B6-44FD-93D7-7E69212050BF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.6.10:*:*:*:*:*:*:*",
"matchCriteriaId": "551303CA-63C5-4A3A-9280-ADB2B77C05F7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.6.11:*:*:*:*:*:*:*",
"matchCriteriaId": "0777EB93-D11C-4837-BB7F-96DEC716E1BB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.6.12:*:*:*:*:*:*:*",
"matchCriteriaId": "10FFAD30-56A0-40C8-AE70-70DD9904C528",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.6.13:*:*:*:*:*:*:*",
"matchCriteriaId": "3620DE78-AF48-44EC-B211-E0C26F4E951F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.7:*:*:*:*:*:*:*",
"matchCriteriaId": "2757B2A7-5232-4245-9CC6-91BF9E3ECA09",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.7.1:*:*:*:*:*:*:*",
"matchCriteriaId": "740ADCB7-B296-4728-A73A-9691265B8F07",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.7.2:*:*:*:*:*:*:*",
"matchCriteriaId": "6187C92D-FEE9-4B1B-B7ED-9A1DD360B204",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.7.3:*:*:*:*:*:*:*",
"matchCriteriaId": "71213AF6-48CC-469F-9FBA-CAF1D3237657",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:4.0:*:*:*:*:*:*:*",
"matchCriteriaId": "DABC1683-0E04-456E-9500-68D0D35815E6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:4.0:rc1:*:*:*:*:*:*",
"matchCriteriaId": "38D71912-DCD6-44BB-8A86-72D207B49E58",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:4.0:rc2:*:*:*:*:*:*",
"matchCriteriaId": "D5A8816A-84EE-44B0-AD3B-5C9BC9B3E71E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:4.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "A367BFF0-397D-416F-960C-602E8B66421A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:4.0.10:*:*:*:*:*:*:*",
"matchCriteriaId": "145D0FF7-1691-4A73-95FA-284A9EF79F65",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:4.0.11:*:*:*:*:*:*:*",
"matchCriteriaId": "A9C9A0A8-139B-469D-ABE8-2724D65F7EAA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:4.0.12:*:*:*:*:*:*:*",
"matchCriteriaId": "4A54C2C7-AA44-46E9-BF03-E00018084093",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:4.0.13:*:*:*:*:*:*:*",
"matchCriteriaId": "BECED922-3748-4534-9750-3A061B939A0B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:4.0.14:*:*:*:*:*:*:*",
"matchCriteriaId": "A8A5E5C6-AF2D-4C31-B422-63D0182EC21B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:4.1:*:*:*:*:*:*:*",
"matchCriteriaId": "85CDC579-6967-4E5C-B716-B2BC04F6DBF2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:4.1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "27783033-F558-427C-89A7-C3638C57F2A0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:4.1.2:*:*:*:*:*:*:*",
"matchCriteriaId": "E91557C7-8C53-49C4-8BC5-7F86D4AA09B8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:4.1.3:*:*:*:*:*:*:*",
"matchCriteriaId": "50448355-F1D3-48AB-AED0-5FE027D7C199",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:4.2:*:*:*:*:*:*:*",
"matchCriteriaId": "7CE9B4E3-8044-4305-A517-E695D0831355",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:4.2:rc1:*:*:*:*:*:*",
"matchCriteriaId": "4BDA28D1-5B26-4FBA-B685-C230569AF024",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:4.2:rc2:*:*:*:*:*:*",
"matchCriteriaId": "F61B90BF-3548-4D3A-BF70-A9DC96C11775",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:4.2.1:*:*:*:*:*:*:*",
"matchCriteriaId": "AD204F45-15FE-4677-BC4C-A53F322A3B15",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:4.2.2:*:*:*:*:*:*:*",
"matchCriteriaId": "22FAFCDF-C615-4958-9C6D-E74EC11E9A62",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:4.2.3:*:*:*:*:*:*:*",
"matchCriteriaId": "4D623AEB-622E-470E-898C-A447F9C4066A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:4.2.4:*:*:*:*:*:*:*",
"matchCriteriaId": "9019921A-B8D2-4774-AB6B-673FC2FD2197",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:4.2.5:*:*:*:*:*:*:*",
"matchCriteriaId": "1DC1A059-DDE4-4442-BD90-20AB3CE0E1CC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:4.2.6:*:*:*:*:*:*:*",
"matchCriteriaId": "4801DB4A-F828-4E95-8619-F909D5D39524",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:4.2.7:*:*:*:*:*:*:*",
"matchCriteriaId": "1E0D48CD-C77A-4D86-B091-2B8DF3ADA6D7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:4.2.8:*:*:*:*:*:*:*",
"matchCriteriaId": "956C5C97-E7A8-49F2-8AC6-9570A5948395",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:4.2.9:*:*:*:*:*:*:*",
"matchCriteriaId": "281A3D1A-1F92-454D-AE09-522114FF9D8D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:4.2.10:*:*:*:*:*:*:*",
"matchCriteriaId": "717B879A-EDEA-4917-A75E-2C40BB8D35D7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:4.3:*:*:*:*:*:*:*",
"matchCriteriaId": "F119CA93-4D32-4852-90AD-A23215D6CBAC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:4.3.1:*:*:*:*:*:*:*",
"matchCriteriaId": "6CA9A1C4-412D-4EED-8259-04F48322238B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:4.3.2:*:*:*:*:*:*:*",
"matchCriteriaId": "27847E43-22AD-468D-8E64-8D56EA8CBE50",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:4.3.3:*:*:*:*:*:*:*",
"matchCriteriaId": "8DBB66FA-6E99-4F08-A223-6070E193B869",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:4.4:*:*:*:*:*:*:*",
"matchCriteriaId": "D00AE646-61CC-4036-8B8F-35B818530BFC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:4.4:rc1:*:*:*:*:*:*",
"matchCriteriaId": "FF326273-99CF-40C3-B112-F5F18C94978F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:4.4:rc2:*:*:*:*:*:*",
"matchCriteriaId": "ECED66BE-C877-4250-AC7A-FAEAD9DAAC31",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:4.4.1:*:*:*:*:*:*:*",
"matchCriteriaId": "9FFFD96D-D0B5-47BB-91D9-3736E343711E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:4.4.2:*:*:*:*:*:*:*",
"matchCriteriaId": "4D710732-6D93-4143-874F-81B19F70FBEF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:4.4.3:*:*:*:*:*:*:*",
"matchCriteriaId": "FD56846F-40B5-4A45-99DB-44C56E3A20A3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:4.4.4:*:*:*:*:*:*:*",
"matchCriteriaId": "32C22A06-5F01-4C6A-886F-E3C0776C3C5B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:4.4.5:*:*:*:*:*:*:*",
"matchCriteriaId": "6457398E-A1C9-4F72-BBF7-FC54118FA91C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:4.5:*:*:*:*:*:*:*",
"matchCriteriaId": "5FA8C43E-AD0C-45F7-BC20-61358C7F23EA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:4.5.1:*:*:*:*:*:*:*",
"matchCriteriaId": "E86608A6-8B14-4D27-A86B-1DD10E1F7825",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:4.5.2:*:*:*:*:*:*:*",
"matchCriteriaId": "D7F176CD-2EE5-4C7D-A376-4EA8918610C3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:4.5.3:*:*:*:*:*:*:*",
"matchCriteriaId": "0BD5F23A-33EC-4D8A-B39D-972A048DAB0A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:4.5.4:*:*:*:*:*:*:*",
"matchCriteriaId": "D1F3C39E-50A1-4005-AC0B-097A1FA6E1C2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:4.5.5:*:*:*:*:*:*:*",
"matchCriteriaId": "47A322B9-DA3A-448C-BD61-3E67A98AC74E",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Bugzilla 2.x through 4.0.x before 4.0.15, 4.1.x and 4.2.x before 4.2.11, 4.3.x and 4.4.x before 4.4.6, and 4.5.x before 4.5.6 does not ensure that a scalar context is used for certain CGI parameters, which allows remote attackers to conduct cross-site scripting (XSS) attacks by sending three values for a single parameter name."
},
{
"lang": "es",
"value": "Bugzilla 2.x hasta 4.0.x anterior a 4.0.15, 4.1.x y 4.2.x anterior a 4.2.11, 4.3.x y 4.4.x anterior a 4.4.6, y 4.5.x anterior a 4.5.6 no asegura que se utilice un contexto escalar para ciertos par\u00e1metro CGI, lo que permite a atacantes remotos realizar ataques de XSS mediante el env\u00edo de tres valores para un \u00fanico nombre de par\u00e1metro."
}
],
"id": "CVE-2014-1573",
"lastModified": "2025-04-12T10:46:40.837",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": true
}
]
},
"published": "2014-10-13T01:55:07.010",
"references": [
{
"source": "security@mozilla.org",
"url": "http://advisories.mageia.org/MGASA-2014-0412.html"
},
{
"source": "security@mozilla.org",
"url": "http://blog.gerv.net/2014/10/new-class-of-vulnerability-in-perl-web-applications/"
},
{
"source": "security@mozilla.org",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-November/142524.html"
},
{
"source": "security@mozilla.org",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-October/141309.html"
},
{
"source": "security@mozilla.org",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-October/141321.html"
},
{
"source": "security@mozilla.org",
"url": "http://openwall.com/lists/oss-security/2014/10/07/20"
},
{
"source": "security@mozilla.org",
"url": "http://packetstormsecurity.com/files/128578/Bugzilla-Account-Creation-XSS-Information-Leak.html"
},
{
"source": "security@mozilla.org",
"tags": [
"Vendor Advisory"
],
"url": "http://www.bugzilla.org/security/4.0.14/"
},
{
"source": "security@mozilla.org",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2014:200"
},
{
"source": "security@mozilla.org",
"url": "http://www.opennet.ru/opennews/art.shtml?num=40766"
},
{
"source": "security@mozilla.org",
"url": "http://www.reddit.com/r/netsec/comments/2ihen0/new_class_of_vulnerability_in_perl_web/"
},
{
"source": "security@mozilla.org",
"url": "http://www.securityfocus.com/bid/70257"
},
{
"source": "security@mozilla.org",
"url": "http://www.securitytracker.com/id/1030978"
},
{
"source": "security@mozilla.org",
"tags": [
"Patch"
],
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1075578"
},
{
"source": "security@mozilla.org",
"url": "https://security.gentoo.org/glsa/201607-11"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://advisories.mageia.org/MGASA-2014-0412.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://blog.gerv.net/2014/10/new-class-of-vulnerability-in-perl-web-applications/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-November/142524.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-October/141309.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-October/141321.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://openwall.com/lists/oss-security/2014/10/07/20"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://packetstormsecurity.com/files/128578/Bugzilla-Account-Creation-XSS-Information-Leak.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://www.bugzilla.org/security/4.0.14/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2014:200"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.opennet.ru/opennews/art.shtml?num=40766"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.reddit.com/r/netsec/comments/2ihen0/new_class_of_vulnerability_in_perl_web/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securityfocus.com/bid/70257"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securitytracker.com/id/1030978"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
],
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1075578"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://security.gentoo.org/glsa/201607-11"
}
],
"sourceIdentifier": "security@mozilla.org",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-79"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
FKIE_CVE-2014-1572
Vulnerability from fkie_nvd - Published: 2014-10-13 01:55 - Updated: 2025-04-12 10:46{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:fedoraproject:fedora:19:*:*:*:*:*:*:*",
"matchCriteriaId": "5991814D-CA77-4C25-90D2-DB542B17E0AD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:fedoraproject:fedora:20:*:*:*:*:*:*:*",
"matchCriteriaId": "FF47C9F0-D8DA-4B55-89EB-9B2C9383ADB9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:fedoraproject:fedora:21:*:*:*:*:*:*:*",
"matchCriteriaId": "56BDB5A0-0839-4A20-A003-B8CD56F48171",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "DC38A53F-60E6-4F7A-A953-C53D141E830D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.2:*:*:*:*:*:*:*",
"matchCriteriaId": "DAFEF951-3FE8-49DD-B3DD-E526D5B52998",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.4:*:*:*:*:*:*:*",
"matchCriteriaId": "8112FF13-B4CE-4DC7-85B1-C69D975F162B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.6:*:*:*:*:*:*:*",
"matchCriteriaId": "86F5A3CA-E4A6-4E51-AC83-0C8F3E5E2C4E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.8:*:*:*:*:*:*:*",
"matchCriteriaId": "F6E5E379-D475-42F3-B0DC-3D04C1D25566",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.9:*:*:*:*:*:*:*",
"matchCriteriaId": "A3B3EF74-4784-47A7-8994-21EF489F4008",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.10:*:*:*:*:*:*:*",
"matchCriteriaId": "893741D3-062B-45F9-B5A3-1B81058E7FD7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.12:*:*:*:*:*:*:*",
"matchCriteriaId": "E8D53B5F-6AEE-4192-B838-E1DA92C59285",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.14:*:*:*:*:*:*:*",
"matchCriteriaId": "1883A98C-E595-4F3C-87BF-A63393F9F561",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.14.1:*:*:*:*:*:*:*",
"matchCriteriaId": "DD49E53A-5676-4FAC-A8A2-30FAC04C33D7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.14.2:*:*:*:*:*:*:*",
"matchCriteriaId": "1084AF8E-5269-4EFF-BBD2-C5A77945FCF2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.14.3:*:*:*:*:*:*:*",
"matchCriteriaId": "D9A4B035-B73E-48E9-BBB9-83219F5D2A95",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.14.4:*:*:*:*:*:*:*",
"matchCriteriaId": "9452C271-2812-4775-8396-394C642EACFD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.14.5:*:*:*:*:*:*:*",
"matchCriteriaId": "2D351AF2-C0AB-4BB3-8692-677A3025A615",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.16:*:*:*:*:*:*:*",
"matchCriteriaId": "F16D338E-C5BC-46E1-95DD-D9B0E25EE56E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.16:rc1:*:*:*:*:*:*",
"matchCriteriaId": "5877CECA-F758-4F48-B4F4-2C4C1DF01FA0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.16:rc2:*:*:*:*:*:*",
"matchCriteriaId": "D63CE086-5872-4594-8F4B-8D812E7EF09C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.16.1:*:*:*:*:*:*:*",
"matchCriteriaId": "19F19219-3AFD-4D8E-B02B-BFCBD1BC7C36",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.16.2:*:*:*:*:*:*:*",
"matchCriteriaId": "B900D9A7-913A-4176-90CF-C7C3B09A4261",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.16.3:*:*:*:*:*:*:*",
"matchCriteriaId": "B692910E-633D-4A88-B245-56A2B58DD4CB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.16.4:*:*:*:*:*:*:*",
"matchCriteriaId": "F86EE5DB-442B-4C78-8152-AF1048C6A974",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.16.5:*:*:*:*:*:*:*",
"matchCriteriaId": "19B82A1A-56EB-41D5-8619-2A717E3A6ECF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.16.6:*:*:*:*:*:*:*",
"matchCriteriaId": "83A0406C-AAF2-4A4C-9567-E21DF1B6C46E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.16.7:*:*:*:*:*:*:*",
"matchCriteriaId": "64434BFC-DDC0-4C7D-B578-472B0610C89E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.16.8:*:*:*:*:*:*:*",
"matchCriteriaId": "A30F28D9-B000-4C26-A911-5E1B8A867BF6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.16.9:*:*:*:*:*:*:*",
"matchCriteriaId": "4A123F78-A671-4FB5-AE78-83762E9323C7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.16.10:*:*:*:*:*:*:*",
"matchCriteriaId": "28C34288-A326-4B71-99B0-DA9FFD28160F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.16.11:*:*:*:*:*:*:*",
"matchCriteriaId": "73648879-BB08-4BE4-A7FF-1E8DF4E264B4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.16_rc2:*:*:*:*:*:*:*",
"matchCriteriaId": "1B4CC7E4-617D-498E-A367-374478158FA5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.17:*:*:*:*:*:*:*",
"matchCriteriaId": "9B2FC5C7-B218-4B87-9805-F90AC0E7A281",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.17.1:*:*:*:*:*:*:*",
"matchCriteriaId": "BBCDA64F-C49A-4F5B-B285-4079D8E3A499",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.17.2:*:*:*:*:*:*:*",
"matchCriteriaId": "930AF809-CA52-41CB-985A-066B8239C7CD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.17.3:*:*:*:*:*:*:*",
"matchCriteriaId": "85ED3457-CC21-4DB3-931F-677F723E1B2A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.17.4:*:*:*:*:*:*:*",
"matchCriteriaId": "6C8711D3-55CF-4131-BBAC-6BE07068219F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.17.5:*:*:*:*:*:*:*",
"matchCriteriaId": "DF54FFA5-5177-46E6-9AFA-BA3345C16E8A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.17.6:*:*:*:*:*:*:*",
"matchCriteriaId": "69D7EA7C-B401-4F5A-AC08-2199DD117403",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.17.7:*:*:*:*:*:*:*",
"matchCriteriaId": "DC2DDC7C-CD2B-4597-A5E0-266A884958FC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.18:*:*:*:*:*:*:*",
"matchCriteriaId": "DDB99B2D-CA05-4BC0-BCA4-9B94DF248333",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.18:rc1:*:*:*:*:*:*",
"matchCriteriaId": "3635C0E9-2E43-4BAE-8267-2BB2F68B03BD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.18:rc2:*:*:*:*:*:*",
"matchCriteriaId": "4869A709-AF79-49BD-A7D2-D48A8D79A085",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.18:rc3:*:*:*:*:*:*",
"matchCriteriaId": "EAC72143-27C3-498F-AFAB-98AE043C0545",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.18.1:*:*:*:*:*:*:*",
"matchCriteriaId": "BE5E8E72-D493-460D-B5A0-F90C291398A5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.18.2:*:*:*:*:*:*:*",
"matchCriteriaId": "04885D31-09F3-455F-A1A9-815E182ABCF9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.18.3:*:*:*:*:*:*:*",
"matchCriteriaId": "F153300E-42CC-4BDD-88EC-E8A0ADB4E3B7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.18.4:*:*:*:*:*:*:*",
"matchCriteriaId": "92BCD546-2A50-4F43-935C-B68459EE894E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.18.5:*:*:*:*:*:*:*",
"matchCriteriaId": "C535BAB7-6146-440B-ADBD-51007585CFC8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.18.6:*:*:*:*:*:*:*",
"matchCriteriaId": "7B6BA7E8-DEC7-4D94-B9F9-B70EC39FD892",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.18.6\\+:*:*:*:*:*:*:*",
"matchCriteriaId": "15E6F17A-7292-4640-A5E6-59865D1CDD7B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.18.7:*:*:*:*:*:*:*",
"matchCriteriaId": "E9130B6B-764B-4B83-A2BD-E16013682875",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.18.8:*:*:*:*:*:*:*",
"matchCriteriaId": "7C7A5111-8729-48DF-B308-7A489BEFA6D0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.18.9:*:*:*:*:*:*:*",
"matchCriteriaId": "15E24C39-0E61-4A57-B93F-F0ABF4CEAEEB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.19:*:*:*:*:*:*:*",
"matchCriteriaId": "725BD7BE-1769-4032-ADA8-9ED15528C770",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.19.1:*:*:*:*:*:*:*",
"matchCriteriaId": "239D70F4-7D86-4A57-ACEF-440F68994FB6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.19.2:*:*:*:*:*:*:*",
"matchCriteriaId": "ABEE2C94-DA69-4A78-A15F-538383A7460E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.19.3:*:*:*:*:*:*:*",
"matchCriteriaId": "4F7CD64E-7FAA-40DC-B36E-8B7EB9D620FB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.20:*:*:*:*:*:*:*",
"matchCriteriaId": "A749C7AB-6F60-469C-BD95-759205DDA345",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.20:rc1:*:*:*:*:*:*",
"matchCriteriaId": "B45F6C27-D89A-42A0-A304-5B0C57D2A9F1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.20:rc2:*:*:*:*:*:*",
"matchCriteriaId": "196B7CD8-D721-4CFB-B126-78758128E900",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.20.1:*:*:*:*:*:*:*",
"matchCriteriaId": "BEA9DE63-9951-4FE0-80BE-0F6F197303D7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.20.2:*:*:*:*:*:*:*",
"matchCriteriaId": "B0CEDD02-1CB8-4D5B-B82B-E300B4E39065",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.20.3:*:*:*:*:*:*:*",
"matchCriteriaId": "8E27101B-7985-4412-A14F-9ED11E4C874C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.20.4:*:*:*:*:*:*:*",
"matchCriteriaId": "8A74E8A2-223E-4877-989E-494362B513E9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.20.5:*:*:*:*:*:*:*",
"matchCriteriaId": "E0CAFB45-B115-4492-9919-60223304BB27",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.20.6:*:*:*:*:*:*:*",
"matchCriteriaId": "DC3F7C44-C734-419B-AB62-3AD52554FC7D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.20.7:*:*:*:*:*:*:*",
"matchCriteriaId": "695036D1-994C-451E-8D53-0A345702E4D1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.21:*:*:*:*:*:*:*",
"matchCriteriaId": "2053CFB4-602E-4141-BB3D-A440E2A31D85",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.21.1:*:*:*:*:*:*:*",
"matchCriteriaId": "31ACBA13-AC13-4469-862F-B3DD2327B6FC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.21.2:*:*:*:*:*:*:*",
"matchCriteriaId": "9E9EC243-3E25-4234-A88A-FDD5B594BFBA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.21.2:rc1:*:*:*:*:*:*",
"matchCriteriaId": "AE0570E9-B967-4325-92CB-2FB6CA010C4F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.22:*:*:*:*:*:*:*",
"matchCriteriaId": "F2969731-8256-431B-9356-4BC873D98F6D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.22:rc1:*:*:*:*:*:*",
"matchCriteriaId": "1C166E42-9B36-4883-B738-EEBEF3056D98",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.22.1:*:*:*:*:*:*:*",
"matchCriteriaId": "E5177876-0FEC-481B-815F-84AF53968644",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.22.2:*:*:*:*:*:*:*",
"matchCriteriaId": "BC38566A-07F1-4F21-BAC1-259F844DC15C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.22.3:*:*:*:*:*:*:*",
"matchCriteriaId": "AE1684B8-3060-4139-BC06-707F27A05958",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.22.4:*:*:*:*:*:*:*",
"matchCriteriaId": "FF32C74C-3EA3-4E1F-BADA-BB4A92068266",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.22.5:*:*:*:*:*:*:*",
"matchCriteriaId": "D569A750-C649-4D40-89AB-D29773E66F66",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.22.6:*:*:*:*:*:*:*",
"matchCriteriaId": "95B69FA8-1182-46F1-952F-4610288ED409",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.22.7:*:*:*:*:*:*:*",
"matchCriteriaId": "5716BB97-7829-4FDE-92AC-69CA10332F45",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.23:*:*:*:*:*:*:*",
"matchCriteriaId": "02846865-D124-4C72-85C8-59A7C6F43E2E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.23.1:*:*:*:*:*:*:*",
"matchCriteriaId": "99B59422-ED6E-4F82-8D0C-091058D1C438",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.23.2:*:*:*:*:*:*:*",
"matchCriteriaId": "F658844A-6253-4A18-8A5D-1E818BE7A367",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.23.3:*:*:*:*:*:*:*",
"matchCriteriaId": "4753AB35-B95C-4544-A874-5E6D83929AC1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.23.4:*:*:*:*:*:*:*",
"matchCriteriaId": "C4880D54-CA42-4CCA-B01E-2C125002BF5C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.0:*:*:*:*:*:*:*",
"matchCriteriaId": "D4D9F54A-15A7-4899-B695-D9D8B96C4A9B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.0:rc1:*:*:*:*:*:*",
"matchCriteriaId": "BD56D9C0-38C6-4679-8104-1A0B88B71C0E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "45C36666-518F-4956-816A-940930425955",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "FF2DF96F-E45E-45AF-85E5-E939F923EC1B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "80EBAA09-F2C8-445E-8E3A-B5F937E1B1E2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.0.3:*:*:*:*:*:*:*",
"matchCriteriaId": "11C6713F-01ED-4AE9-AE42-89926067E6E6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.0.4:*:*:*:*:*:*:*",
"matchCriteriaId": "7AB5010D-37A3-4B6E-92B6-6F41A3708851",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.0.5:*:*:*:*:*:*:*",
"matchCriteriaId": "EEB09719-122F-4D25-B680-18029D5D9DE9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.0.6:*:*:*:*:*:*:*",
"matchCriteriaId": "AF585D92-9FAF-4858-A956-68AF77227333",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.0.7:*:*:*:*:*:*:*",
"matchCriteriaId": "7BA67823-C9D9-4C5B-A4ED-669E6F1851C0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.0.8:*:*:*:*:*:*:*",
"matchCriteriaId": "CB0F7531-A660-4604-80BD-15B01E2916BD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.0.9:*:*:*:*:*:*:*",
"matchCriteriaId": "A6FE6868-BB9F-4EB8-9E37-3438559CB01B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.0.10:*:*:*:*:*:*:*",
"matchCriteriaId": "1EC90352-C94A-4F47-AFB7-713B547373CC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.0.11:*:*:*:*:*:*:*",
"matchCriteriaId": "E5E77E01-D779-482A-9FAC-4AC210B68771",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.0_rc1:*:*:*:*:*:*:*",
"matchCriteriaId": "5E608E27-D43C-4F34-952D-2F49A71B1E2B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "154EA18F-534C-4095-837D-BB9865D25F23",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "585F05F2-B294-4218-9209-C487B4D2994B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.1.2:*:*:*:*:*:*:*",
"matchCriteriaId": "F3246890-8D66-474F-AC9C-BC556426467D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.1.3:*:*:*:*:*:*:*",
"matchCriteriaId": "7090332F-4CC2-4ADD-AEEC-75238BCA55CC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.1.4:*:*:*:*:*:*:*",
"matchCriteriaId": "F960BE59-05B1-4438-A854-279612E13A7B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.2:*:*:*:*:*:*:*",
"matchCriteriaId": "F248EA4D-1A39-40FD-8D3C-9701D36FD6B1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.2:rc1:*:*:*:*:*:*",
"matchCriteriaId": "170EB43B-9488-4E25-9401-B84DE838247B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.2:rc2:*:*:*:*:*:*",
"matchCriteriaId": "B1ED7682-A315-4F92-9F9F-38290BCC058E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.2.1:*:*:*:*:*:*:*",
"matchCriteriaId": "14B5A433-526F-436E-9FCD-B71E661180FD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.2.2:*:*:*:*:*:*:*",
"matchCriteriaId": "48EDC5BC-AD4B-4E67-B79C-F44292307AB4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.2.3:*:*:*:*:*:*:*",
"matchCriteriaId": "6FEC62B7-2CAA-4A0D-A9B2-B4A6B105A6F7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.2.4:*:*:*:*:*:*:*",
"matchCriteriaId": "4B4A7A67-1355-4648-B8C9-3231BED96547",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.2.5:*:*:*:*:*:*:*",
"matchCriteriaId": "442AB3EE-61DF-4B25-ABEB-55905C01E376",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.2.6:*:*:*:*:*:*:*",
"matchCriteriaId": "7F825E34-D529-4ADC-A7D6-1BD9DAE86FC1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.2.7:*:*:*:*:*:*:*",
"matchCriteriaId": "C1F92D0C-AF71-4FD3-BC4B-C6D0F1F84F9B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.2.8:*:*:*:*:*:*:*",
"matchCriteriaId": "CBC26020-BFD7-493B-BDE2-1EC8DEA1A6DA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.2.9:*:*:*:*:*:*:*",
"matchCriteriaId": "984463B4-00A8-423B-B0C5-A7C4FECF064C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.2.10:*:*:*:*:*:*:*",
"matchCriteriaId": "6C7DC534-FF77-414C-A1DC-945F508CC3C9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.3:*:*:*:*:*:*:*",
"matchCriteriaId": "BEB4EF1D-D4D0-40DA-BE78-24FD48030EE0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.3.1:*:*:*:*:*:*:*",
"matchCriteriaId": "B2962084-F778-4574-8105-8C5A260CCBD7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.3.2:*:*:*:*:*:*:*",
"matchCriteriaId": "FF288A74-070E-4EB4-BB92-7D4D41635DD1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.3.3:*:*:*:*:*:*:*",
"matchCriteriaId": "5B8B31F0-6FCC-4258-865B-B65ECBFAF252",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.3.4:*:*:*:*:*:*:*",
"matchCriteriaId": "7A0CCF96-777F-4CEE-BC04-2974663CF5E7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.4:*:*:*:*:*:*:*",
"matchCriteriaId": "D6A71919-DC70-4AE2-9D16-76A177DAE331",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.4:rc1:*:*:*:*:*:*",
"matchCriteriaId": "780896D3-3B49-486F-A136-D3D175C00A34",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.4.1:*:*:*:*:*:*:*",
"matchCriteriaId": "EA43E47B-F474-4F5B-A91B-9AF99359FE5F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.4.2:*:*:*:*:*:*:*",
"matchCriteriaId": "A7A3A453-EE50-458C-8F31-D7AA232006FC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.4.3:*:*:*:*:*:*:*",
"matchCriteriaId": "3D920D39-683D-4F9F-AA85-3C4D1600DAD6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.4.4:*:*:*:*:*:*:*",
"matchCriteriaId": "E7A4F1FD-2B00-4A99-AAA1-DBBFE3748D87",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.4.5:*:*:*:*:*:*:*",
"matchCriteriaId": "EF6A3C0F-8778-4236-B4DC-41DBCF43EB62",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.4.6:*:*:*:*:*:*:*",
"matchCriteriaId": "7D134D4D-6A95-48FE-B8E5-4F90692CB4FD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.4.7:*:*:*:*:*:*:*",
"matchCriteriaId": "08C34E6F-8233-4575-AAE7-4DBFC27453F8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.4.8:*:*:*:*:*:*:*",
"matchCriteriaId": "6D8155F8-CAB1-4EED-B576-F4102253BD25",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.4.9:*:*:*:*:*:*:*",
"matchCriteriaId": "593D2F3B-A386-48D8-BF19-A12F1B4962A6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.4.10:*:*:*:*:*:*:*",
"matchCriteriaId": "F37C651D-8989-478B-A991-654FCDEC8B1D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.4.11:*:*:*:*:*:*:*",
"matchCriteriaId": "AE170AE5-37F5-4750-ACD9-13CA691A80C5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.4.12:*:*:*:*:*:*:*",
"matchCriteriaId": "1DE75B2F-A183-4ED9-A9E9-7ADF54C341FF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.4.13:*:*:*:*:*:*:*",
"matchCriteriaId": "A4D7380C-5608-4F96-82E3-4B36CDCD71EC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.5:*:*:*:*:*:*:*",
"matchCriteriaId": "850ADB66-21F2-49CB-B105-BDA16A286CFC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.5.1:*:*:*:*:*:*:*",
"matchCriteriaId": "1907D4D0-9D6E-476E-BD1A-88A32D3EFE38",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.5.2:*:*:*:*:*:*:*",
"matchCriteriaId": "61DD0779-786E-4714-AA73-86FB19E26028",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.5.3:*:*:*:*:*:*:*",
"matchCriteriaId": "A8E8DD97-5799-465D-8B99-F2BD6AA681AB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.6:*:*:*:*:*:*:*",
"matchCriteriaId": "03E40C09-0696-45BC-9AE8-9F6F20964600",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.6:rc1:*:*:*:*:*:*",
"matchCriteriaId": "397E07B5-3D9D-44C7-B8B3-18D04EE84405",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.6.0:*:*:*:*:*:*:*",
"matchCriteriaId": "4A1AD503-7F78-4597-AECD-6DC530AD4D3C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.6.1:*:*:*:*:*:*:*",
"matchCriteriaId": "BCAD5285-E485-4F49-99CF-287545260FDD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.6.2:*:*:*:*:*:*:*",
"matchCriteriaId": "5C193DF3-8D23-44A9-94DE-9F4F7358ED3F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.6.3:*:*:*:*:*:*:*",
"matchCriteriaId": "80BA8C84-32C3-4ECF-B4C7-573B12441D22",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.6.4:*:*:*:*:*:*:*",
"matchCriteriaId": "820EC9F1-B66C-43CE-B254-145F4AC23083",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.6.5:*:*:*:*:*:*:*",
"matchCriteriaId": "C4BDA6DC-8D53-417D-8320-CE266F8607B7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.6.6:*:*:*:*:*:*:*",
"matchCriteriaId": "5B01E0D5-3F26-4A71-A22C-FAD7CBF47283",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.6.7:*:*:*:*:*:*:*",
"matchCriteriaId": "6C33D8DA-86A4-4A70-82F8-27D5DE3881EA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.6.8:*:*:*:*:*:*:*",
"matchCriteriaId": "884D0728-8E3C-47F3-9DDD-FA976E1553EB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.6.9:*:*:*:*:*:*:*",
"matchCriteriaId": "C47C594A-D3B6-44FD-93D7-7E69212050BF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.6.10:*:*:*:*:*:*:*",
"matchCriteriaId": "551303CA-63C5-4A3A-9280-ADB2B77C05F7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.6.11:*:*:*:*:*:*:*",
"matchCriteriaId": "0777EB93-D11C-4837-BB7F-96DEC716E1BB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.6.12:*:*:*:*:*:*:*",
"matchCriteriaId": "10FFAD30-56A0-40C8-AE70-70DD9904C528",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.6.13:*:*:*:*:*:*:*",
"matchCriteriaId": "3620DE78-AF48-44EC-B211-E0C26F4E951F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.7:*:*:*:*:*:*:*",
"matchCriteriaId": "2757B2A7-5232-4245-9CC6-91BF9E3ECA09",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.7.1:*:*:*:*:*:*:*",
"matchCriteriaId": "740ADCB7-B296-4728-A73A-9691265B8F07",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.7.2:*:*:*:*:*:*:*",
"matchCriteriaId": "6187C92D-FEE9-4B1B-B7ED-9A1DD360B204",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.7.3:*:*:*:*:*:*:*",
"matchCriteriaId": "71213AF6-48CC-469F-9FBA-CAF1D3237657",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:4.0:*:*:*:*:*:*:*",
"matchCriteriaId": "DABC1683-0E04-456E-9500-68D0D35815E6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:4.0:rc1:*:*:*:*:*:*",
"matchCriteriaId": "38D71912-DCD6-44BB-8A86-72D207B49E58",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:4.0:rc2:*:*:*:*:*:*",
"matchCriteriaId": "D5A8816A-84EE-44B0-AD3B-5C9BC9B3E71E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:4.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "A367BFF0-397D-416F-960C-602E8B66421A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:4.0.10:*:*:*:*:*:*:*",
"matchCriteriaId": "145D0FF7-1691-4A73-95FA-284A9EF79F65",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:4.0.11:*:*:*:*:*:*:*",
"matchCriteriaId": "A9C9A0A8-139B-469D-ABE8-2724D65F7EAA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:4.0.12:*:*:*:*:*:*:*",
"matchCriteriaId": "4A54C2C7-AA44-46E9-BF03-E00018084093",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:4.0.13:*:*:*:*:*:*:*",
"matchCriteriaId": "BECED922-3748-4534-9750-3A061B939A0B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:4.0.14:*:*:*:*:*:*:*",
"matchCriteriaId": "A8A5E5C6-AF2D-4C31-B422-63D0182EC21B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:4.1:*:*:*:*:*:*:*",
"matchCriteriaId": "85CDC579-6967-4E5C-B716-B2BC04F6DBF2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:4.1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "27783033-F558-427C-89A7-C3638C57F2A0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:4.1.2:*:*:*:*:*:*:*",
"matchCriteriaId": "E91557C7-8C53-49C4-8BC5-7F86D4AA09B8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:4.1.3:*:*:*:*:*:*:*",
"matchCriteriaId": "50448355-F1D3-48AB-AED0-5FE027D7C199",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:4.2:*:*:*:*:*:*:*",
"matchCriteriaId": "7CE9B4E3-8044-4305-A517-E695D0831355",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:4.2:rc1:*:*:*:*:*:*",
"matchCriteriaId": "4BDA28D1-5B26-4FBA-B685-C230569AF024",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:4.2:rc2:*:*:*:*:*:*",
"matchCriteriaId": "F61B90BF-3548-4D3A-BF70-A9DC96C11775",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:4.2.1:*:*:*:*:*:*:*",
"matchCriteriaId": "AD204F45-15FE-4677-BC4C-A53F322A3B15",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:4.2.2:*:*:*:*:*:*:*",
"matchCriteriaId": "22FAFCDF-C615-4958-9C6D-E74EC11E9A62",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:4.2.3:*:*:*:*:*:*:*",
"matchCriteriaId": "4D623AEB-622E-470E-898C-A447F9C4066A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:4.2.4:*:*:*:*:*:*:*",
"matchCriteriaId": "9019921A-B8D2-4774-AB6B-673FC2FD2197",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:4.2.5:*:*:*:*:*:*:*",
"matchCriteriaId": "1DC1A059-DDE4-4442-BD90-20AB3CE0E1CC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:4.2.6:*:*:*:*:*:*:*",
"matchCriteriaId": "4801DB4A-F828-4E95-8619-F909D5D39524",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:4.2.7:*:*:*:*:*:*:*",
"matchCriteriaId": "1E0D48CD-C77A-4D86-B091-2B8DF3ADA6D7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:4.2.8:*:*:*:*:*:*:*",
"matchCriteriaId": "956C5C97-E7A8-49F2-8AC6-9570A5948395",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:4.2.9:*:*:*:*:*:*:*",
"matchCriteriaId": "281A3D1A-1F92-454D-AE09-522114FF9D8D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:4.2.10:*:*:*:*:*:*:*",
"matchCriteriaId": "717B879A-EDEA-4917-A75E-2C40BB8D35D7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:4.3:*:*:*:*:*:*:*",
"matchCriteriaId": "F119CA93-4D32-4852-90AD-A23215D6CBAC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:4.3.1:*:*:*:*:*:*:*",
"matchCriteriaId": "6CA9A1C4-412D-4EED-8259-04F48322238B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:4.3.2:*:*:*:*:*:*:*",
"matchCriteriaId": "27847E43-22AD-468D-8E64-8D56EA8CBE50",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:4.3.3:*:*:*:*:*:*:*",
"matchCriteriaId": "8DBB66FA-6E99-4F08-A223-6070E193B869",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:4.4:*:*:*:*:*:*:*",
"matchCriteriaId": "D00AE646-61CC-4036-8B8F-35B818530BFC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:4.4:rc1:*:*:*:*:*:*",
"matchCriteriaId": "FF326273-99CF-40C3-B112-F5F18C94978F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:4.4:rc2:*:*:*:*:*:*",
"matchCriteriaId": "ECED66BE-C877-4250-AC7A-FAEAD9DAAC31",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:4.4.1:*:*:*:*:*:*:*",
"matchCriteriaId": "9FFFD96D-D0B5-47BB-91D9-3736E343711E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:4.4.2:*:*:*:*:*:*:*",
"matchCriteriaId": "4D710732-6D93-4143-874F-81B19F70FBEF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:4.4.3:*:*:*:*:*:*:*",
"matchCriteriaId": "FD56846F-40B5-4A45-99DB-44C56E3A20A3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:4.4.4:*:*:*:*:*:*:*",
"matchCriteriaId": "32C22A06-5F01-4C6A-886F-E3C0776C3C5B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:4.4.5:*:*:*:*:*:*:*",
"matchCriteriaId": "6457398E-A1C9-4F72-BBF7-FC54118FA91C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:4.5:*:*:*:*:*:*:*",
"matchCriteriaId": "5FA8C43E-AD0C-45F7-BC20-61358C7F23EA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:4.5.1:*:*:*:*:*:*:*",
"matchCriteriaId": "E86608A6-8B14-4D27-A86B-1DD10E1F7825",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:4.5.2:*:*:*:*:*:*:*",
"matchCriteriaId": "D7F176CD-2EE5-4C7D-A376-4EA8918610C3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:4.5.3:*:*:*:*:*:*:*",
"matchCriteriaId": "0BD5F23A-33EC-4D8A-B39D-972A048DAB0A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:4.5.4:*:*:*:*:*:*:*",
"matchCriteriaId": "D1F3C39E-50A1-4005-AC0B-097A1FA6E1C2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:4.5.5:*:*:*:*:*:*:*",
"matchCriteriaId": "47A322B9-DA3A-448C-BD61-3E67A98AC74E",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The confirm_create_account function in the account-creation feature in token.cgi in Bugzilla 2.x through 4.0.x before 4.0.15, 4.1.x and 4.2.x before 4.2.11, 4.3.x and 4.4.x before 4.4.6, and 4.5.x before 4.5.6 does not specify a scalar context for the realname parameter, which allows remote attackers to create accounts with unverified e-mail addresses by sending three realname values with realname=login_name as the second, as demonstrated by selecting an e-mail address with a domain name for which group privileges are automatically granted."
},
{
"lang": "es",
"value": "La funci\u00f3n confirm_create_account en la caracteristica account-creation en token.cgi en Bugzilla 2.x hasta 4.0.x anterior a 4.0.15, 4.1.x y 4.2.x anterior a 4.2.11, 4.3.x y 4.4.x anterior a 4.4.6, y 4.5.x anterior a 4.5.6 no especifica un contexto escalar para el par\u00e1metro realname, lo que permite a atacantes remotos crear cuentas con direcciones de e-mail no verificadas mediante el env\u00edo de tres valores realname con realname=login_name como el segundo, tal y como fue demostrado mediante la selecci\u00f3n de una direcci\u00f3n de e-mail con un nombre de dominio para el cual privilegios de grupo se ceden autom\u00e1ticamente."
}
],
"id": "CVE-2014-1572",
"lastModified": "2025-04-12T10:46:40.837",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.0,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
]
},
"published": "2014-10-13T01:55:06.933",
"references": [
{
"source": "security@mozilla.org",
"url": "http://advisories.mageia.org/MGASA-2014-0412.html"
},
{
"source": "security@mozilla.org",
"url": "http://blog.gerv.net/2014/10/new-class-of-vulnerability-in-perl-web-applications/"
},
{
"source": "security@mozilla.org",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-November/142524.html"
},
{
"source": "security@mozilla.org",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-October/141309.html"
},
{
"source": "security@mozilla.org",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-October/141321.html"
},
{
"source": "security@mozilla.org",
"url": "http://openwall.com/lists/oss-security/2014/10/07/20"
},
{
"source": "security@mozilla.org",
"url": "http://packetstormsecurity.com/files/128578/Bugzilla-Account-Creation-XSS-Information-Leak.html"
},
{
"source": "security@mozilla.org",
"tags": [
"Vendor Advisory"
],
"url": "http://www.bugzilla.org/security/4.0.14/"
},
{
"source": "security@mozilla.org",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2014:200"
},
{
"source": "security@mozilla.org",
"url": "http://www.opennet.ru/opennews/art.shtml?num=40766"
},
{
"source": "security@mozilla.org",
"url": "http://www.reddit.com/r/netsec/comments/2ihen0/new_class_of_vulnerability_in_perl_web/"
},
{
"source": "security@mozilla.org",
"url": "http://www.securitytracker.com/id/1030978"
},
{
"source": "security@mozilla.org",
"tags": [
"Patch"
],
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1074812"
},
{
"source": "security@mozilla.org",
"url": "https://security.gentoo.org/glsa/201607-11"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://advisories.mageia.org/MGASA-2014-0412.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://blog.gerv.net/2014/10/new-class-of-vulnerability-in-perl-web-applications/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-November/142524.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-October/141309.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-October/141321.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://openwall.com/lists/oss-security/2014/10/07/20"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://packetstormsecurity.com/files/128578/Bugzilla-Account-Creation-XSS-Information-Leak.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://www.bugzilla.org/security/4.0.14/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2014:200"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.opennet.ru/opennews/art.shtml?num=40766"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.reddit.com/r/netsec/comments/2ihen0/new_class_of_vulnerability_in_perl_web/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securitytracker.com/id/1030978"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
],
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1074812"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://security.gentoo.org/glsa/201607-11"
}
],
"sourceIdentifier": "security@mozilla.org",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-264"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
FKIE_CVE-2014-1571
Vulnerability from fkie_nvd - Published: 2014-10-13 01:55 - Updated: 2025-04-12 10:46{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "DC38A53F-60E6-4F7A-A953-C53D141E830D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.2:*:*:*:*:*:*:*",
"matchCriteriaId": "DAFEF951-3FE8-49DD-B3DD-E526D5B52998",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.4:*:*:*:*:*:*:*",
"matchCriteriaId": "8112FF13-B4CE-4DC7-85B1-C69D975F162B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.6:*:*:*:*:*:*:*",
"matchCriteriaId": "86F5A3CA-E4A6-4E51-AC83-0C8F3E5E2C4E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.8:*:*:*:*:*:*:*",
"matchCriteriaId": "F6E5E379-D475-42F3-B0DC-3D04C1D25566",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.9:*:*:*:*:*:*:*",
"matchCriteriaId": "A3B3EF74-4784-47A7-8994-21EF489F4008",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.10:*:*:*:*:*:*:*",
"matchCriteriaId": "893741D3-062B-45F9-B5A3-1B81058E7FD7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.12:*:*:*:*:*:*:*",
"matchCriteriaId": "E8D53B5F-6AEE-4192-B838-E1DA92C59285",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.14:*:*:*:*:*:*:*",
"matchCriteriaId": "1883A98C-E595-4F3C-87BF-A63393F9F561",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.14.1:*:*:*:*:*:*:*",
"matchCriteriaId": "DD49E53A-5676-4FAC-A8A2-30FAC04C33D7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.14.2:*:*:*:*:*:*:*",
"matchCriteriaId": "1084AF8E-5269-4EFF-BBD2-C5A77945FCF2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.14.3:*:*:*:*:*:*:*",
"matchCriteriaId": "D9A4B035-B73E-48E9-BBB9-83219F5D2A95",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.14.4:*:*:*:*:*:*:*",
"matchCriteriaId": "9452C271-2812-4775-8396-394C642EACFD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.14.5:*:*:*:*:*:*:*",
"matchCriteriaId": "2D351AF2-C0AB-4BB3-8692-677A3025A615",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.16:*:*:*:*:*:*:*",
"matchCriteriaId": "F16D338E-C5BC-46E1-95DD-D9B0E25EE56E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.16:rc1:*:*:*:*:*:*",
"matchCriteriaId": "5877CECA-F758-4F48-B4F4-2C4C1DF01FA0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.16:rc2:*:*:*:*:*:*",
"matchCriteriaId": "D63CE086-5872-4594-8F4B-8D812E7EF09C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.16.1:*:*:*:*:*:*:*",
"matchCriteriaId": "19F19219-3AFD-4D8E-B02B-BFCBD1BC7C36",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.16.2:*:*:*:*:*:*:*",
"matchCriteriaId": "B900D9A7-913A-4176-90CF-C7C3B09A4261",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.16.3:*:*:*:*:*:*:*",
"matchCriteriaId": "B692910E-633D-4A88-B245-56A2B58DD4CB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.16.4:*:*:*:*:*:*:*",
"matchCriteriaId": "F86EE5DB-442B-4C78-8152-AF1048C6A974",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.16.5:*:*:*:*:*:*:*",
"matchCriteriaId": "19B82A1A-56EB-41D5-8619-2A717E3A6ECF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.16.6:*:*:*:*:*:*:*",
"matchCriteriaId": "83A0406C-AAF2-4A4C-9567-E21DF1B6C46E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.16.7:*:*:*:*:*:*:*",
"matchCriteriaId": "64434BFC-DDC0-4C7D-B578-472B0610C89E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.16.8:*:*:*:*:*:*:*",
"matchCriteriaId": "A30F28D9-B000-4C26-A911-5E1B8A867BF6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.16.9:*:*:*:*:*:*:*",
"matchCriteriaId": "4A123F78-A671-4FB5-AE78-83762E9323C7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.16.10:*:*:*:*:*:*:*",
"matchCriteriaId": "28C34288-A326-4B71-99B0-DA9FFD28160F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.16.11:*:*:*:*:*:*:*",
"matchCriteriaId": "73648879-BB08-4BE4-A7FF-1E8DF4E264B4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.16_rc2:*:*:*:*:*:*:*",
"matchCriteriaId": "1B4CC7E4-617D-498E-A367-374478158FA5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.17:*:*:*:*:*:*:*",
"matchCriteriaId": "9B2FC5C7-B218-4B87-9805-F90AC0E7A281",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.17.1:*:*:*:*:*:*:*",
"matchCriteriaId": "BBCDA64F-C49A-4F5B-B285-4079D8E3A499",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.17.2:*:*:*:*:*:*:*",
"matchCriteriaId": "930AF809-CA52-41CB-985A-066B8239C7CD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.17.3:*:*:*:*:*:*:*",
"matchCriteriaId": "85ED3457-CC21-4DB3-931F-677F723E1B2A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.17.4:*:*:*:*:*:*:*",
"matchCriteriaId": "6C8711D3-55CF-4131-BBAC-6BE07068219F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.17.5:*:*:*:*:*:*:*",
"matchCriteriaId": "DF54FFA5-5177-46E6-9AFA-BA3345C16E8A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.17.6:*:*:*:*:*:*:*",
"matchCriteriaId": "69D7EA7C-B401-4F5A-AC08-2199DD117403",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.17.7:*:*:*:*:*:*:*",
"matchCriteriaId": "DC2DDC7C-CD2B-4597-A5E0-266A884958FC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.18:*:*:*:*:*:*:*",
"matchCriteriaId": "DDB99B2D-CA05-4BC0-BCA4-9B94DF248333",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.18:rc1:*:*:*:*:*:*",
"matchCriteriaId": "3635C0E9-2E43-4BAE-8267-2BB2F68B03BD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.18:rc2:*:*:*:*:*:*",
"matchCriteriaId": "4869A709-AF79-49BD-A7D2-D48A8D79A085",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.18:rc3:*:*:*:*:*:*",
"matchCriteriaId": "EAC72143-27C3-498F-AFAB-98AE043C0545",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.18.1:*:*:*:*:*:*:*",
"matchCriteriaId": "BE5E8E72-D493-460D-B5A0-F90C291398A5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.18.2:*:*:*:*:*:*:*",
"matchCriteriaId": "04885D31-09F3-455F-A1A9-815E182ABCF9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.18.3:*:*:*:*:*:*:*",
"matchCriteriaId": "F153300E-42CC-4BDD-88EC-E8A0ADB4E3B7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.18.4:*:*:*:*:*:*:*",
"matchCriteriaId": "92BCD546-2A50-4F43-935C-B68459EE894E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.18.5:*:*:*:*:*:*:*",
"matchCriteriaId": "C535BAB7-6146-440B-ADBD-51007585CFC8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.18.6:*:*:*:*:*:*:*",
"matchCriteriaId": "7B6BA7E8-DEC7-4D94-B9F9-B70EC39FD892",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.18.6\\+:*:*:*:*:*:*:*",
"matchCriteriaId": "15E6F17A-7292-4640-A5E6-59865D1CDD7B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.18.7:*:*:*:*:*:*:*",
"matchCriteriaId": "E9130B6B-764B-4B83-A2BD-E16013682875",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.18.8:*:*:*:*:*:*:*",
"matchCriteriaId": "7C7A5111-8729-48DF-B308-7A489BEFA6D0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.18.9:*:*:*:*:*:*:*",
"matchCriteriaId": "15E24C39-0E61-4A57-B93F-F0ABF4CEAEEB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.19:*:*:*:*:*:*:*",
"matchCriteriaId": "725BD7BE-1769-4032-ADA8-9ED15528C770",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.19.1:*:*:*:*:*:*:*",
"matchCriteriaId": "239D70F4-7D86-4A57-ACEF-440F68994FB6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.19.2:*:*:*:*:*:*:*",
"matchCriteriaId": "ABEE2C94-DA69-4A78-A15F-538383A7460E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.19.3:*:*:*:*:*:*:*",
"matchCriteriaId": "4F7CD64E-7FAA-40DC-B36E-8B7EB9D620FB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.20:*:*:*:*:*:*:*",
"matchCriteriaId": "A749C7AB-6F60-469C-BD95-759205DDA345",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.20:rc1:*:*:*:*:*:*",
"matchCriteriaId": "B45F6C27-D89A-42A0-A304-5B0C57D2A9F1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.20:rc2:*:*:*:*:*:*",
"matchCriteriaId": "196B7CD8-D721-4CFB-B126-78758128E900",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.20.1:*:*:*:*:*:*:*",
"matchCriteriaId": "BEA9DE63-9951-4FE0-80BE-0F6F197303D7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.20.2:*:*:*:*:*:*:*",
"matchCriteriaId": "B0CEDD02-1CB8-4D5B-B82B-E300B4E39065",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.20.3:*:*:*:*:*:*:*",
"matchCriteriaId": "8E27101B-7985-4412-A14F-9ED11E4C874C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.20.4:*:*:*:*:*:*:*",
"matchCriteriaId": "8A74E8A2-223E-4877-989E-494362B513E9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.20.5:*:*:*:*:*:*:*",
"matchCriteriaId": "E0CAFB45-B115-4492-9919-60223304BB27",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.20.6:*:*:*:*:*:*:*",
"matchCriteriaId": "DC3F7C44-C734-419B-AB62-3AD52554FC7D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.20.7:*:*:*:*:*:*:*",
"matchCriteriaId": "695036D1-994C-451E-8D53-0A345702E4D1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.21:*:*:*:*:*:*:*",
"matchCriteriaId": "2053CFB4-602E-4141-BB3D-A440E2A31D85",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.21.1:*:*:*:*:*:*:*",
"matchCriteriaId": "31ACBA13-AC13-4469-862F-B3DD2327B6FC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.21.2:*:*:*:*:*:*:*",
"matchCriteriaId": "9E9EC243-3E25-4234-A88A-FDD5B594BFBA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.21.2:rc1:*:*:*:*:*:*",
"matchCriteriaId": "AE0570E9-B967-4325-92CB-2FB6CA010C4F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.22:*:*:*:*:*:*:*",
"matchCriteriaId": "F2969731-8256-431B-9356-4BC873D98F6D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.22:rc1:*:*:*:*:*:*",
"matchCriteriaId": "1C166E42-9B36-4883-B738-EEBEF3056D98",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.22.1:*:*:*:*:*:*:*",
"matchCriteriaId": "E5177876-0FEC-481B-815F-84AF53968644",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.22.2:*:*:*:*:*:*:*",
"matchCriteriaId": "BC38566A-07F1-4F21-BAC1-259F844DC15C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.22.3:*:*:*:*:*:*:*",
"matchCriteriaId": "AE1684B8-3060-4139-BC06-707F27A05958",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.22.4:*:*:*:*:*:*:*",
"matchCriteriaId": "FF32C74C-3EA3-4E1F-BADA-BB4A92068266",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.22.5:*:*:*:*:*:*:*",
"matchCriteriaId": "D569A750-C649-4D40-89AB-D29773E66F66",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.22.6:*:*:*:*:*:*:*",
"matchCriteriaId": "95B69FA8-1182-46F1-952F-4610288ED409",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.22.7:*:*:*:*:*:*:*",
"matchCriteriaId": "5716BB97-7829-4FDE-92AC-69CA10332F45",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.23:*:*:*:*:*:*:*",
"matchCriteriaId": "02846865-D124-4C72-85C8-59A7C6F43E2E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.23.1:*:*:*:*:*:*:*",
"matchCriteriaId": "99B59422-ED6E-4F82-8D0C-091058D1C438",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.23.2:*:*:*:*:*:*:*",
"matchCriteriaId": "F658844A-6253-4A18-8A5D-1E818BE7A367",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.23.3:*:*:*:*:*:*:*",
"matchCriteriaId": "4753AB35-B95C-4544-A874-5E6D83929AC1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.23.4:*:*:*:*:*:*:*",
"matchCriteriaId": "C4880D54-CA42-4CCA-B01E-2C125002BF5C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.0:*:*:*:*:*:*:*",
"matchCriteriaId": "D4D9F54A-15A7-4899-B695-D9D8B96C4A9B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.0:rc1:*:*:*:*:*:*",
"matchCriteriaId": "BD56D9C0-38C6-4679-8104-1A0B88B71C0E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "45C36666-518F-4956-816A-940930425955",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "FF2DF96F-E45E-45AF-85E5-E939F923EC1B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "80EBAA09-F2C8-445E-8E3A-B5F937E1B1E2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.0.3:*:*:*:*:*:*:*",
"matchCriteriaId": "11C6713F-01ED-4AE9-AE42-89926067E6E6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.0.4:*:*:*:*:*:*:*",
"matchCriteriaId": "7AB5010D-37A3-4B6E-92B6-6F41A3708851",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.0.5:*:*:*:*:*:*:*",
"matchCriteriaId": "EEB09719-122F-4D25-B680-18029D5D9DE9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.0.6:*:*:*:*:*:*:*",
"matchCriteriaId": "AF585D92-9FAF-4858-A956-68AF77227333",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.0.7:*:*:*:*:*:*:*",
"matchCriteriaId": "7BA67823-C9D9-4C5B-A4ED-669E6F1851C0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.0.8:*:*:*:*:*:*:*",
"matchCriteriaId": "CB0F7531-A660-4604-80BD-15B01E2916BD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.0.9:*:*:*:*:*:*:*",
"matchCriteriaId": "A6FE6868-BB9F-4EB8-9E37-3438559CB01B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.0.10:*:*:*:*:*:*:*",
"matchCriteriaId": "1EC90352-C94A-4F47-AFB7-713B547373CC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.0.11:*:*:*:*:*:*:*",
"matchCriteriaId": "E5E77E01-D779-482A-9FAC-4AC210B68771",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.0_rc1:*:*:*:*:*:*:*",
"matchCriteriaId": "5E608E27-D43C-4F34-952D-2F49A71B1E2B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "154EA18F-534C-4095-837D-BB9865D25F23",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "585F05F2-B294-4218-9209-C487B4D2994B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.1.2:*:*:*:*:*:*:*",
"matchCriteriaId": "F3246890-8D66-474F-AC9C-BC556426467D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.1.3:*:*:*:*:*:*:*",
"matchCriteriaId": "7090332F-4CC2-4ADD-AEEC-75238BCA55CC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.1.4:*:*:*:*:*:*:*",
"matchCriteriaId": "F960BE59-05B1-4438-A854-279612E13A7B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.2:*:*:*:*:*:*:*",
"matchCriteriaId": "F248EA4D-1A39-40FD-8D3C-9701D36FD6B1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.2:rc1:*:*:*:*:*:*",
"matchCriteriaId": "170EB43B-9488-4E25-9401-B84DE838247B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.2:rc2:*:*:*:*:*:*",
"matchCriteriaId": "B1ED7682-A315-4F92-9F9F-38290BCC058E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.2.1:*:*:*:*:*:*:*",
"matchCriteriaId": "14B5A433-526F-436E-9FCD-B71E661180FD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.2.2:*:*:*:*:*:*:*",
"matchCriteriaId": "48EDC5BC-AD4B-4E67-B79C-F44292307AB4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.2.3:*:*:*:*:*:*:*",
"matchCriteriaId": "6FEC62B7-2CAA-4A0D-A9B2-B4A6B105A6F7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.2.4:*:*:*:*:*:*:*",
"matchCriteriaId": "4B4A7A67-1355-4648-B8C9-3231BED96547",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.2.5:*:*:*:*:*:*:*",
"matchCriteriaId": "442AB3EE-61DF-4B25-ABEB-55905C01E376",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.2.6:*:*:*:*:*:*:*",
"matchCriteriaId": "7F825E34-D529-4ADC-A7D6-1BD9DAE86FC1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.2.7:*:*:*:*:*:*:*",
"matchCriteriaId": "C1F92D0C-AF71-4FD3-BC4B-C6D0F1F84F9B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.2.8:*:*:*:*:*:*:*",
"matchCriteriaId": "CBC26020-BFD7-493B-BDE2-1EC8DEA1A6DA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.2.9:*:*:*:*:*:*:*",
"matchCriteriaId": "984463B4-00A8-423B-B0C5-A7C4FECF064C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.2.10:*:*:*:*:*:*:*",
"matchCriteriaId": "6C7DC534-FF77-414C-A1DC-945F508CC3C9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.3:*:*:*:*:*:*:*",
"matchCriteriaId": "BEB4EF1D-D4D0-40DA-BE78-24FD48030EE0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.3.1:*:*:*:*:*:*:*",
"matchCriteriaId": "B2962084-F778-4574-8105-8C5A260CCBD7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.3.2:*:*:*:*:*:*:*",
"matchCriteriaId": "FF288A74-070E-4EB4-BB92-7D4D41635DD1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.3.3:*:*:*:*:*:*:*",
"matchCriteriaId": "5B8B31F0-6FCC-4258-865B-B65ECBFAF252",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.3.4:*:*:*:*:*:*:*",
"matchCriteriaId": "7A0CCF96-777F-4CEE-BC04-2974663CF5E7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.4:*:*:*:*:*:*:*",
"matchCriteriaId": "D6A71919-DC70-4AE2-9D16-76A177DAE331",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.4:rc1:*:*:*:*:*:*",
"matchCriteriaId": "780896D3-3B49-486F-A136-D3D175C00A34",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.4.1:*:*:*:*:*:*:*",
"matchCriteriaId": "EA43E47B-F474-4F5B-A91B-9AF99359FE5F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.4.2:*:*:*:*:*:*:*",
"matchCriteriaId": "A7A3A453-EE50-458C-8F31-D7AA232006FC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.4.3:*:*:*:*:*:*:*",
"matchCriteriaId": "3D920D39-683D-4F9F-AA85-3C4D1600DAD6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.4.4:*:*:*:*:*:*:*",
"matchCriteriaId": "E7A4F1FD-2B00-4A99-AAA1-DBBFE3748D87",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.4.5:*:*:*:*:*:*:*",
"matchCriteriaId": "EF6A3C0F-8778-4236-B4DC-41DBCF43EB62",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.4.6:*:*:*:*:*:*:*",
"matchCriteriaId": "7D134D4D-6A95-48FE-B8E5-4F90692CB4FD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.4.7:*:*:*:*:*:*:*",
"matchCriteriaId": "08C34E6F-8233-4575-AAE7-4DBFC27453F8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.4.8:*:*:*:*:*:*:*",
"matchCriteriaId": "6D8155F8-CAB1-4EED-B576-F4102253BD25",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.4.9:*:*:*:*:*:*:*",
"matchCriteriaId": "593D2F3B-A386-48D8-BF19-A12F1B4962A6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.4.10:*:*:*:*:*:*:*",
"matchCriteriaId": "F37C651D-8989-478B-A991-654FCDEC8B1D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.4.11:*:*:*:*:*:*:*",
"matchCriteriaId": "AE170AE5-37F5-4750-ACD9-13CA691A80C5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.4.12:*:*:*:*:*:*:*",
"matchCriteriaId": "1DE75B2F-A183-4ED9-A9E9-7ADF54C341FF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.4.13:*:*:*:*:*:*:*",
"matchCriteriaId": "A4D7380C-5608-4F96-82E3-4B36CDCD71EC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.5:*:*:*:*:*:*:*",
"matchCriteriaId": "850ADB66-21F2-49CB-B105-BDA16A286CFC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.5.1:*:*:*:*:*:*:*",
"matchCriteriaId": "1907D4D0-9D6E-476E-BD1A-88A32D3EFE38",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.5.2:*:*:*:*:*:*:*",
"matchCriteriaId": "61DD0779-786E-4714-AA73-86FB19E26028",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.5.3:*:*:*:*:*:*:*",
"matchCriteriaId": "A8E8DD97-5799-465D-8B99-F2BD6AA681AB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.6:*:*:*:*:*:*:*",
"matchCriteriaId": "03E40C09-0696-45BC-9AE8-9F6F20964600",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.6:rc1:*:*:*:*:*:*",
"matchCriteriaId": "397E07B5-3D9D-44C7-B8B3-18D04EE84405",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.6.0:*:*:*:*:*:*:*",
"matchCriteriaId": "4A1AD503-7F78-4597-AECD-6DC530AD4D3C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.6.1:*:*:*:*:*:*:*",
"matchCriteriaId": "BCAD5285-E485-4F49-99CF-287545260FDD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.6.2:*:*:*:*:*:*:*",
"matchCriteriaId": "5C193DF3-8D23-44A9-94DE-9F4F7358ED3F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.6.3:*:*:*:*:*:*:*",
"matchCriteriaId": "80BA8C84-32C3-4ECF-B4C7-573B12441D22",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.6.4:*:*:*:*:*:*:*",
"matchCriteriaId": "820EC9F1-B66C-43CE-B254-145F4AC23083",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.6.5:*:*:*:*:*:*:*",
"matchCriteriaId": "C4BDA6DC-8D53-417D-8320-CE266F8607B7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.6.6:*:*:*:*:*:*:*",
"matchCriteriaId": "5B01E0D5-3F26-4A71-A22C-FAD7CBF47283",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.6.7:*:*:*:*:*:*:*",
"matchCriteriaId": "6C33D8DA-86A4-4A70-82F8-27D5DE3881EA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.6.8:*:*:*:*:*:*:*",
"matchCriteriaId": "884D0728-8E3C-47F3-9DDD-FA976E1553EB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.6.9:*:*:*:*:*:*:*",
"matchCriteriaId": "C47C594A-D3B6-44FD-93D7-7E69212050BF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.6.10:*:*:*:*:*:*:*",
"matchCriteriaId": "551303CA-63C5-4A3A-9280-ADB2B77C05F7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.6.11:*:*:*:*:*:*:*",
"matchCriteriaId": "0777EB93-D11C-4837-BB7F-96DEC716E1BB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.6.12:*:*:*:*:*:*:*",
"matchCriteriaId": "10FFAD30-56A0-40C8-AE70-70DD9904C528",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.6.13:*:*:*:*:*:*:*",
"matchCriteriaId": "3620DE78-AF48-44EC-B211-E0C26F4E951F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.7:*:*:*:*:*:*:*",
"matchCriteriaId": "2757B2A7-5232-4245-9CC6-91BF9E3ECA09",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.7.1:*:*:*:*:*:*:*",
"matchCriteriaId": "740ADCB7-B296-4728-A73A-9691265B8F07",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.7.2:*:*:*:*:*:*:*",
"matchCriteriaId": "6187C92D-FEE9-4B1B-B7ED-9A1DD360B204",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.7.3:*:*:*:*:*:*:*",
"matchCriteriaId": "71213AF6-48CC-469F-9FBA-CAF1D3237657",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:4.0:*:*:*:*:*:*:*",
"matchCriteriaId": "DABC1683-0E04-456E-9500-68D0D35815E6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:4.0:rc1:*:*:*:*:*:*",
"matchCriteriaId": "38D71912-DCD6-44BB-8A86-72D207B49E58",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:4.0:rc2:*:*:*:*:*:*",
"matchCriteriaId": "D5A8816A-84EE-44B0-AD3B-5C9BC9B3E71E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:4.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "A367BFF0-397D-416F-960C-602E8B66421A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:4.0.10:*:*:*:*:*:*:*",
"matchCriteriaId": "145D0FF7-1691-4A73-95FA-284A9EF79F65",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:4.0.11:*:*:*:*:*:*:*",
"matchCriteriaId": "A9C9A0A8-139B-469D-ABE8-2724D65F7EAA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:4.0.12:*:*:*:*:*:*:*",
"matchCriteriaId": "4A54C2C7-AA44-46E9-BF03-E00018084093",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:4.0.13:*:*:*:*:*:*:*",
"matchCriteriaId": "BECED922-3748-4534-9750-3A061B939A0B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:4.0.14:*:*:*:*:*:*:*",
"matchCriteriaId": "A8A5E5C6-AF2D-4C31-B422-63D0182EC21B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:4.1:*:*:*:*:*:*:*",
"matchCriteriaId": "85CDC579-6967-4E5C-B716-B2BC04F6DBF2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:4.1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "27783033-F558-427C-89A7-C3638C57F2A0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:4.1.2:*:*:*:*:*:*:*",
"matchCriteriaId": "E91557C7-8C53-49C4-8BC5-7F86D4AA09B8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:4.1.3:*:*:*:*:*:*:*",
"matchCriteriaId": "50448355-F1D3-48AB-AED0-5FE027D7C199",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:4.2:*:*:*:*:*:*:*",
"matchCriteriaId": "7CE9B4E3-8044-4305-A517-E695D0831355",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:4.2:rc1:*:*:*:*:*:*",
"matchCriteriaId": "4BDA28D1-5B26-4FBA-B685-C230569AF024",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:4.2:rc2:*:*:*:*:*:*",
"matchCriteriaId": "F61B90BF-3548-4D3A-BF70-A9DC96C11775",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:4.2.1:*:*:*:*:*:*:*",
"matchCriteriaId": "AD204F45-15FE-4677-BC4C-A53F322A3B15",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:4.2.2:*:*:*:*:*:*:*",
"matchCriteriaId": "22FAFCDF-C615-4958-9C6D-E74EC11E9A62",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:4.2.3:*:*:*:*:*:*:*",
"matchCriteriaId": "4D623AEB-622E-470E-898C-A447F9C4066A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:4.2.4:*:*:*:*:*:*:*",
"matchCriteriaId": "9019921A-B8D2-4774-AB6B-673FC2FD2197",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:4.2.5:*:*:*:*:*:*:*",
"matchCriteriaId": "1DC1A059-DDE4-4442-BD90-20AB3CE0E1CC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:4.2.6:*:*:*:*:*:*:*",
"matchCriteriaId": "4801DB4A-F828-4E95-8619-F909D5D39524",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:4.2.7:*:*:*:*:*:*:*",
"matchCriteriaId": "1E0D48CD-C77A-4D86-B091-2B8DF3ADA6D7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:4.2.8:*:*:*:*:*:*:*",
"matchCriteriaId": "956C5C97-E7A8-49F2-8AC6-9570A5948395",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:4.2.9:*:*:*:*:*:*:*",
"matchCriteriaId": "281A3D1A-1F92-454D-AE09-522114FF9D8D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:4.2.10:*:*:*:*:*:*:*",
"matchCriteriaId": "717B879A-EDEA-4917-A75E-2C40BB8D35D7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:4.3:*:*:*:*:*:*:*",
"matchCriteriaId": "F119CA93-4D32-4852-90AD-A23215D6CBAC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:4.3.1:*:*:*:*:*:*:*",
"matchCriteriaId": "6CA9A1C4-412D-4EED-8259-04F48322238B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:4.3.2:*:*:*:*:*:*:*",
"matchCriteriaId": "27847E43-22AD-468D-8E64-8D56EA8CBE50",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:4.3.3:*:*:*:*:*:*:*",
"matchCriteriaId": "8DBB66FA-6E99-4F08-A223-6070E193B869",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:4.4:*:*:*:*:*:*:*",
"matchCriteriaId": "D00AE646-61CC-4036-8B8F-35B818530BFC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:4.4:rc1:*:*:*:*:*:*",
"matchCriteriaId": "FF326273-99CF-40C3-B112-F5F18C94978F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:4.4:rc2:*:*:*:*:*:*",
"matchCriteriaId": "ECED66BE-C877-4250-AC7A-FAEAD9DAAC31",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:4.4.1:*:*:*:*:*:*:*",
"matchCriteriaId": "9FFFD96D-D0B5-47BB-91D9-3736E343711E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:4.4.2:*:*:*:*:*:*:*",
"matchCriteriaId": "4D710732-6D93-4143-874F-81B19F70FBEF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:4.4.3:*:*:*:*:*:*:*",
"matchCriteriaId": "FD56846F-40B5-4A45-99DB-44C56E3A20A3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:4.4.4:*:*:*:*:*:*:*",
"matchCriteriaId": "32C22A06-5F01-4C6A-886F-E3C0776C3C5B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:4.4.5:*:*:*:*:*:*:*",
"matchCriteriaId": "6457398E-A1C9-4F72-BBF7-FC54118FA91C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:4.5:*:*:*:*:*:*:*",
"matchCriteriaId": "5FA8C43E-AD0C-45F7-BC20-61358C7F23EA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:4.5.1:*:*:*:*:*:*:*",
"matchCriteriaId": "E86608A6-8B14-4D27-A86B-1DD10E1F7825",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:4.5.2:*:*:*:*:*:*:*",
"matchCriteriaId": "D7F176CD-2EE5-4C7D-A376-4EA8918610C3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:4.5.3:*:*:*:*:*:*:*",
"matchCriteriaId": "0BD5F23A-33EC-4D8A-B39D-972A048DAB0A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:4.5.4:*:*:*:*:*:*:*",
"matchCriteriaId": "D1F3C39E-50A1-4005-AC0B-097A1FA6E1C2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:4.5.5:*:*:*:*:*:*:*",
"matchCriteriaId": "47A322B9-DA3A-448C-BD61-3E67A98AC74E",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:fedoraproject:fedora:19:*:*:*:*:*:*:*",
"matchCriteriaId": "5991814D-CA77-4C25-90D2-DB542B17E0AD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:fedoraproject:fedora:20:*:*:*:*:*:*:*",
"matchCriteriaId": "FF47C9F0-D8DA-4B55-89EB-9B2C9383ADB9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:fedoraproject:fedora:21:*:*:*:*:*:*:*",
"matchCriteriaId": "56BDB5A0-0839-4A20-A003-B8CD56F48171",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Bugzilla 2.x through 4.0.x before 4.0.15, 4.1.x and 4.2.x before 4.2.11, 4.3.x and 4.4.x before 4.4.6, and 4.5.x before 4.5.6 allows remote authenticated users to obtain sensitive private-comment information by leveraging a role as a flag recipient, related to Bug.pm, Flag.pm, and a mail template."
},
{
"lang": "es",
"value": "Bugzilla 2.x hasta 4.0.x anterior a 4.0.15, 4.1.x y 4.2.x anterior a 4.2.11, 4.3.x y 4.4.x anterior a 4.4.6, y 4.5.x anterior a 4.5.6 permite a usuarios remotos autenticados obtener informaci\u00f3n sensible de comentarios privados mediante el aprovechamiento de un rol como un recipiente de indicadores, relacionado con Bug.pm, Flag.pm, y una plantilla de correo."
}
],
"id": "CVE-2014-1571",
"lastModified": "2025-04-12T10:46:40.837",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "NONE",
"baseScore": 4.0,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:S/C:P/I:N/A:N",
"version": "2.0"
},
"exploitabilityScore": 8.0,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
]
},
"published": "2014-10-13T01:55:05.887",
"references": [
{
"source": "security@mozilla.org",
"url": "http://advisories.mageia.org/MGASA-2014-0412.html"
},
{
"source": "security@mozilla.org",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-November/142524.html"
},
{
"source": "security@mozilla.org",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-October/141309.html"
},
{
"source": "security@mozilla.org",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-October/141321.html"
},
{
"source": "security@mozilla.org",
"url": "http://packetstormsecurity.com/files/128578/Bugzilla-Account-Creation-XSS-Information-Leak.html"
},
{
"source": "security@mozilla.org",
"tags": [
"Vendor Advisory"
],
"url": "http://www.bugzilla.org/security/4.0.14/"
},
{
"source": "security@mozilla.org",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2014:200"
},
{
"source": "security@mozilla.org",
"url": "http://www.securitytracker.com/id/1030978"
},
{
"source": "security@mozilla.org",
"tags": [
"Patch"
],
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1064140"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://advisories.mageia.org/MGASA-2014-0412.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-November/142524.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-October/141309.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-October/141321.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://packetstormsecurity.com/files/128578/Bugzilla-Account-Creation-XSS-Information-Leak.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://www.bugzilla.org/security/4.0.14/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2014:200"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securitytracker.com/id/1030978"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
],
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1064140"
}
],
"sourceIdentifier": "security@mozilla.org",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-200"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
FKIE_CVE-2014-1546
Vulnerability from fkie_nvd - Published: 2014-08-14 11:15 - Updated: 2025-04-12 10:46{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.0:*:*:*:*:*:*:*",
"matchCriteriaId": "D4D9F54A-15A7-4899-B695-D9D8B96C4A9B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.0:rc1:*:*:*:*:*:*",
"matchCriteriaId": "BD56D9C0-38C6-4679-8104-1A0B88B71C0E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "45C36666-518F-4956-816A-940930425955",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "FF2DF96F-E45E-45AF-85E5-E939F923EC1B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "80EBAA09-F2C8-445E-8E3A-B5F937E1B1E2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.0.3:*:*:*:*:*:*:*",
"matchCriteriaId": "11C6713F-01ED-4AE9-AE42-89926067E6E6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.0.4:*:*:*:*:*:*:*",
"matchCriteriaId": "7AB5010D-37A3-4B6E-92B6-6F41A3708851",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.0.5:*:*:*:*:*:*:*",
"matchCriteriaId": "EEB09719-122F-4D25-B680-18029D5D9DE9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.0.6:*:*:*:*:*:*:*",
"matchCriteriaId": "AF585D92-9FAF-4858-A956-68AF77227333",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.0.7:*:*:*:*:*:*:*",
"matchCriteriaId": "7BA67823-C9D9-4C5B-A4ED-669E6F1851C0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.0.8:*:*:*:*:*:*:*",
"matchCriteriaId": "CB0F7531-A660-4604-80BD-15B01E2916BD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.0.9:*:*:*:*:*:*:*",
"matchCriteriaId": "A6FE6868-BB9F-4EB8-9E37-3438559CB01B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.0.10:*:*:*:*:*:*:*",
"matchCriteriaId": "1EC90352-C94A-4F47-AFB7-713B547373CC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.0.11:*:*:*:*:*:*:*",
"matchCriteriaId": "E5E77E01-D779-482A-9FAC-4AC210B68771",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "154EA18F-534C-4095-837D-BB9865D25F23",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "585F05F2-B294-4218-9209-C487B4D2994B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.1.2:*:*:*:*:*:*:*",
"matchCriteriaId": "F3246890-8D66-474F-AC9C-BC556426467D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.1.3:*:*:*:*:*:*:*",
"matchCriteriaId": "7090332F-4CC2-4ADD-AEEC-75238BCA55CC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.1.4:*:*:*:*:*:*:*",
"matchCriteriaId": "F960BE59-05B1-4438-A854-279612E13A7B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.2:*:*:*:*:*:*:*",
"matchCriteriaId": "F248EA4D-1A39-40FD-8D3C-9701D36FD6B1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.2:rc1:*:*:*:*:*:*",
"matchCriteriaId": "170EB43B-9488-4E25-9401-B84DE838247B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.2:rc2:*:*:*:*:*:*",
"matchCriteriaId": "B1ED7682-A315-4F92-9F9F-38290BCC058E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.2.1:*:*:*:*:*:*:*",
"matchCriteriaId": "14B5A433-526F-436E-9FCD-B71E661180FD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.2.2:*:*:*:*:*:*:*",
"matchCriteriaId": "48EDC5BC-AD4B-4E67-B79C-F44292307AB4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.2.3:*:*:*:*:*:*:*",
"matchCriteriaId": "6FEC62B7-2CAA-4A0D-A9B2-B4A6B105A6F7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.2.4:*:*:*:*:*:*:*",
"matchCriteriaId": "4B4A7A67-1355-4648-B8C9-3231BED96547",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.2.5:*:*:*:*:*:*:*",
"matchCriteriaId": "442AB3EE-61DF-4B25-ABEB-55905C01E376",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.2.6:*:*:*:*:*:*:*",
"matchCriteriaId": "7F825E34-D529-4ADC-A7D6-1BD9DAE86FC1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.2.7:*:*:*:*:*:*:*",
"matchCriteriaId": "C1F92D0C-AF71-4FD3-BC4B-C6D0F1F84F9B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.2.8:*:*:*:*:*:*:*",
"matchCriteriaId": "CBC26020-BFD7-493B-BDE2-1EC8DEA1A6DA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.2.9:*:*:*:*:*:*:*",
"matchCriteriaId": "984463B4-00A8-423B-B0C5-A7C4FECF064C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.2.10:*:*:*:*:*:*:*",
"matchCriteriaId": "6C7DC534-FF77-414C-A1DC-945F508CC3C9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.3:*:*:*:*:*:*:*",
"matchCriteriaId": "BEB4EF1D-D4D0-40DA-BE78-24FD48030EE0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.3.1:*:*:*:*:*:*:*",
"matchCriteriaId": "B2962084-F778-4574-8105-8C5A260CCBD7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.3.2:*:*:*:*:*:*:*",
"matchCriteriaId": "FF288A74-070E-4EB4-BB92-7D4D41635DD1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.3.3:*:*:*:*:*:*:*",
"matchCriteriaId": "5B8B31F0-6FCC-4258-865B-B65ECBFAF252",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.3.4:*:*:*:*:*:*:*",
"matchCriteriaId": "7A0CCF96-777F-4CEE-BC04-2974663CF5E7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.4:*:*:*:*:*:*:*",
"matchCriteriaId": "D6A71919-DC70-4AE2-9D16-76A177DAE331",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.4:rc1:*:*:*:*:*:*",
"matchCriteriaId": "780896D3-3B49-486F-A136-D3D175C00A34",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.4.1:*:*:*:*:*:*:*",
"matchCriteriaId": "EA43E47B-F474-4F5B-A91B-9AF99359FE5F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.4.2:*:*:*:*:*:*:*",
"matchCriteriaId": "A7A3A453-EE50-458C-8F31-D7AA232006FC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.4.3:*:*:*:*:*:*:*",
"matchCriteriaId": "3D920D39-683D-4F9F-AA85-3C4D1600DAD6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.4.4:*:*:*:*:*:*:*",
"matchCriteriaId": "E7A4F1FD-2B00-4A99-AAA1-DBBFE3748D87",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.4.5:*:*:*:*:*:*:*",
"matchCriteriaId": "EF6A3C0F-8778-4236-B4DC-41DBCF43EB62",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.4.6:*:*:*:*:*:*:*",
"matchCriteriaId": "7D134D4D-6A95-48FE-B8E5-4F90692CB4FD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.4.7:*:*:*:*:*:*:*",
"matchCriteriaId": "08C34E6F-8233-4575-AAE7-4DBFC27453F8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.4.8:*:*:*:*:*:*:*",
"matchCriteriaId": "6D8155F8-CAB1-4EED-B576-F4102253BD25",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.4.9:*:*:*:*:*:*:*",
"matchCriteriaId": "593D2F3B-A386-48D8-BF19-A12F1B4962A6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.4.10:*:*:*:*:*:*:*",
"matchCriteriaId": "F37C651D-8989-478B-A991-654FCDEC8B1D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.4.11:*:*:*:*:*:*:*",
"matchCriteriaId": "AE170AE5-37F5-4750-ACD9-13CA691A80C5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.4.12:*:*:*:*:*:*:*",
"matchCriteriaId": "1DE75B2F-A183-4ED9-A9E9-7ADF54C341FF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.4.13:*:*:*:*:*:*:*",
"matchCriteriaId": "A4D7380C-5608-4F96-82E3-4B36CDCD71EC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.5:*:*:*:*:*:*:*",
"matchCriteriaId": "850ADB66-21F2-49CB-B105-BDA16A286CFC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.5.1:*:*:*:*:*:*:*",
"matchCriteriaId": "1907D4D0-9D6E-476E-BD1A-88A32D3EFE38",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.5.2:*:*:*:*:*:*:*",
"matchCriteriaId": "61DD0779-786E-4714-AA73-86FB19E26028",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.5.3:*:*:*:*:*:*:*",
"matchCriteriaId": "A8E8DD97-5799-465D-8B99-F2BD6AA681AB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.6:*:*:*:*:*:*:*",
"matchCriteriaId": "03E40C09-0696-45BC-9AE8-9F6F20964600",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.6:rc1:*:*:*:*:*:*",
"matchCriteriaId": "397E07B5-3D9D-44C7-B8B3-18D04EE84405",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.6.0:*:*:*:*:*:*:*",
"matchCriteriaId": "4A1AD503-7F78-4597-AECD-6DC530AD4D3C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.6.1:*:*:*:*:*:*:*",
"matchCriteriaId": "BCAD5285-E485-4F49-99CF-287545260FDD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.6.2:*:*:*:*:*:*:*",
"matchCriteriaId": "5C193DF3-8D23-44A9-94DE-9F4F7358ED3F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.6.3:*:*:*:*:*:*:*",
"matchCriteriaId": "80BA8C84-32C3-4ECF-B4C7-573B12441D22",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.6.4:*:*:*:*:*:*:*",
"matchCriteriaId": "820EC9F1-B66C-43CE-B254-145F4AC23083",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.6.5:*:*:*:*:*:*:*",
"matchCriteriaId": "C4BDA6DC-8D53-417D-8320-CE266F8607B7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.6.6:*:*:*:*:*:*:*",
"matchCriteriaId": "5B01E0D5-3F26-4A71-A22C-FAD7CBF47283",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.6.7:*:*:*:*:*:*:*",
"matchCriteriaId": "6C33D8DA-86A4-4A70-82F8-27D5DE3881EA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.6.8:*:*:*:*:*:*:*",
"matchCriteriaId": "884D0728-8E3C-47F3-9DDD-FA976E1553EB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.6.9:*:*:*:*:*:*:*",
"matchCriteriaId": "C47C594A-D3B6-44FD-93D7-7E69212050BF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.6.10:*:*:*:*:*:*:*",
"matchCriteriaId": "551303CA-63C5-4A3A-9280-ADB2B77C05F7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.6.11:*:*:*:*:*:*:*",
"matchCriteriaId": "0777EB93-D11C-4837-BB7F-96DEC716E1BB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.6.12:*:*:*:*:*:*:*",
"matchCriteriaId": "10FFAD30-56A0-40C8-AE70-70DD9904C528",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.6.13:*:*:*:*:*:*:*",
"matchCriteriaId": "3620DE78-AF48-44EC-B211-E0C26F4E951F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.7:*:*:*:*:*:*:*",
"matchCriteriaId": "2757B2A7-5232-4245-9CC6-91BF9E3ECA09",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.7.1:*:*:*:*:*:*:*",
"matchCriteriaId": "740ADCB7-B296-4728-A73A-9691265B8F07",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.7.2:*:*:*:*:*:*:*",
"matchCriteriaId": "6187C92D-FEE9-4B1B-B7ED-9A1DD360B204",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.7.3:*:*:*:*:*:*:*",
"matchCriteriaId": "71213AF6-48CC-469F-9FBA-CAF1D3237657",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:4.0:*:*:*:*:*:*:*",
"matchCriteriaId": "DABC1683-0E04-456E-9500-68D0D35815E6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:4.0:rc1:*:*:*:*:*:*",
"matchCriteriaId": "38D71912-DCD6-44BB-8A86-72D207B49E58",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:4.0:rc2:*:*:*:*:*:*",
"matchCriteriaId": "D5A8816A-84EE-44B0-AD3B-5C9BC9B3E71E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:4.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "A367BFF0-397D-416F-960C-602E8B66421A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:4.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "A6229B76-3EB0-45D9-9667-7E94D0880AE7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:4.0.3:*:*:*:*:*:*:*",
"matchCriteriaId": "4FCD8B47-9BF6-4F3E-AF88-0416BE31EC65",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:4.0.4:*:*:*:*:*:*:*",
"matchCriteriaId": "C8D0ED4E-F1A7-43B7-B9D2-D6D6AA145459",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:4.0.5:*:*:*:*:*:*:*",
"matchCriteriaId": "93FE2861-A397-4439-9BB8-7B67D7F9D211",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:4.0.6:*:*:*:*:*:*:*",
"matchCriteriaId": "3AF08887-66BF-4B3C-81E9-F8443E7D3285",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:4.0.7:*:*:*:*:*:*:*",
"matchCriteriaId": "D2D243D2-0FD9-45E5-BE52-A2956F587122",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:4.0.8:*:*:*:*:*:*:*",
"matchCriteriaId": "6038EF72-2CDC-42A1-A20A-B23459776E21",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:4.0.9:*:*:*:*:*:*:*",
"matchCriteriaId": "66959932-AB8A-43C7-83CE-07EE576BF2F6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:4.0.10:*:*:*:*:*:*:*",
"matchCriteriaId": "145D0FF7-1691-4A73-95FA-284A9EF79F65",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:4.0.11:*:*:*:*:*:*:*",
"matchCriteriaId": "A9C9A0A8-139B-469D-ABE8-2724D65F7EAA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:4.0.12:*:*:*:*:*:*:*",
"matchCriteriaId": "4A54C2C7-AA44-46E9-BF03-E00018084093",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:4.0.13:*:*:*:*:*:*:*",
"matchCriteriaId": "BECED922-3748-4534-9750-3A061B939A0B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:4.1:*:*:*:*:*:*:*",
"matchCriteriaId": "85CDC579-6967-4E5C-B716-B2BC04F6DBF2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:4.1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "27783033-F558-427C-89A7-C3638C57F2A0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:4.1.2:*:*:*:*:*:*:*",
"matchCriteriaId": "E91557C7-8C53-49C4-8BC5-7F86D4AA09B8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:4.1.3:*:*:*:*:*:*:*",
"matchCriteriaId": "50448355-F1D3-48AB-AED0-5FE027D7C199",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:4.2:*:*:*:*:*:*:*",
"matchCriteriaId": "7CE9B4E3-8044-4305-A517-E695D0831355",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:4.2:rc1:*:*:*:*:*:*",
"matchCriteriaId": "4BDA28D1-5B26-4FBA-B685-C230569AF024",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:4.2:rc2:*:*:*:*:*:*",
"matchCriteriaId": "F61B90BF-3548-4D3A-BF70-A9DC96C11775",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:4.2.1:*:*:*:*:*:*:*",
"matchCriteriaId": "AD204F45-15FE-4677-BC4C-A53F322A3B15",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:4.2.2:*:*:*:*:*:*:*",
"matchCriteriaId": "22FAFCDF-C615-4958-9C6D-E74EC11E9A62",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:4.2.3:*:*:*:*:*:*:*",
"matchCriteriaId": "4D623AEB-622E-470E-898C-A447F9C4066A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:4.2.4:*:*:*:*:*:*:*",
"matchCriteriaId": "9019921A-B8D2-4774-AB6B-673FC2FD2197",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:4.2.5:*:*:*:*:*:*:*",
"matchCriteriaId": "1DC1A059-DDE4-4442-BD90-20AB3CE0E1CC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:4.2.6:*:*:*:*:*:*:*",
"matchCriteriaId": "4801DB4A-F828-4E95-8619-F909D5D39524",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:4.2.7:*:*:*:*:*:*:*",
"matchCriteriaId": "1E0D48CD-C77A-4D86-B091-2B8DF3ADA6D7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:4.2.8:*:*:*:*:*:*:*",
"matchCriteriaId": "956C5C97-E7A8-49F2-8AC6-9570A5948395",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:4.2.9:*:*:*:*:*:*:*",
"matchCriteriaId": "281A3D1A-1F92-454D-AE09-522114FF9D8D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:4.3:*:*:*:*:*:*:*",
"matchCriteriaId": "F119CA93-4D32-4852-90AD-A23215D6CBAC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:4.3.1:*:*:*:*:*:*:*",
"matchCriteriaId": "6CA9A1C4-412D-4EED-8259-04F48322238B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:4.3.2:*:*:*:*:*:*:*",
"matchCriteriaId": "27847E43-22AD-468D-8E64-8D56EA8CBE50",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:4.3.3:*:*:*:*:*:*:*",
"matchCriteriaId": "8DBB66FA-6E99-4F08-A223-6070E193B869",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:4.4:-:*:*:*:*:*:*",
"matchCriteriaId": "4ED67179-EEEB-488A-BD1C-9AE336D16AB5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:4.4:rc1:*:*:*:*:*:*",
"matchCriteriaId": "FF326273-99CF-40C3-B112-F5F18C94978F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:4.4:rc2:*:*:*:*:*:*",
"matchCriteriaId": "ECED66BE-C877-4250-AC7A-FAEAD9DAAC31",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:4.4.1:*:*:*:*:*:*:*",
"matchCriteriaId": "9FFFD96D-D0B5-47BB-91D9-3736E343711E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:4.4.2:*:*:*:*:*:*:*",
"matchCriteriaId": "4D710732-6D93-4143-874F-81B19F70FBEF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:4.4.3:*:*:*:*:*:*:*",
"matchCriteriaId": "FD56846F-40B5-4A45-99DB-44C56E3A20A3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:4.4.4:*:*:*:*:*:*:*",
"matchCriteriaId": "32C22A06-5F01-4C6A-886F-E3C0776C3C5B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:4.5:*:*:*:*:*:*:*",
"matchCriteriaId": "5FA8C43E-AD0C-45F7-BC20-61358C7F23EA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:4.5.1:*:*:*:*:*:*:*",
"matchCriteriaId": "E86608A6-8B14-4D27-A86B-1DD10E1F7825",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:4.5.2:*:*:*:*:*:*:*",
"matchCriteriaId": "D7F176CD-2EE5-4C7D-A376-4EA8918610C3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:4.5.3:*:*:*:*:*:*:*",
"matchCriteriaId": "0BD5F23A-33EC-4D8A-B39D-972A048DAB0A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:4.5.4:*:*:*:*:*:*:*",
"matchCriteriaId": "D1F3C39E-50A1-4005-AC0B-097A1FA6E1C2",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The response function in the JSONP endpoint in WebService/Server/JSONRPC.pm in jsonrpc.cgi in Bugzilla 3.x and 4.x before 4.0.14, 4.1.x and 4.2.x before 4.2.10, 4.3.x and 4.4.x before 4.4.5, and 4.5.x before 4.5.5 accepts certain long callback values and does not restrict the initial bytes of a JSONP response, which allows remote attackers to conduct cross-site request forgery (CSRF) attacks, and obtain sensitive information, via a crafted OBJECT element with SWF content consistent with the _bz_callback character set."
},
{
"lang": "es",
"value": "La funci\u00f3n de respuesta en el endpoint JSONP en WebService/Server/JSONRPC.pm en jsonrpc.cgi en Bugzilla 3.x y 4.x anterior a 4.0.14, 4.1.x y 4.2.x anterior a 4.2.10, 4.3.x y 4.4.x anterior a 4.4.5, y 4.5.x anterior a 4.5.5 acepta ciertos valores de devoluci\u00f3n de llamada largos y no restringe los bytes iniciales de una respuesta JSONP, lo que permite a atacantes remotos realizar ataques de CSRF, y obtener informaci\u00f3n sensible, a trav\u00e9s de un elemento OBJECT manipulado con contenido SWF consistente con el juego de acarcteres _bz_callback."
}
],
"id": "CVE-2014-1546",
"lastModified": "2025-04-12T10:46:40.837",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": true
}
]
},
"published": "2014-08-14T11:15:23.237",
"references": [
{
"source": "security@mozilla.org",
"url": "http://advisories.mageia.org/MGASA-2014-0349.html"
},
{
"source": "security@mozilla.org",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-August/136217.html"
},
{
"source": "security@mozilla.org",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-August/136369.html"
},
{
"source": "security@mozilla.org",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2014:169"
},
{
"source": "security@mozilla.org",
"url": "http://www.securityfocus.com/archive/1/532895"
},
{
"source": "security@mozilla.org",
"url": "http://www.securitytracker.com/id/1030648"
},
{
"source": "security@mozilla.org",
"tags": [
"Vendor Advisory"
],
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1036213"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://advisories.mageia.org/MGASA-2014-0349.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-August/136217.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-August/136369.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2014:169"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securityfocus.com/archive/1/532895"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securitytracker.com/id/1030648"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1036213"
}
],
"sourceIdentifier": "security@mozilla.org",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-352"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
CVE-2018-5123 (GCVE-0-2018-5123)
Vulnerability from cvelistv5 – Published: 2019-04-29 15:34 – Updated: 2024-08-05 05:26- Improper Access Control
| URL | Tags | ||||
|---|---|---|---|---|---|
|
|||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-05T05:26:46.948Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=CVE-2018-5123"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "Bugzilla",
"vendor": "Mozilla",
"versions": [
{
"status": "affected",
"version": "All versions prior to Bugzilla 4.4"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "A third party website can access information available to a user with access to a restricted bug entry using the image generation in report.cgi in all Bugzilla versions prior to 4.4."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "Improper Access Control",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2019-04-29T15:34:03",
"orgId": "f16b083a-5664-49f3-a51e-8d479e5ed7fe",
"shortName": "mozilla"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=CVE-2018-5123"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "security@mozilla.org",
"ID": "CVE-2018-5123",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "Bugzilla",
"version": {
"version_data": [
{
"version_value": "All versions prior to Bugzilla 4.4"
}
]
}
}
]
},
"vendor_name": "Mozilla"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "A third party website can access information available to a user with access to a restricted bug entry using the image generation in report.cgi in all Bugzilla versions prior to 4.4."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Improper Access Control"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://bugzilla.mozilla.org/show_bug.cgi?id=CVE-2018-5123",
"refsource": "CONFIRM",
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=CVE-2018-5123"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "f16b083a-5664-49f3-a51e-8d479e5ed7fe",
"assignerShortName": "mozilla",
"cveId": "CVE-2018-5123",
"datePublished": "2019-04-29T15:34:03",
"dateReserved": "2018-01-03T00:00:00",
"dateUpdated": "2024-08-05T05:26:46.948Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2016-2803 (GCVE-0-2016-2803)
Vulnerability from cvelistv5 – Published: 2017-04-12 22:00 – Updated: 2024-08-05 23:32- n/a
| URL | Tags | |||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-05T23:32:21.226Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "20160516 Security advisory for Bugzilla 5.0.3 and 4.4.12",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ",
"x_transferred"
],
"url": "http://www.securityfocus.com/archive/1/538401/100/0/threaded"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://www.bugzilla.org/security/4.4.11/"
},
{
"name": "1035891",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK",
"x_transferred"
],
"url": "http://www.securitytracker.com/id/1035891"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "http://packetstormsecurity.com/files/137079/Bugzilla-4.4.11-5.0.2-Summary-Cross-Site-Scripting.html"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2016-05-16T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "Cross-site scripting (XSS) vulnerability in the dependency graphs in Bugzilla 2.16rc1 through 4.4.11, and 4.5.1 through 5.0.2 allows remote attackers to inject arbitrary web script or HTML."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2018-10-09T18:57:01",
"orgId": "f16b083a-5664-49f3-a51e-8d479e5ed7fe",
"shortName": "mozilla"
},
"references": [
{
"name": "20160516 Security advisory for Bugzilla 5.0.3 and 4.4.12",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ"
],
"url": "http://www.securityfocus.com/archive/1/538401/100/0/threaded"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://www.bugzilla.org/security/4.4.11/"
},
{
"name": "1035891",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK"
],
"url": "http://www.securitytracker.com/id/1035891"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "http://packetstormsecurity.com/files/137079/Bugzilla-4.4.11-5.0.2-Summary-Cross-Site-Scripting.html"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "security@mozilla.org",
"ID": "CVE-2016-2803",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Cross-site scripting (XSS) vulnerability in the dependency graphs in Bugzilla 2.16rc1 through 4.4.11, and 4.5.1 through 5.0.2 allows remote attackers to inject arbitrary web script or HTML."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "20160516 Security advisory for Bugzilla 5.0.3 and 4.4.12",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/538401/100/0/threaded"
},
{
"name": "https://www.bugzilla.org/security/4.4.11/",
"refsource": "CONFIRM",
"url": "https://www.bugzilla.org/security/4.4.11/"
},
{
"name": "1035891",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1035891"
},
{
"name": "http://packetstormsecurity.com/files/137079/Bugzilla-4.4.11-5.0.2-Summary-Cross-Site-Scripting.html",
"refsource": "MISC",
"url": "http://packetstormsecurity.com/files/137079/Bugzilla-4.4.11-5.0.2-Summary-Cross-Site-Scripting.html"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "f16b083a-5664-49f3-a51e-8d479e5ed7fe",
"assignerShortName": "mozilla",
"cveId": "CVE-2016-2803",
"datePublished": "2017-04-12T22:00:00",
"dateReserved": "2016-03-01T00:00:00",
"dateUpdated": "2024-08-05T23:32:21.226Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2015-8509 (GCVE-0-2015-8509)
Vulnerability from cvelistv5 – Published: 2016-01-03 02:00 – Updated: 2024-08-06 08:20- n/a
| URL | Tags | |||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-06T08:20:42.370Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "20151222 Security advisory for Bugzilla 5.0.2, 4.4.11 and 4.2.16",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ",
"x_transferred"
],
"url": "http://seclists.org/bugtraq/2015/Dec/131"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1232785"
},
{
"name": "79662",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/79662"
},
{
"name": "1034556",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK",
"x_transferred"
],
"url": "http://www.securitytracker.com/id/1034556"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "http://packetstormsecurity.com/files/135048/Bugzilla-Cross-Site-Scripting-Information-Leak.html"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://www.bugzilla.org/security/4.2.15/"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2015-12-22T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "Template.pm in Bugzilla 2.x, 3.x, and 4.x before 4.2.16, 4.3.x and 4.4.x before 4.4.11, and 4.5.x and 5.0.x before 5.0.2 does not properly construct CSV files, which allows remote attackers to obtain sensitive information by leveraging a web browser that interprets CSV data as JavaScript code."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2016-12-05T14:57:01",
"orgId": "f16b083a-5664-49f3-a51e-8d479e5ed7fe",
"shortName": "mozilla"
},
"references": [
{
"name": "20151222 Security advisory for Bugzilla 5.0.2, 4.4.11 and 4.2.16",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ"
],
"url": "http://seclists.org/bugtraq/2015/Dec/131"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1232785"
},
{
"name": "79662",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/79662"
},
{
"name": "1034556",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK"
],
"url": "http://www.securitytracker.com/id/1034556"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "http://packetstormsecurity.com/files/135048/Bugzilla-Cross-Site-Scripting-Information-Leak.html"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://www.bugzilla.org/security/4.2.15/"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "security@mozilla.org",
"ID": "CVE-2015-8509",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Template.pm in Bugzilla 2.x, 3.x, and 4.x before 4.2.16, 4.3.x and 4.4.x before 4.4.11, and 4.5.x and 5.0.x before 5.0.2 does not properly construct CSV files, which allows remote attackers to obtain sensitive information by leveraging a web browser that interprets CSV data as JavaScript code."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "20151222 Security advisory for Bugzilla 5.0.2, 4.4.11 and 4.2.16",
"refsource": "BUGTRAQ",
"url": "http://seclists.org/bugtraq/2015/Dec/131"
},
{
"name": "https://bugzilla.mozilla.org/show_bug.cgi?id=1232785",
"refsource": "CONFIRM",
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1232785"
},
{
"name": "79662",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/79662"
},
{
"name": "1034556",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1034556"
},
{
"name": "http://packetstormsecurity.com/files/135048/Bugzilla-Cross-Site-Scripting-Information-Leak.html",
"refsource": "MISC",
"url": "http://packetstormsecurity.com/files/135048/Bugzilla-Cross-Site-Scripting-Information-Leak.html"
},
{
"name": "https://www.bugzilla.org/security/4.2.15/",
"refsource": "CONFIRM",
"url": "https://www.bugzilla.org/security/4.2.15/"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "f16b083a-5664-49f3-a51e-8d479e5ed7fe",
"assignerShortName": "mozilla",
"cveId": "CVE-2015-8509",
"datePublished": "2016-01-03T02:00:00",
"dateReserved": "2015-12-08T00:00:00",
"dateUpdated": "2024-08-06T08:20:42.370Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2015-8508 (GCVE-0-2015-8508)
Vulnerability from cvelistv5 – Published: 2016-01-03 02:00 – Updated: 2024-08-06 08:20- n/a
| URL | Tags | |||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-06T08:20:42.648Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1221518"
},
{
"name": "20151222 Security advisory for Bugzilla 5.0.2, 4.4.11 and 4.2.16",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ",
"x_transferred"
],
"url": "http://seclists.org/bugtraq/2015/Dec/131"
},
{
"name": "79660",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/79660"
},
{
"name": "1034556",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK",
"x_transferred"
],
"url": "http://www.securitytracker.com/id/1034556"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "http://packetstormsecurity.com/files/135048/Bugzilla-Cross-Site-Scripting-Information-Leak.html"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://www.bugzilla.org/security/4.2.15/"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2015-12-22T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "Cross-site scripting (XSS) vulnerability in showdependencygraph.cgi in Bugzilla 2.x, 3.x, and 4.x before 4.2.16, 4.3.x and 4.4.x before 4.4.11, and 4.5.x and 5.0.x before 5.0.2, when a local dot configuration is used, allows remote attackers to inject arbitrary web script or HTML via a crafted bug summary."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2016-12-05T14:57:01",
"orgId": "f16b083a-5664-49f3-a51e-8d479e5ed7fe",
"shortName": "mozilla"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1221518"
},
{
"name": "20151222 Security advisory for Bugzilla 5.0.2, 4.4.11 and 4.2.16",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ"
],
"url": "http://seclists.org/bugtraq/2015/Dec/131"
},
{
"name": "79660",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/79660"
},
{
"name": "1034556",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK"
],
"url": "http://www.securitytracker.com/id/1034556"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "http://packetstormsecurity.com/files/135048/Bugzilla-Cross-Site-Scripting-Information-Leak.html"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://www.bugzilla.org/security/4.2.15/"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "security@mozilla.org",
"ID": "CVE-2015-8508",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Cross-site scripting (XSS) vulnerability in showdependencygraph.cgi in Bugzilla 2.x, 3.x, and 4.x before 4.2.16, 4.3.x and 4.4.x before 4.4.11, and 4.5.x and 5.0.x before 5.0.2, when a local dot configuration is used, allows remote attackers to inject arbitrary web script or HTML via a crafted bug summary."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://bugzilla.mozilla.org/show_bug.cgi?id=1221518",
"refsource": "CONFIRM",
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1221518"
},
{
"name": "20151222 Security advisory for Bugzilla 5.0.2, 4.4.11 and 4.2.16",
"refsource": "BUGTRAQ",
"url": "http://seclists.org/bugtraq/2015/Dec/131"
},
{
"name": "79660",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/79660"
},
{
"name": "1034556",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1034556"
},
{
"name": "http://packetstormsecurity.com/files/135048/Bugzilla-Cross-Site-Scripting-Information-Leak.html",
"refsource": "MISC",
"url": "http://packetstormsecurity.com/files/135048/Bugzilla-Cross-Site-Scripting-Information-Leak.html"
},
{
"name": "https://www.bugzilla.org/security/4.2.15/",
"refsource": "CONFIRM",
"url": "https://www.bugzilla.org/security/4.2.15/"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "f16b083a-5664-49f3-a51e-8d479e5ed7fe",
"assignerShortName": "mozilla",
"cveId": "CVE-2015-8508",
"datePublished": "2016-01-03T02:00:00",
"dateReserved": "2015-12-08T00:00:00",
"dateUpdated": "2024-08-06T08:20:42.648Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2015-4499 (GCVE-0-2015-4499)
Vulnerability from cvelistv5 – Published: 2015-09-14 01:00 – Updated: 2024-08-06 06:18- n/a
| URL | Tags | ||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-06T06:18:11.279Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "FEDORA-2015-15768",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA",
"x_transferred"
],
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-October/169946.html"
},
{
"name": "1033542",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK",
"x_transferred"
],
"url": "http://www.securitytracker.com/id/1033542"
},
{
"name": "20150910 Security Advisory for Bugzilla 5.0, 4.4.9, and 4.2.14",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ",
"x_transferred"
],
"url": "http://seclists.org/bugtraq/2015/Sep/48"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://bug1202447.bmoattachments.org/attachment.cgi?id=8657861"
},
{
"name": "20150910 Security Advisory for Bugzilla 5.0.1, 4.4.10 and 4.2.15",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ",
"x_transferred"
],
"url": "http://seclists.org/bugtraq/2015/Sep/49"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "http://packetstormsecurity.com/files/133578/Bugzilla-Unauthorized-Account-Creation.html"
},
{
"name": "FEDORA-2015-15769",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA",
"x_transferred"
],
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-October/168725.html"
},
{
"name": "FEDORA-2015-15767",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA",
"x_transferred"
],
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-October/169983.html"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1202447"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2015-09-10T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "Util.pm in Bugzilla 2.x, 3.x, and 4.x before 4.2.15, 4.3.x and 4.4.x before 4.4.10, and 5.x before 5.0.1 mishandles long e-mail addresses during account registration, which allows remote attackers to obtain the default privileges for an arbitrary domain name by placing that name in a substring of an address, as demonstrated by truncation of an @mozilla.com.example.com address to an @mozilla.com address."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2016-12-20T16:57:01",
"orgId": "f16b083a-5664-49f3-a51e-8d479e5ed7fe",
"shortName": "mozilla"
},
"references": [
{
"name": "FEDORA-2015-15768",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA"
],
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-October/169946.html"
},
{
"name": "1033542",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK"
],
"url": "http://www.securitytracker.com/id/1033542"
},
{
"name": "20150910 Security Advisory for Bugzilla 5.0, 4.4.9, and 4.2.14",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ"
],
"url": "http://seclists.org/bugtraq/2015/Sep/48"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://bug1202447.bmoattachments.org/attachment.cgi?id=8657861"
},
{
"name": "20150910 Security Advisory for Bugzilla 5.0.1, 4.4.10 and 4.2.15",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ"
],
"url": "http://seclists.org/bugtraq/2015/Sep/49"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "http://packetstormsecurity.com/files/133578/Bugzilla-Unauthorized-Account-Creation.html"
},
{
"name": "FEDORA-2015-15769",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA"
],
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-October/168725.html"
},
{
"name": "FEDORA-2015-15767",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA"
],
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-October/169983.html"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1202447"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "security@mozilla.org",
"ID": "CVE-2015-4499",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Util.pm in Bugzilla 2.x, 3.x, and 4.x before 4.2.15, 4.3.x and 4.4.x before 4.4.10, and 5.x before 5.0.1 mishandles long e-mail addresses during account registration, which allows remote attackers to obtain the default privileges for an arbitrary domain name by placing that name in a substring of an address, as demonstrated by truncation of an @mozilla.com.example.com address to an @mozilla.com address."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "FEDORA-2015-15768",
"refsource": "FEDORA",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-October/169946.html"
},
{
"name": "1033542",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1033542"
},
{
"name": "20150910 Security Advisory for Bugzilla 5.0, 4.4.9, and 4.2.14",
"refsource": "BUGTRAQ",
"url": "http://seclists.org/bugtraq/2015/Sep/48"
},
{
"name": "https://bug1202447.bmoattachments.org/attachment.cgi?id=8657861",
"refsource": "MISC",
"url": "https://bug1202447.bmoattachments.org/attachment.cgi?id=8657861"
},
{
"name": "20150910 Security Advisory for Bugzilla 5.0.1, 4.4.10 and 4.2.15",
"refsource": "BUGTRAQ",
"url": "http://seclists.org/bugtraq/2015/Sep/49"
},
{
"name": "http://packetstormsecurity.com/files/133578/Bugzilla-Unauthorized-Account-Creation.html",
"refsource": "MISC",
"url": "http://packetstormsecurity.com/files/133578/Bugzilla-Unauthorized-Account-Creation.html"
},
{
"name": "FEDORA-2015-15769",
"refsource": "FEDORA",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-October/168725.html"
},
{
"name": "FEDORA-2015-15767",
"refsource": "FEDORA",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-October/169983.html"
},
{
"name": "https://bugzilla.mozilla.org/show_bug.cgi?id=1202447",
"refsource": "CONFIRM",
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1202447"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "f16b083a-5664-49f3-a51e-8d479e5ed7fe",
"assignerShortName": "mozilla",
"cveId": "CVE-2015-4499",
"datePublished": "2015-09-14T01:00:00",
"dateReserved": "2015-06-10T00:00:00",
"dateUpdated": "2024-08-06T06:18:11.279Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2014-8630 (GCVE-0-2014-8630)
Vulnerability from cvelistv5 – Published: 2015-02-01 15:00 – Updated: 2024-08-06 13:26- n/a
| URL | Tags | ||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-06T13:26:02.521Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://advisories.mageia.org/MGASA-2015-0048.html"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1079065"
},
{
"name": "FEDORA-2015-1713",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA",
"x_transferred"
],
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-February/149921.html"
},
{
"name": "FEDORA-2015-1699",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA",
"x_transferred"
],
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-February/149925.html"
},
{
"name": "MDVSA-2015:030",
"tags": [
"vendor-advisory",
"x_refsource_MANDRIVA",
"x_transferred"
],
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:030"
},
{
"name": "GLSA-201607-11",
"tags": [
"vendor-advisory",
"x_refsource_GENTOO",
"x_transferred"
],
"url": "https://security.gentoo.org/glsa/201607-11"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www.bugzilla.org/security/4.0.15/"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2015-01-21T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "Bugzilla before 4.0.16, 4.1.x and 4.2.x before 4.2.12, 4.3.x and 4.4.x before 4.4.7, and 5.x before 5.0rc1 allows remote authenticated users to execute arbitrary commands by leveraging the editcomponents privilege and triggering crafted input to a two-argument Perl open call, as demonstrated by shell metacharacters in a product name."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2016-12-30T16:57:01",
"orgId": "f16b083a-5664-49f3-a51e-8d479e5ed7fe",
"shortName": "mozilla"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://advisories.mageia.org/MGASA-2015-0048.html"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1079065"
},
{
"name": "FEDORA-2015-1713",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA"
],
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-February/149921.html"
},
{
"name": "FEDORA-2015-1699",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA"
],
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-February/149925.html"
},
{
"name": "MDVSA-2015:030",
"tags": [
"vendor-advisory",
"x_refsource_MANDRIVA"
],
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:030"
},
{
"name": "GLSA-201607-11",
"tags": [
"vendor-advisory",
"x_refsource_GENTOO"
],
"url": "https://security.gentoo.org/glsa/201607-11"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www.bugzilla.org/security/4.0.15/"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "security@mozilla.org",
"ID": "CVE-2014-8630",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Bugzilla before 4.0.16, 4.1.x and 4.2.x before 4.2.12, 4.3.x and 4.4.x before 4.4.7, and 5.x before 5.0rc1 allows remote authenticated users to execute arbitrary commands by leveraging the editcomponents privilege and triggering crafted input to a two-argument Perl open call, as demonstrated by shell metacharacters in a product name."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "http://advisories.mageia.org/MGASA-2015-0048.html",
"refsource": "CONFIRM",
"url": "http://advisories.mageia.org/MGASA-2015-0048.html"
},
{
"name": "https://bugzilla.mozilla.org/show_bug.cgi?id=1079065",
"refsource": "CONFIRM",
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1079065"
},
{
"name": "FEDORA-2015-1713",
"refsource": "FEDORA",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-February/149921.html"
},
{
"name": "FEDORA-2015-1699",
"refsource": "FEDORA",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-February/149925.html"
},
{
"name": "MDVSA-2015:030",
"refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:030"
},
{
"name": "GLSA-201607-11",
"refsource": "GENTOO",
"url": "https://security.gentoo.org/glsa/201607-11"
},
{
"name": "http://www.bugzilla.org/security/4.0.15/",
"refsource": "CONFIRM",
"url": "http://www.bugzilla.org/security/4.0.15/"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "f16b083a-5664-49f3-a51e-8d479e5ed7fe",
"assignerShortName": "mozilla",
"cveId": "CVE-2014-8630",
"datePublished": "2015-02-01T15:00:00",
"dateReserved": "2014-11-06T00:00:00",
"dateUpdated": "2024-08-06T13:26:02.521Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2014-1573 (GCVE-0-2014-1573)
Vulnerability from cvelistv5 – Published: 2014-10-13 01:00 – Updated: 2024-08-06 09:42- n/a
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-06T09:42:36.650Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "http://www.opennet.ru/opennews/art.shtml?num=40766"
},
{
"name": "MDVSA-2014:200",
"tags": [
"vendor-advisory",
"x_refsource_MANDRIVA",
"x_transferred"
],
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2014:200"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "http://packetstormsecurity.com/files/128578/Bugzilla-Account-Creation-XSS-Information-Leak.html"
},
{
"name": "70257",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/70257"
},
{
"name": "[oss-security] 20141007 \"New Class of Vulnerability in Perl Web Applications\"",
"tags": [
"mailing-list",
"x_refsource_MLIST",
"x_transferred"
],
"url": "http://openwall.com/lists/oss-security/2014/10/07/20"
},
{
"name": "FEDORA-2014-12591",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA",
"x_transferred"
],
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-November/142524.html"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "http://www.reddit.com/r/netsec/comments/2ihen0/new_class_of_vulnerability_in_perl_web/"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "http://blog.gerv.net/2014/10/new-class-of-vulnerability-in-perl-web-applications/"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://advisories.mageia.org/MGASA-2014-0412.html"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www.bugzilla.org/security/4.0.14/"
},
{
"name": "GLSA-201607-11",
"tags": [
"vendor-advisory",
"x_refsource_GENTOO",
"x_transferred"
],
"url": "https://security.gentoo.org/glsa/201607-11"
},
{
"name": "FEDORA-2014-12584",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA",
"x_transferred"
],
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-October/141309.html"
},
{
"name": "FEDORA-2014-12530",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA",
"x_transferred"
],
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-October/141321.html"
},
{
"name": "1030978",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK",
"x_transferred"
],
"url": "http://www.securitytracker.com/id/1030978"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1075578"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2014-10-06T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "Bugzilla 2.x through 4.0.x before 4.0.15, 4.1.x and 4.2.x before 4.2.11, 4.3.x and 4.4.x before 4.4.6, and 4.5.x before 4.5.6 does not ensure that a scalar context is used for certain CGI parameters, which allows remote attackers to conduct cross-site scripting (XSS) attacks by sending three values for a single parameter name."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2016-11-25T20:57:01",
"orgId": "f16b083a-5664-49f3-a51e-8d479e5ed7fe",
"shortName": "mozilla"
},
"references": [
{
"tags": [
"x_refsource_MISC"
],
"url": "http://www.opennet.ru/opennews/art.shtml?num=40766"
},
{
"name": "MDVSA-2014:200",
"tags": [
"vendor-advisory",
"x_refsource_MANDRIVA"
],
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2014:200"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "http://packetstormsecurity.com/files/128578/Bugzilla-Account-Creation-XSS-Information-Leak.html"
},
{
"name": "70257",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/70257"
},
{
"name": "[oss-security] 20141007 \"New Class of Vulnerability in Perl Web Applications\"",
"tags": [
"mailing-list",
"x_refsource_MLIST"
],
"url": "http://openwall.com/lists/oss-security/2014/10/07/20"
},
{
"name": "FEDORA-2014-12591",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA"
],
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-November/142524.html"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "http://www.reddit.com/r/netsec/comments/2ihen0/new_class_of_vulnerability_in_perl_web/"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "http://blog.gerv.net/2014/10/new-class-of-vulnerability-in-perl-web-applications/"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://advisories.mageia.org/MGASA-2014-0412.html"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www.bugzilla.org/security/4.0.14/"
},
{
"name": "GLSA-201607-11",
"tags": [
"vendor-advisory",
"x_refsource_GENTOO"
],
"url": "https://security.gentoo.org/glsa/201607-11"
},
{
"name": "FEDORA-2014-12584",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA"
],
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-October/141309.html"
},
{
"name": "FEDORA-2014-12530",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA"
],
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-October/141321.html"
},
{
"name": "1030978",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK"
],
"url": "http://www.securitytracker.com/id/1030978"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1075578"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "security@mozilla.org",
"ID": "CVE-2014-1573",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Bugzilla 2.x through 4.0.x before 4.0.15, 4.1.x and 4.2.x before 4.2.11, 4.3.x and 4.4.x before 4.4.6, and 4.5.x before 4.5.6 does not ensure that a scalar context is used for certain CGI parameters, which allows remote attackers to conduct cross-site scripting (XSS) attacks by sending three values for a single parameter name."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "http://www.opennet.ru/opennews/art.shtml?num=40766",
"refsource": "MISC",
"url": "http://www.opennet.ru/opennews/art.shtml?num=40766"
},
{
"name": "MDVSA-2014:200",
"refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2014:200"
},
{
"name": "http://packetstormsecurity.com/files/128578/Bugzilla-Account-Creation-XSS-Information-Leak.html",
"refsource": "MISC",
"url": "http://packetstormsecurity.com/files/128578/Bugzilla-Account-Creation-XSS-Information-Leak.html"
},
{
"name": "70257",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/70257"
},
{
"name": "[oss-security] 20141007 \"New Class of Vulnerability in Perl Web Applications\"",
"refsource": "MLIST",
"url": "http://openwall.com/lists/oss-security/2014/10/07/20"
},
{
"name": "FEDORA-2014-12591",
"refsource": "FEDORA",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-November/142524.html"
},
{
"name": "http://www.reddit.com/r/netsec/comments/2ihen0/new_class_of_vulnerability_in_perl_web/",
"refsource": "MISC",
"url": "http://www.reddit.com/r/netsec/comments/2ihen0/new_class_of_vulnerability_in_perl_web/"
},
{
"name": "http://blog.gerv.net/2014/10/new-class-of-vulnerability-in-perl-web-applications/",
"refsource": "MISC",
"url": "http://blog.gerv.net/2014/10/new-class-of-vulnerability-in-perl-web-applications/"
},
{
"name": "http://advisories.mageia.org/MGASA-2014-0412.html",
"refsource": "CONFIRM",
"url": "http://advisories.mageia.org/MGASA-2014-0412.html"
},
{
"name": "http://www.bugzilla.org/security/4.0.14/",
"refsource": "CONFIRM",
"url": "http://www.bugzilla.org/security/4.0.14/"
},
{
"name": "GLSA-201607-11",
"refsource": "GENTOO",
"url": "https://security.gentoo.org/glsa/201607-11"
},
{
"name": "FEDORA-2014-12584",
"refsource": "FEDORA",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-October/141309.html"
},
{
"name": "FEDORA-2014-12530",
"refsource": "FEDORA",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-October/141321.html"
},
{
"name": "1030978",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1030978"
},
{
"name": "https://bugzilla.mozilla.org/show_bug.cgi?id=1075578",
"refsource": "CONFIRM",
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1075578"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "f16b083a-5664-49f3-a51e-8d479e5ed7fe",
"assignerShortName": "mozilla",
"cveId": "CVE-2014-1573",
"datePublished": "2014-10-13T01:00:00",
"dateReserved": "2014-01-16T00:00:00",
"dateUpdated": "2024-08-06T09:42:36.650Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2014-1572 (GCVE-0-2014-1572)
Vulnerability from cvelistv5 – Published: 2014-10-13 01:00 – Updated: 2024-08-06 09:42- n/a
| URL | Tags | |||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-06T09:42:36.509Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "http://www.opennet.ru/opennews/art.shtml?num=40766"
},
{
"name": "MDVSA-2014:200",
"tags": [
"vendor-advisory",
"x_refsource_MANDRIVA",
"x_transferred"
],
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2014:200"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "http://packetstormsecurity.com/files/128578/Bugzilla-Account-Creation-XSS-Information-Leak.html"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1074812"
},
{
"name": "[oss-security] 20141007 \"New Class of Vulnerability in Perl Web Applications\"",
"tags": [
"mailing-list",
"x_refsource_MLIST",
"x_transferred"
],
"url": "http://openwall.com/lists/oss-security/2014/10/07/20"
},
{
"name": "FEDORA-2014-12591",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA",
"x_transferred"
],
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-November/142524.html"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "http://www.reddit.com/r/netsec/comments/2ihen0/new_class_of_vulnerability_in_perl_web/"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "http://blog.gerv.net/2014/10/new-class-of-vulnerability-in-perl-web-applications/"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://advisories.mageia.org/MGASA-2014-0412.html"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www.bugzilla.org/security/4.0.14/"
},
{
"name": "GLSA-201607-11",
"tags": [
"vendor-advisory",
"x_refsource_GENTOO",
"x_transferred"
],
"url": "https://security.gentoo.org/glsa/201607-11"
},
{
"name": "FEDORA-2014-12584",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA",
"x_transferred"
],
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-October/141309.html"
},
{
"name": "FEDORA-2014-12530",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA",
"x_transferred"
],
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-October/141321.html"
},
{
"name": "1030978",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK",
"x_transferred"
],
"url": "http://www.securitytracker.com/id/1030978"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2014-10-06T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "The confirm_create_account function in the account-creation feature in token.cgi in Bugzilla 2.x through 4.0.x before 4.0.15, 4.1.x and 4.2.x before 4.2.11, 4.3.x and 4.4.x before 4.4.6, and 4.5.x before 4.5.6 does not specify a scalar context for the realname parameter, which allows remote attackers to create accounts with unverified e-mail addresses by sending three realname values with realname=login_name as the second, as demonstrated by selecting an e-mail address with a domain name for which group privileges are automatically granted."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2016-11-25T20:57:01",
"orgId": "f16b083a-5664-49f3-a51e-8d479e5ed7fe",
"shortName": "mozilla"
},
"references": [
{
"tags": [
"x_refsource_MISC"
],
"url": "http://www.opennet.ru/opennews/art.shtml?num=40766"
},
{
"name": "MDVSA-2014:200",
"tags": [
"vendor-advisory",
"x_refsource_MANDRIVA"
],
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2014:200"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "http://packetstormsecurity.com/files/128578/Bugzilla-Account-Creation-XSS-Information-Leak.html"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1074812"
},
{
"name": "[oss-security] 20141007 \"New Class of Vulnerability in Perl Web Applications\"",
"tags": [
"mailing-list",
"x_refsource_MLIST"
],
"url": "http://openwall.com/lists/oss-security/2014/10/07/20"
},
{
"name": "FEDORA-2014-12591",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA"
],
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-November/142524.html"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "http://www.reddit.com/r/netsec/comments/2ihen0/new_class_of_vulnerability_in_perl_web/"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "http://blog.gerv.net/2014/10/new-class-of-vulnerability-in-perl-web-applications/"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://advisories.mageia.org/MGASA-2014-0412.html"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www.bugzilla.org/security/4.0.14/"
},
{
"name": "GLSA-201607-11",
"tags": [
"vendor-advisory",
"x_refsource_GENTOO"
],
"url": "https://security.gentoo.org/glsa/201607-11"
},
{
"name": "FEDORA-2014-12584",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA"
],
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-October/141309.html"
},
{
"name": "FEDORA-2014-12530",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA"
],
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-October/141321.html"
},
{
"name": "1030978",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK"
],
"url": "http://www.securitytracker.com/id/1030978"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "security@mozilla.org",
"ID": "CVE-2014-1572",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "The confirm_create_account function in the account-creation feature in token.cgi in Bugzilla 2.x through 4.0.x before 4.0.15, 4.1.x and 4.2.x before 4.2.11, 4.3.x and 4.4.x before 4.4.6, and 4.5.x before 4.5.6 does not specify a scalar context for the realname parameter, which allows remote attackers to create accounts with unverified e-mail addresses by sending three realname values with realname=login_name as the second, as demonstrated by selecting an e-mail address with a domain name for which group privileges are automatically granted."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "http://www.opennet.ru/opennews/art.shtml?num=40766",
"refsource": "MISC",
"url": "http://www.opennet.ru/opennews/art.shtml?num=40766"
},
{
"name": "MDVSA-2014:200",
"refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2014:200"
},
{
"name": "http://packetstormsecurity.com/files/128578/Bugzilla-Account-Creation-XSS-Information-Leak.html",
"refsource": "MISC",
"url": "http://packetstormsecurity.com/files/128578/Bugzilla-Account-Creation-XSS-Information-Leak.html"
},
{
"name": "https://bugzilla.mozilla.org/show_bug.cgi?id=1074812",
"refsource": "CONFIRM",
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1074812"
},
{
"name": "[oss-security] 20141007 \"New Class of Vulnerability in Perl Web Applications\"",
"refsource": "MLIST",
"url": "http://openwall.com/lists/oss-security/2014/10/07/20"
},
{
"name": "FEDORA-2014-12591",
"refsource": "FEDORA",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-November/142524.html"
},
{
"name": "http://www.reddit.com/r/netsec/comments/2ihen0/new_class_of_vulnerability_in_perl_web/",
"refsource": "MISC",
"url": "http://www.reddit.com/r/netsec/comments/2ihen0/new_class_of_vulnerability_in_perl_web/"
},
{
"name": "http://blog.gerv.net/2014/10/new-class-of-vulnerability-in-perl-web-applications/",
"refsource": "MISC",
"url": "http://blog.gerv.net/2014/10/new-class-of-vulnerability-in-perl-web-applications/"
},
{
"name": "http://advisories.mageia.org/MGASA-2014-0412.html",
"refsource": "CONFIRM",
"url": "http://advisories.mageia.org/MGASA-2014-0412.html"
},
{
"name": "http://www.bugzilla.org/security/4.0.14/",
"refsource": "CONFIRM",
"url": "http://www.bugzilla.org/security/4.0.14/"
},
{
"name": "GLSA-201607-11",
"refsource": "GENTOO",
"url": "https://security.gentoo.org/glsa/201607-11"
},
{
"name": "FEDORA-2014-12584",
"refsource": "FEDORA",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-October/141309.html"
},
{
"name": "FEDORA-2014-12530",
"refsource": "FEDORA",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-October/141321.html"
},
{
"name": "1030978",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1030978"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "f16b083a-5664-49f3-a51e-8d479e5ed7fe",
"assignerShortName": "mozilla",
"cveId": "CVE-2014-1572",
"datePublished": "2014-10-13T01:00:00",
"dateReserved": "2014-01-16T00:00:00",
"dateUpdated": "2024-08-06T09:42:36.509Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2014-1571 (GCVE-0-2014-1571)
Vulnerability from cvelistv5 – Published: 2014-10-13 01:00 – Updated: 2024-08-06 09:42- n/a
| URL | Tags | ||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-06T09:42:36.529Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1064140"
},
{
"name": "MDVSA-2014:200",
"tags": [
"vendor-advisory",
"x_refsource_MANDRIVA",
"x_transferred"
],
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2014:200"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "http://packetstormsecurity.com/files/128578/Bugzilla-Account-Creation-XSS-Information-Leak.html"
},
{
"name": "FEDORA-2014-12591",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA",
"x_transferred"
],
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-November/142524.html"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://advisories.mageia.org/MGASA-2014-0412.html"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www.bugzilla.org/security/4.0.14/"
},
{
"name": "FEDORA-2014-12584",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA",
"x_transferred"
],
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-October/141309.html"
},
{
"name": "FEDORA-2014-12530",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA",
"x_transferred"
],
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-October/141321.html"
},
{
"name": "1030978",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK",
"x_transferred"
],
"url": "http://www.securitytracker.com/id/1030978"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2014-10-06T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "Bugzilla 2.x through 4.0.x before 4.0.15, 4.1.x and 4.2.x before 4.2.11, 4.3.x and 4.4.x before 4.4.6, and 4.5.x before 4.5.6 allows remote authenticated users to obtain sensitive private-comment information by leveraging a role as a flag recipient, related to Bug.pm, Flag.pm, and a mail template."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2015-05-14T17:57:00",
"orgId": "f16b083a-5664-49f3-a51e-8d479e5ed7fe",
"shortName": "mozilla"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1064140"
},
{
"name": "MDVSA-2014:200",
"tags": [
"vendor-advisory",
"x_refsource_MANDRIVA"
],
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2014:200"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "http://packetstormsecurity.com/files/128578/Bugzilla-Account-Creation-XSS-Information-Leak.html"
},
{
"name": "FEDORA-2014-12591",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA"
],
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-November/142524.html"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://advisories.mageia.org/MGASA-2014-0412.html"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www.bugzilla.org/security/4.0.14/"
},
{
"name": "FEDORA-2014-12584",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA"
],
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-October/141309.html"
},
{
"name": "FEDORA-2014-12530",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA"
],
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-October/141321.html"
},
{
"name": "1030978",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK"
],
"url": "http://www.securitytracker.com/id/1030978"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "security@mozilla.org",
"ID": "CVE-2014-1571",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Bugzilla 2.x through 4.0.x before 4.0.15, 4.1.x and 4.2.x before 4.2.11, 4.3.x and 4.4.x before 4.4.6, and 4.5.x before 4.5.6 allows remote authenticated users to obtain sensitive private-comment information by leveraging a role as a flag recipient, related to Bug.pm, Flag.pm, and a mail template."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://bugzilla.mozilla.org/show_bug.cgi?id=1064140",
"refsource": "CONFIRM",
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1064140"
},
{
"name": "MDVSA-2014:200",
"refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2014:200"
},
{
"name": "http://packetstormsecurity.com/files/128578/Bugzilla-Account-Creation-XSS-Information-Leak.html",
"refsource": "MISC",
"url": "http://packetstormsecurity.com/files/128578/Bugzilla-Account-Creation-XSS-Information-Leak.html"
},
{
"name": "FEDORA-2014-12591",
"refsource": "FEDORA",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-November/142524.html"
},
{
"name": "http://advisories.mageia.org/MGASA-2014-0412.html",
"refsource": "CONFIRM",
"url": "http://advisories.mageia.org/MGASA-2014-0412.html"
},
{
"name": "http://www.bugzilla.org/security/4.0.14/",
"refsource": "CONFIRM",
"url": "http://www.bugzilla.org/security/4.0.14/"
},
{
"name": "FEDORA-2014-12584",
"refsource": "FEDORA",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-October/141309.html"
},
{
"name": "FEDORA-2014-12530",
"refsource": "FEDORA",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-October/141321.html"
},
{
"name": "1030978",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1030978"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "f16b083a-5664-49f3-a51e-8d479e5ed7fe",
"assignerShortName": "mozilla",
"cveId": "CVE-2014-1571",
"datePublished": "2014-10-13T01:00:00",
"dateReserved": "2014-01-16T00:00:00",
"dateUpdated": "2024-08-06T09:42:36.529Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2014-1546 (GCVE-0-2014-1546)
Vulnerability from cvelistv5 – Published: 2014-08-14 10:00 – Updated: 2024-08-06 09:42- n/a
| URL | Tags | ||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-06T09:42:36.616Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "20140724 Security advisory for Bugzilla 4.5.5, 4.4.5, 4.2.10, and 4.0.14",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ",
"x_transferred"
],
"url": "http://www.securityfocus.com/archive/1/532895"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1036213"
},
{
"name": "FEDORA-2014-8919",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA",
"x_transferred"
],
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-August/136369.html"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://advisories.mageia.org/MGASA-2014-0349.html"
},
{
"name": "MDVSA-2014:169",
"tags": [
"vendor-advisory",
"x_refsource_MANDRIVA",
"x_transferred"
],
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2014:169"
},
{
"name": "FEDORA-2014-8920",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA",
"x_transferred"
],
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-August/136217.html"
},
{
"name": "1030648",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK",
"x_transferred"
],
"url": "http://www.securitytracker.com/id/1030648"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2014-07-24T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "The response function in the JSONP endpoint in WebService/Server/JSONRPC.pm in jsonrpc.cgi in Bugzilla 3.x and 4.x before 4.0.14, 4.1.x and 4.2.x before 4.2.10, 4.3.x and 4.4.x before 4.4.5, and 4.5.x before 4.5.5 accepts certain long callback values and does not restrict the initial bytes of a JSONP response, which allows remote attackers to conduct cross-site request forgery (CSRF) attacks, and obtain sensitive information, via a crafted OBJECT element with SWF content consistent with the _bz_callback character set."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2017-01-04T20:57:01",
"orgId": "f16b083a-5664-49f3-a51e-8d479e5ed7fe",
"shortName": "mozilla"
},
"references": [
{
"name": "20140724 Security advisory for Bugzilla 4.5.5, 4.4.5, 4.2.10, and 4.0.14",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ"
],
"url": "http://www.securityfocus.com/archive/1/532895"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1036213"
},
{
"name": "FEDORA-2014-8919",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA"
],
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-August/136369.html"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://advisories.mageia.org/MGASA-2014-0349.html"
},
{
"name": "MDVSA-2014:169",
"tags": [
"vendor-advisory",
"x_refsource_MANDRIVA"
],
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2014:169"
},
{
"name": "FEDORA-2014-8920",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA"
],
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-August/136217.html"
},
{
"name": "1030648",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK"
],
"url": "http://www.securitytracker.com/id/1030648"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "security@mozilla.org",
"ID": "CVE-2014-1546",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "The response function in the JSONP endpoint in WebService/Server/JSONRPC.pm in jsonrpc.cgi in Bugzilla 3.x and 4.x before 4.0.14, 4.1.x and 4.2.x before 4.2.10, 4.3.x and 4.4.x before 4.4.5, and 4.5.x before 4.5.5 accepts certain long callback values and does not restrict the initial bytes of a JSONP response, which allows remote attackers to conduct cross-site request forgery (CSRF) attacks, and obtain sensitive information, via a crafted OBJECT element with SWF content consistent with the _bz_callback character set."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "20140724 Security advisory for Bugzilla 4.5.5, 4.4.5, 4.2.10, and 4.0.14",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/532895"
},
{
"name": "https://bugzilla.mozilla.org/show_bug.cgi?id=1036213",
"refsource": "CONFIRM",
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1036213"
},
{
"name": "FEDORA-2014-8919",
"refsource": "FEDORA",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-August/136369.html"
},
{
"name": "http://advisories.mageia.org/MGASA-2014-0349.html",
"refsource": "CONFIRM",
"url": "http://advisories.mageia.org/MGASA-2014-0349.html"
},
{
"name": "MDVSA-2014:169",
"refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2014:169"
},
{
"name": "FEDORA-2014-8920",
"refsource": "FEDORA",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-August/136217.html"
},
{
"name": "1030648",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1030648"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "f16b083a-5664-49f3-a51e-8d479e5ed7fe",
"assignerShortName": "mozilla",
"cveId": "CVE-2014-1546",
"datePublished": "2014-08-14T10:00:00",
"dateReserved": "2014-01-16T00:00:00",
"dateUpdated": "2024-08-06T09:42:36.616Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2018-5123 (GCVE-0-2018-5123)
Vulnerability from nvd – Published: 2019-04-29 15:34 – Updated: 2024-08-05 05:26- Improper Access Control
| URL | Tags | ||||
|---|---|---|---|---|---|
|
|||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-05T05:26:46.948Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=CVE-2018-5123"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "Bugzilla",
"vendor": "Mozilla",
"versions": [
{
"status": "affected",
"version": "All versions prior to Bugzilla 4.4"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "A third party website can access information available to a user with access to a restricted bug entry using the image generation in report.cgi in all Bugzilla versions prior to 4.4."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "Improper Access Control",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2019-04-29T15:34:03",
"orgId": "f16b083a-5664-49f3-a51e-8d479e5ed7fe",
"shortName": "mozilla"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=CVE-2018-5123"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "security@mozilla.org",
"ID": "CVE-2018-5123",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "Bugzilla",
"version": {
"version_data": [
{
"version_value": "All versions prior to Bugzilla 4.4"
}
]
}
}
]
},
"vendor_name": "Mozilla"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "A third party website can access information available to a user with access to a restricted bug entry using the image generation in report.cgi in all Bugzilla versions prior to 4.4."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Improper Access Control"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://bugzilla.mozilla.org/show_bug.cgi?id=CVE-2018-5123",
"refsource": "CONFIRM",
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=CVE-2018-5123"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "f16b083a-5664-49f3-a51e-8d479e5ed7fe",
"assignerShortName": "mozilla",
"cveId": "CVE-2018-5123",
"datePublished": "2019-04-29T15:34:03",
"dateReserved": "2018-01-03T00:00:00",
"dateUpdated": "2024-08-05T05:26:46.948Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2016-2803 (GCVE-0-2016-2803)
Vulnerability from nvd – Published: 2017-04-12 22:00 – Updated: 2024-08-05 23:32- n/a
| URL | Tags | |||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-05T23:32:21.226Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "20160516 Security advisory for Bugzilla 5.0.3 and 4.4.12",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ",
"x_transferred"
],
"url": "http://www.securityfocus.com/archive/1/538401/100/0/threaded"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://www.bugzilla.org/security/4.4.11/"
},
{
"name": "1035891",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK",
"x_transferred"
],
"url": "http://www.securitytracker.com/id/1035891"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "http://packetstormsecurity.com/files/137079/Bugzilla-4.4.11-5.0.2-Summary-Cross-Site-Scripting.html"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2016-05-16T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "Cross-site scripting (XSS) vulnerability in the dependency graphs in Bugzilla 2.16rc1 through 4.4.11, and 4.5.1 through 5.0.2 allows remote attackers to inject arbitrary web script or HTML."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2018-10-09T18:57:01",
"orgId": "f16b083a-5664-49f3-a51e-8d479e5ed7fe",
"shortName": "mozilla"
},
"references": [
{
"name": "20160516 Security advisory for Bugzilla 5.0.3 and 4.4.12",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ"
],
"url": "http://www.securityfocus.com/archive/1/538401/100/0/threaded"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://www.bugzilla.org/security/4.4.11/"
},
{
"name": "1035891",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK"
],
"url": "http://www.securitytracker.com/id/1035891"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "http://packetstormsecurity.com/files/137079/Bugzilla-4.4.11-5.0.2-Summary-Cross-Site-Scripting.html"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "security@mozilla.org",
"ID": "CVE-2016-2803",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Cross-site scripting (XSS) vulnerability in the dependency graphs in Bugzilla 2.16rc1 through 4.4.11, and 4.5.1 through 5.0.2 allows remote attackers to inject arbitrary web script or HTML."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "20160516 Security advisory for Bugzilla 5.0.3 and 4.4.12",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/538401/100/0/threaded"
},
{
"name": "https://www.bugzilla.org/security/4.4.11/",
"refsource": "CONFIRM",
"url": "https://www.bugzilla.org/security/4.4.11/"
},
{
"name": "1035891",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1035891"
},
{
"name": "http://packetstormsecurity.com/files/137079/Bugzilla-4.4.11-5.0.2-Summary-Cross-Site-Scripting.html",
"refsource": "MISC",
"url": "http://packetstormsecurity.com/files/137079/Bugzilla-4.4.11-5.0.2-Summary-Cross-Site-Scripting.html"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "f16b083a-5664-49f3-a51e-8d479e5ed7fe",
"assignerShortName": "mozilla",
"cveId": "CVE-2016-2803",
"datePublished": "2017-04-12T22:00:00",
"dateReserved": "2016-03-01T00:00:00",
"dateUpdated": "2024-08-05T23:32:21.226Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2015-8509 (GCVE-0-2015-8509)
Vulnerability from nvd – Published: 2016-01-03 02:00 – Updated: 2024-08-06 08:20- n/a
| URL | Tags | |||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-06T08:20:42.370Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "20151222 Security advisory for Bugzilla 5.0.2, 4.4.11 and 4.2.16",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ",
"x_transferred"
],
"url": "http://seclists.org/bugtraq/2015/Dec/131"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1232785"
},
{
"name": "79662",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/79662"
},
{
"name": "1034556",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK",
"x_transferred"
],
"url": "http://www.securitytracker.com/id/1034556"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "http://packetstormsecurity.com/files/135048/Bugzilla-Cross-Site-Scripting-Information-Leak.html"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://www.bugzilla.org/security/4.2.15/"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2015-12-22T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "Template.pm in Bugzilla 2.x, 3.x, and 4.x before 4.2.16, 4.3.x and 4.4.x before 4.4.11, and 4.5.x and 5.0.x before 5.0.2 does not properly construct CSV files, which allows remote attackers to obtain sensitive information by leveraging a web browser that interprets CSV data as JavaScript code."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2016-12-05T14:57:01",
"orgId": "f16b083a-5664-49f3-a51e-8d479e5ed7fe",
"shortName": "mozilla"
},
"references": [
{
"name": "20151222 Security advisory for Bugzilla 5.0.2, 4.4.11 and 4.2.16",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ"
],
"url": "http://seclists.org/bugtraq/2015/Dec/131"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1232785"
},
{
"name": "79662",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/79662"
},
{
"name": "1034556",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK"
],
"url": "http://www.securitytracker.com/id/1034556"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "http://packetstormsecurity.com/files/135048/Bugzilla-Cross-Site-Scripting-Information-Leak.html"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://www.bugzilla.org/security/4.2.15/"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "security@mozilla.org",
"ID": "CVE-2015-8509",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Template.pm in Bugzilla 2.x, 3.x, and 4.x before 4.2.16, 4.3.x and 4.4.x before 4.4.11, and 4.5.x and 5.0.x before 5.0.2 does not properly construct CSV files, which allows remote attackers to obtain sensitive information by leveraging a web browser that interprets CSV data as JavaScript code."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "20151222 Security advisory for Bugzilla 5.0.2, 4.4.11 and 4.2.16",
"refsource": "BUGTRAQ",
"url": "http://seclists.org/bugtraq/2015/Dec/131"
},
{
"name": "https://bugzilla.mozilla.org/show_bug.cgi?id=1232785",
"refsource": "CONFIRM",
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1232785"
},
{
"name": "79662",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/79662"
},
{
"name": "1034556",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1034556"
},
{
"name": "http://packetstormsecurity.com/files/135048/Bugzilla-Cross-Site-Scripting-Information-Leak.html",
"refsource": "MISC",
"url": "http://packetstormsecurity.com/files/135048/Bugzilla-Cross-Site-Scripting-Information-Leak.html"
},
{
"name": "https://www.bugzilla.org/security/4.2.15/",
"refsource": "CONFIRM",
"url": "https://www.bugzilla.org/security/4.2.15/"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "f16b083a-5664-49f3-a51e-8d479e5ed7fe",
"assignerShortName": "mozilla",
"cveId": "CVE-2015-8509",
"datePublished": "2016-01-03T02:00:00",
"dateReserved": "2015-12-08T00:00:00",
"dateUpdated": "2024-08-06T08:20:42.370Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2015-8508 (GCVE-0-2015-8508)
Vulnerability from nvd – Published: 2016-01-03 02:00 – Updated: 2024-08-06 08:20- n/a
| URL | Tags | |||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-06T08:20:42.648Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1221518"
},
{
"name": "20151222 Security advisory for Bugzilla 5.0.2, 4.4.11 and 4.2.16",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ",
"x_transferred"
],
"url": "http://seclists.org/bugtraq/2015/Dec/131"
},
{
"name": "79660",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/79660"
},
{
"name": "1034556",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK",
"x_transferred"
],
"url": "http://www.securitytracker.com/id/1034556"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "http://packetstormsecurity.com/files/135048/Bugzilla-Cross-Site-Scripting-Information-Leak.html"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://www.bugzilla.org/security/4.2.15/"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2015-12-22T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "Cross-site scripting (XSS) vulnerability in showdependencygraph.cgi in Bugzilla 2.x, 3.x, and 4.x before 4.2.16, 4.3.x and 4.4.x before 4.4.11, and 4.5.x and 5.0.x before 5.0.2, when a local dot configuration is used, allows remote attackers to inject arbitrary web script or HTML via a crafted bug summary."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2016-12-05T14:57:01",
"orgId": "f16b083a-5664-49f3-a51e-8d479e5ed7fe",
"shortName": "mozilla"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1221518"
},
{
"name": "20151222 Security advisory for Bugzilla 5.0.2, 4.4.11 and 4.2.16",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ"
],
"url": "http://seclists.org/bugtraq/2015/Dec/131"
},
{
"name": "79660",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/79660"
},
{
"name": "1034556",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK"
],
"url": "http://www.securitytracker.com/id/1034556"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "http://packetstormsecurity.com/files/135048/Bugzilla-Cross-Site-Scripting-Information-Leak.html"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://www.bugzilla.org/security/4.2.15/"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "security@mozilla.org",
"ID": "CVE-2015-8508",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Cross-site scripting (XSS) vulnerability in showdependencygraph.cgi in Bugzilla 2.x, 3.x, and 4.x before 4.2.16, 4.3.x and 4.4.x before 4.4.11, and 4.5.x and 5.0.x before 5.0.2, when a local dot configuration is used, allows remote attackers to inject arbitrary web script or HTML via a crafted bug summary."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://bugzilla.mozilla.org/show_bug.cgi?id=1221518",
"refsource": "CONFIRM",
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1221518"
},
{
"name": "20151222 Security advisory for Bugzilla 5.0.2, 4.4.11 and 4.2.16",
"refsource": "BUGTRAQ",
"url": "http://seclists.org/bugtraq/2015/Dec/131"
},
{
"name": "79660",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/79660"
},
{
"name": "1034556",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1034556"
},
{
"name": "http://packetstormsecurity.com/files/135048/Bugzilla-Cross-Site-Scripting-Information-Leak.html",
"refsource": "MISC",
"url": "http://packetstormsecurity.com/files/135048/Bugzilla-Cross-Site-Scripting-Information-Leak.html"
},
{
"name": "https://www.bugzilla.org/security/4.2.15/",
"refsource": "CONFIRM",
"url": "https://www.bugzilla.org/security/4.2.15/"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "f16b083a-5664-49f3-a51e-8d479e5ed7fe",
"assignerShortName": "mozilla",
"cveId": "CVE-2015-8508",
"datePublished": "2016-01-03T02:00:00",
"dateReserved": "2015-12-08T00:00:00",
"dateUpdated": "2024-08-06T08:20:42.648Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2015-4499 (GCVE-0-2015-4499)
Vulnerability from nvd – Published: 2015-09-14 01:00 – Updated: 2024-08-06 06:18- n/a
| URL | Tags | ||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-06T06:18:11.279Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "FEDORA-2015-15768",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA",
"x_transferred"
],
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-October/169946.html"
},
{
"name": "1033542",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK",
"x_transferred"
],
"url": "http://www.securitytracker.com/id/1033542"
},
{
"name": "20150910 Security Advisory for Bugzilla 5.0, 4.4.9, and 4.2.14",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ",
"x_transferred"
],
"url": "http://seclists.org/bugtraq/2015/Sep/48"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://bug1202447.bmoattachments.org/attachment.cgi?id=8657861"
},
{
"name": "20150910 Security Advisory for Bugzilla 5.0.1, 4.4.10 and 4.2.15",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ",
"x_transferred"
],
"url": "http://seclists.org/bugtraq/2015/Sep/49"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "http://packetstormsecurity.com/files/133578/Bugzilla-Unauthorized-Account-Creation.html"
},
{
"name": "FEDORA-2015-15769",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA",
"x_transferred"
],
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-October/168725.html"
},
{
"name": "FEDORA-2015-15767",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA",
"x_transferred"
],
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-October/169983.html"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1202447"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2015-09-10T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "Util.pm in Bugzilla 2.x, 3.x, and 4.x before 4.2.15, 4.3.x and 4.4.x before 4.4.10, and 5.x before 5.0.1 mishandles long e-mail addresses during account registration, which allows remote attackers to obtain the default privileges for an arbitrary domain name by placing that name in a substring of an address, as demonstrated by truncation of an @mozilla.com.example.com address to an @mozilla.com address."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2016-12-20T16:57:01",
"orgId": "f16b083a-5664-49f3-a51e-8d479e5ed7fe",
"shortName": "mozilla"
},
"references": [
{
"name": "FEDORA-2015-15768",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA"
],
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-October/169946.html"
},
{
"name": "1033542",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK"
],
"url": "http://www.securitytracker.com/id/1033542"
},
{
"name": "20150910 Security Advisory for Bugzilla 5.0, 4.4.9, and 4.2.14",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ"
],
"url": "http://seclists.org/bugtraq/2015/Sep/48"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://bug1202447.bmoattachments.org/attachment.cgi?id=8657861"
},
{
"name": "20150910 Security Advisory for Bugzilla 5.0.1, 4.4.10 and 4.2.15",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ"
],
"url": "http://seclists.org/bugtraq/2015/Sep/49"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "http://packetstormsecurity.com/files/133578/Bugzilla-Unauthorized-Account-Creation.html"
},
{
"name": "FEDORA-2015-15769",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA"
],
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-October/168725.html"
},
{
"name": "FEDORA-2015-15767",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA"
],
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-October/169983.html"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1202447"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "security@mozilla.org",
"ID": "CVE-2015-4499",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Util.pm in Bugzilla 2.x, 3.x, and 4.x before 4.2.15, 4.3.x and 4.4.x before 4.4.10, and 5.x before 5.0.1 mishandles long e-mail addresses during account registration, which allows remote attackers to obtain the default privileges for an arbitrary domain name by placing that name in a substring of an address, as demonstrated by truncation of an @mozilla.com.example.com address to an @mozilla.com address."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "FEDORA-2015-15768",
"refsource": "FEDORA",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-October/169946.html"
},
{
"name": "1033542",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1033542"
},
{
"name": "20150910 Security Advisory for Bugzilla 5.0, 4.4.9, and 4.2.14",
"refsource": "BUGTRAQ",
"url": "http://seclists.org/bugtraq/2015/Sep/48"
},
{
"name": "https://bug1202447.bmoattachments.org/attachment.cgi?id=8657861",
"refsource": "MISC",
"url": "https://bug1202447.bmoattachments.org/attachment.cgi?id=8657861"
},
{
"name": "20150910 Security Advisory for Bugzilla 5.0.1, 4.4.10 and 4.2.15",
"refsource": "BUGTRAQ",
"url": "http://seclists.org/bugtraq/2015/Sep/49"
},
{
"name": "http://packetstormsecurity.com/files/133578/Bugzilla-Unauthorized-Account-Creation.html",
"refsource": "MISC",
"url": "http://packetstormsecurity.com/files/133578/Bugzilla-Unauthorized-Account-Creation.html"
},
{
"name": "FEDORA-2015-15769",
"refsource": "FEDORA",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-October/168725.html"
},
{
"name": "FEDORA-2015-15767",
"refsource": "FEDORA",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-October/169983.html"
},
{
"name": "https://bugzilla.mozilla.org/show_bug.cgi?id=1202447",
"refsource": "CONFIRM",
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1202447"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "f16b083a-5664-49f3-a51e-8d479e5ed7fe",
"assignerShortName": "mozilla",
"cveId": "CVE-2015-4499",
"datePublished": "2015-09-14T01:00:00",
"dateReserved": "2015-06-10T00:00:00",
"dateUpdated": "2024-08-06T06:18:11.279Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2014-8630 (GCVE-0-2014-8630)
Vulnerability from nvd – Published: 2015-02-01 15:00 – Updated: 2024-08-06 13:26- n/a
| URL | Tags | ||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-06T13:26:02.521Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://advisories.mageia.org/MGASA-2015-0048.html"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1079065"
},
{
"name": "FEDORA-2015-1713",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA",
"x_transferred"
],
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-February/149921.html"
},
{
"name": "FEDORA-2015-1699",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA",
"x_transferred"
],
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-February/149925.html"
},
{
"name": "MDVSA-2015:030",
"tags": [
"vendor-advisory",
"x_refsource_MANDRIVA",
"x_transferred"
],
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:030"
},
{
"name": "GLSA-201607-11",
"tags": [
"vendor-advisory",
"x_refsource_GENTOO",
"x_transferred"
],
"url": "https://security.gentoo.org/glsa/201607-11"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www.bugzilla.org/security/4.0.15/"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2015-01-21T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "Bugzilla before 4.0.16, 4.1.x and 4.2.x before 4.2.12, 4.3.x and 4.4.x before 4.4.7, and 5.x before 5.0rc1 allows remote authenticated users to execute arbitrary commands by leveraging the editcomponents privilege and triggering crafted input to a two-argument Perl open call, as demonstrated by shell metacharacters in a product name."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2016-12-30T16:57:01",
"orgId": "f16b083a-5664-49f3-a51e-8d479e5ed7fe",
"shortName": "mozilla"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://advisories.mageia.org/MGASA-2015-0048.html"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1079065"
},
{
"name": "FEDORA-2015-1713",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA"
],
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-February/149921.html"
},
{
"name": "FEDORA-2015-1699",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA"
],
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-February/149925.html"
},
{
"name": "MDVSA-2015:030",
"tags": [
"vendor-advisory",
"x_refsource_MANDRIVA"
],
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:030"
},
{
"name": "GLSA-201607-11",
"tags": [
"vendor-advisory",
"x_refsource_GENTOO"
],
"url": "https://security.gentoo.org/glsa/201607-11"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www.bugzilla.org/security/4.0.15/"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "security@mozilla.org",
"ID": "CVE-2014-8630",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Bugzilla before 4.0.16, 4.1.x and 4.2.x before 4.2.12, 4.3.x and 4.4.x before 4.4.7, and 5.x before 5.0rc1 allows remote authenticated users to execute arbitrary commands by leveraging the editcomponents privilege and triggering crafted input to a two-argument Perl open call, as demonstrated by shell metacharacters in a product name."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "http://advisories.mageia.org/MGASA-2015-0048.html",
"refsource": "CONFIRM",
"url": "http://advisories.mageia.org/MGASA-2015-0048.html"
},
{
"name": "https://bugzilla.mozilla.org/show_bug.cgi?id=1079065",
"refsource": "CONFIRM",
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1079065"
},
{
"name": "FEDORA-2015-1713",
"refsource": "FEDORA",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-February/149921.html"
},
{
"name": "FEDORA-2015-1699",
"refsource": "FEDORA",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-February/149925.html"
},
{
"name": "MDVSA-2015:030",
"refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:030"
},
{
"name": "GLSA-201607-11",
"refsource": "GENTOO",
"url": "https://security.gentoo.org/glsa/201607-11"
},
{
"name": "http://www.bugzilla.org/security/4.0.15/",
"refsource": "CONFIRM",
"url": "http://www.bugzilla.org/security/4.0.15/"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "f16b083a-5664-49f3-a51e-8d479e5ed7fe",
"assignerShortName": "mozilla",
"cveId": "CVE-2014-8630",
"datePublished": "2015-02-01T15:00:00",
"dateReserved": "2014-11-06T00:00:00",
"dateUpdated": "2024-08-06T13:26:02.521Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2014-1573 (GCVE-0-2014-1573)
Vulnerability from nvd – Published: 2014-10-13 01:00 – Updated: 2024-08-06 09:42- n/a
| URL | Tags | ||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-06T09:42:36.650Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "http://www.opennet.ru/opennews/art.shtml?num=40766"
},
{
"name": "MDVSA-2014:200",
"tags": [
"vendor-advisory",
"x_refsource_MANDRIVA",
"x_transferred"
],
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2014:200"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "http://packetstormsecurity.com/files/128578/Bugzilla-Account-Creation-XSS-Information-Leak.html"
},
{
"name": "70257",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/70257"
},
{
"name": "[oss-security] 20141007 \"New Class of Vulnerability in Perl Web Applications\"",
"tags": [
"mailing-list",
"x_refsource_MLIST",
"x_transferred"
],
"url": "http://openwall.com/lists/oss-security/2014/10/07/20"
},
{
"name": "FEDORA-2014-12591",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA",
"x_transferred"
],
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-November/142524.html"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "http://www.reddit.com/r/netsec/comments/2ihen0/new_class_of_vulnerability_in_perl_web/"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "http://blog.gerv.net/2014/10/new-class-of-vulnerability-in-perl-web-applications/"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://advisories.mageia.org/MGASA-2014-0412.html"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www.bugzilla.org/security/4.0.14/"
},
{
"name": "GLSA-201607-11",
"tags": [
"vendor-advisory",
"x_refsource_GENTOO",
"x_transferred"
],
"url": "https://security.gentoo.org/glsa/201607-11"
},
{
"name": "FEDORA-2014-12584",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA",
"x_transferred"
],
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-October/141309.html"
},
{
"name": "FEDORA-2014-12530",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA",
"x_transferred"
],
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-October/141321.html"
},
{
"name": "1030978",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK",
"x_transferred"
],
"url": "http://www.securitytracker.com/id/1030978"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1075578"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2014-10-06T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "Bugzilla 2.x through 4.0.x before 4.0.15, 4.1.x and 4.2.x before 4.2.11, 4.3.x and 4.4.x before 4.4.6, and 4.5.x before 4.5.6 does not ensure that a scalar context is used for certain CGI parameters, which allows remote attackers to conduct cross-site scripting (XSS) attacks by sending three values for a single parameter name."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2016-11-25T20:57:01",
"orgId": "f16b083a-5664-49f3-a51e-8d479e5ed7fe",
"shortName": "mozilla"
},
"references": [
{
"tags": [
"x_refsource_MISC"
],
"url": "http://www.opennet.ru/opennews/art.shtml?num=40766"
},
{
"name": "MDVSA-2014:200",
"tags": [
"vendor-advisory",
"x_refsource_MANDRIVA"
],
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2014:200"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "http://packetstormsecurity.com/files/128578/Bugzilla-Account-Creation-XSS-Information-Leak.html"
},
{
"name": "70257",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/70257"
},
{
"name": "[oss-security] 20141007 \"New Class of Vulnerability in Perl Web Applications\"",
"tags": [
"mailing-list",
"x_refsource_MLIST"
],
"url": "http://openwall.com/lists/oss-security/2014/10/07/20"
},
{
"name": "FEDORA-2014-12591",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA"
],
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-November/142524.html"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "http://www.reddit.com/r/netsec/comments/2ihen0/new_class_of_vulnerability_in_perl_web/"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "http://blog.gerv.net/2014/10/new-class-of-vulnerability-in-perl-web-applications/"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://advisories.mageia.org/MGASA-2014-0412.html"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www.bugzilla.org/security/4.0.14/"
},
{
"name": "GLSA-201607-11",
"tags": [
"vendor-advisory",
"x_refsource_GENTOO"
],
"url": "https://security.gentoo.org/glsa/201607-11"
},
{
"name": "FEDORA-2014-12584",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA"
],
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-October/141309.html"
},
{
"name": "FEDORA-2014-12530",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA"
],
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-October/141321.html"
},
{
"name": "1030978",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK"
],
"url": "http://www.securitytracker.com/id/1030978"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1075578"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "security@mozilla.org",
"ID": "CVE-2014-1573",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Bugzilla 2.x through 4.0.x before 4.0.15, 4.1.x and 4.2.x before 4.2.11, 4.3.x and 4.4.x before 4.4.6, and 4.5.x before 4.5.6 does not ensure that a scalar context is used for certain CGI parameters, which allows remote attackers to conduct cross-site scripting (XSS) attacks by sending three values for a single parameter name."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "http://www.opennet.ru/opennews/art.shtml?num=40766",
"refsource": "MISC",
"url": "http://www.opennet.ru/opennews/art.shtml?num=40766"
},
{
"name": "MDVSA-2014:200",
"refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2014:200"
},
{
"name": "http://packetstormsecurity.com/files/128578/Bugzilla-Account-Creation-XSS-Information-Leak.html",
"refsource": "MISC",
"url": "http://packetstormsecurity.com/files/128578/Bugzilla-Account-Creation-XSS-Information-Leak.html"
},
{
"name": "70257",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/70257"
},
{
"name": "[oss-security] 20141007 \"New Class of Vulnerability in Perl Web Applications\"",
"refsource": "MLIST",
"url": "http://openwall.com/lists/oss-security/2014/10/07/20"
},
{
"name": "FEDORA-2014-12591",
"refsource": "FEDORA",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-November/142524.html"
},
{
"name": "http://www.reddit.com/r/netsec/comments/2ihen0/new_class_of_vulnerability_in_perl_web/",
"refsource": "MISC",
"url": "http://www.reddit.com/r/netsec/comments/2ihen0/new_class_of_vulnerability_in_perl_web/"
},
{
"name": "http://blog.gerv.net/2014/10/new-class-of-vulnerability-in-perl-web-applications/",
"refsource": "MISC",
"url": "http://blog.gerv.net/2014/10/new-class-of-vulnerability-in-perl-web-applications/"
},
{
"name": "http://advisories.mageia.org/MGASA-2014-0412.html",
"refsource": "CONFIRM",
"url": "http://advisories.mageia.org/MGASA-2014-0412.html"
},
{
"name": "http://www.bugzilla.org/security/4.0.14/",
"refsource": "CONFIRM",
"url": "http://www.bugzilla.org/security/4.0.14/"
},
{
"name": "GLSA-201607-11",
"refsource": "GENTOO",
"url": "https://security.gentoo.org/glsa/201607-11"
},
{
"name": "FEDORA-2014-12584",
"refsource": "FEDORA",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-October/141309.html"
},
{
"name": "FEDORA-2014-12530",
"refsource": "FEDORA",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-October/141321.html"
},
{
"name": "1030978",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1030978"
},
{
"name": "https://bugzilla.mozilla.org/show_bug.cgi?id=1075578",
"refsource": "CONFIRM",
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1075578"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "f16b083a-5664-49f3-a51e-8d479e5ed7fe",
"assignerShortName": "mozilla",
"cveId": "CVE-2014-1573",
"datePublished": "2014-10-13T01:00:00",
"dateReserved": "2014-01-16T00:00:00",
"dateUpdated": "2024-08-06T09:42:36.650Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2014-1572 (GCVE-0-2014-1572)
Vulnerability from nvd – Published: 2014-10-13 01:00 – Updated: 2024-08-06 09:42- n/a
| URL | Tags | |||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-06T09:42:36.509Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "http://www.opennet.ru/opennews/art.shtml?num=40766"
},
{
"name": "MDVSA-2014:200",
"tags": [
"vendor-advisory",
"x_refsource_MANDRIVA",
"x_transferred"
],
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2014:200"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "http://packetstormsecurity.com/files/128578/Bugzilla-Account-Creation-XSS-Information-Leak.html"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1074812"
},
{
"name": "[oss-security] 20141007 \"New Class of Vulnerability in Perl Web Applications\"",
"tags": [
"mailing-list",
"x_refsource_MLIST",
"x_transferred"
],
"url": "http://openwall.com/lists/oss-security/2014/10/07/20"
},
{
"name": "FEDORA-2014-12591",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA",
"x_transferred"
],
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-November/142524.html"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "http://www.reddit.com/r/netsec/comments/2ihen0/new_class_of_vulnerability_in_perl_web/"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "http://blog.gerv.net/2014/10/new-class-of-vulnerability-in-perl-web-applications/"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://advisories.mageia.org/MGASA-2014-0412.html"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www.bugzilla.org/security/4.0.14/"
},
{
"name": "GLSA-201607-11",
"tags": [
"vendor-advisory",
"x_refsource_GENTOO",
"x_transferred"
],
"url": "https://security.gentoo.org/glsa/201607-11"
},
{
"name": "FEDORA-2014-12584",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA",
"x_transferred"
],
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-October/141309.html"
},
{
"name": "FEDORA-2014-12530",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA",
"x_transferred"
],
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-October/141321.html"
},
{
"name": "1030978",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK",
"x_transferred"
],
"url": "http://www.securitytracker.com/id/1030978"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2014-10-06T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "The confirm_create_account function in the account-creation feature in token.cgi in Bugzilla 2.x through 4.0.x before 4.0.15, 4.1.x and 4.2.x before 4.2.11, 4.3.x and 4.4.x before 4.4.6, and 4.5.x before 4.5.6 does not specify a scalar context for the realname parameter, which allows remote attackers to create accounts with unverified e-mail addresses by sending three realname values with realname=login_name as the second, as demonstrated by selecting an e-mail address with a domain name for which group privileges are automatically granted."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2016-11-25T20:57:01",
"orgId": "f16b083a-5664-49f3-a51e-8d479e5ed7fe",
"shortName": "mozilla"
},
"references": [
{
"tags": [
"x_refsource_MISC"
],
"url": "http://www.opennet.ru/opennews/art.shtml?num=40766"
},
{
"name": "MDVSA-2014:200",
"tags": [
"vendor-advisory",
"x_refsource_MANDRIVA"
],
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2014:200"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "http://packetstormsecurity.com/files/128578/Bugzilla-Account-Creation-XSS-Information-Leak.html"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1074812"
},
{
"name": "[oss-security] 20141007 \"New Class of Vulnerability in Perl Web Applications\"",
"tags": [
"mailing-list",
"x_refsource_MLIST"
],
"url": "http://openwall.com/lists/oss-security/2014/10/07/20"
},
{
"name": "FEDORA-2014-12591",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA"
],
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-November/142524.html"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "http://www.reddit.com/r/netsec/comments/2ihen0/new_class_of_vulnerability_in_perl_web/"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "http://blog.gerv.net/2014/10/new-class-of-vulnerability-in-perl-web-applications/"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://advisories.mageia.org/MGASA-2014-0412.html"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www.bugzilla.org/security/4.0.14/"
},
{
"name": "GLSA-201607-11",
"tags": [
"vendor-advisory",
"x_refsource_GENTOO"
],
"url": "https://security.gentoo.org/glsa/201607-11"
},
{
"name": "FEDORA-2014-12584",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA"
],
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-October/141309.html"
},
{
"name": "FEDORA-2014-12530",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA"
],
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-October/141321.html"
},
{
"name": "1030978",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK"
],
"url": "http://www.securitytracker.com/id/1030978"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "security@mozilla.org",
"ID": "CVE-2014-1572",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "The confirm_create_account function in the account-creation feature in token.cgi in Bugzilla 2.x through 4.0.x before 4.0.15, 4.1.x and 4.2.x before 4.2.11, 4.3.x and 4.4.x before 4.4.6, and 4.5.x before 4.5.6 does not specify a scalar context for the realname parameter, which allows remote attackers to create accounts with unverified e-mail addresses by sending three realname values with realname=login_name as the second, as demonstrated by selecting an e-mail address with a domain name for which group privileges are automatically granted."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "http://www.opennet.ru/opennews/art.shtml?num=40766",
"refsource": "MISC",
"url": "http://www.opennet.ru/opennews/art.shtml?num=40766"
},
{
"name": "MDVSA-2014:200",
"refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2014:200"
},
{
"name": "http://packetstormsecurity.com/files/128578/Bugzilla-Account-Creation-XSS-Information-Leak.html",
"refsource": "MISC",
"url": "http://packetstormsecurity.com/files/128578/Bugzilla-Account-Creation-XSS-Information-Leak.html"
},
{
"name": "https://bugzilla.mozilla.org/show_bug.cgi?id=1074812",
"refsource": "CONFIRM",
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1074812"
},
{
"name": "[oss-security] 20141007 \"New Class of Vulnerability in Perl Web Applications\"",
"refsource": "MLIST",
"url": "http://openwall.com/lists/oss-security/2014/10/07/20"
},
{
"name": "FEDORA-2014-12591",
"refsource": "FEDORA",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-November/142524.html"
},
{
"name": "http://www.reddit.com/r/netsec/comments/2ihen0/new_class_of_vulnerability_in_perl_web/",
"refsource": "MISC",
"url": "http://www.reddit.com/r/netsec/comments/2ihen0/new_class_of_vulnerability_in_perl_web/"
},
{
"name": "http://blog.gerv.net/2014/10/new-class-of-vulnerability-in-perl-web-applications/",
"refsource": "MISC",
"url": "http://blog.gerv.net/2014/10/new-class-of-vulnerability-in-perl-web-applications/"
},
{
"name": "http://advisories.mageia.org/MGASA-2014-0412.html",
"refsource": "CONFIRM",
"url": "http://advisories.mageia.org/MGASA-2014-0412.html"
},
{
"name": "http://www.bugzilla.org/security/4.0.14/",
"refsource": "CONFIRM",
"url": "http://www.bugzilla.org/security/4.0.14/"
},
{
"name": "GLSA-201607-11",
"refsource": "GENTOO",
"url": "https://security.gentoo.org/glsa/201607-11"
},
{
"name": "FEDORA-2014-12584",
"refsource": "FEDORA",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-October/141309.html"
},
{
"name": "FEDORA-2014-12530",
"refsource": "FEDORA",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-October/141321.html"
},
{
"name": "1030978",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1030978"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "f16b083a-5664-49f3-a51e-8d479e5ed7fe",
"assignerShortName": "mozilla",
"cveId": "CVE-2014-1572",
"datePublished": "2014-10-13T01:00:00",
"dateReserved": "2014-01-16T00:00:00",
"dateUpdated": "2024-08-06T09:42:36.509Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2014-1571 (GCVE-0-2014-1571)
Vulnerability from nvd – Published: 2014-10-13 01:00 – Updated: 2024-08-06 09:42- n/a
| URL | Tags | ||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-06T09:42:36.529Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1064140"
},
{
"name": "MDVSA-2014:200",
"tags": [
"vendor-advisory",
"x_refsource_MANDRIVA",
"x_transferred"
],
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2014:200"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "http://packetstormsecurity.com/files/128578/Bugzilla-Account-Creation-XSS-Information-Leak.html"
},
{
"name": "FEDORA-2014-12591",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA",
"x_transferred"
],
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-November/142524.html"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://advisories.mageia.org/MGASA-2014-0412.html"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www.bugzilla.org/security/4.0.14/"
},
{
"name": "FEDORA-2014-12584",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA",
"x_transferred"
],
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-October/141309.html"
},
{
"name": "FEDORA-2014-12530",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA",
"x_transferred"
],
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-October/141321.html"
},
{
"name": "1030978",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK",
"x_transferred"
],
"url": "http://www.securitytracker.com/id/1030978"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2014-10-06T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "Bugzilla 2.x through 4.0.x before 4.0.15, 4.1.x and 4.2.x before 4.2.11, 4.3.x and 4.4.x before 4.4.6, and 4.5.x before 4.5.6 allows remote authenticated users to obtain sensitive private-comment information by leveraging a role as a flag recipient, related to Bug.pm, Flag.pm, and a mail template."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2015-05-14T17:57:00",
"orgId": "f16b083a-5664-49f3-a51e-8d479e5ed7fe",
"shortName": "mozilla"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1064140"
},
{
"name": "MDVSA-2014:200",
"tags": [
"vendor-advisory",
"x_refsource_MANDRIVA"
],
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2014:200"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "http://packetstormsecurity.com/files/128578/Bugzilla-Account-Creation-XSS-Information-Leak.html"
},
{
"name": "FEDORA-2014-12591",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA"
],
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-November/142524.html"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://advisories.mageia.org/MGASA-2014-0412.html"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www.bugzilla.org/security/4.0.14/"
},
{
"name": "FEDORA-2014-12584",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA"
],
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-October/141309.html"
},
{
"name": "FEDORA-2014-12530",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA"
],
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-October/141321.html"
},
{
"name": "1030978",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK"
],
"url": "http://www.securitytracker.com/id/1030978"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "security@mozilla.org",
"ID": "CVE-2014-1571",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Bugzilla 2.x through 4.0.x before 4.0.15, 4.1.x and 4.2.x before 4.2.11, 4.3.x and 4.4.x before 4.4.6, and 4.5.x before 4.5.6 allows remote authenticated users to obtain sensitive private-comment information by leveraging a role as a flag recipient, related to Bug.pm, Flag.pm, and a mail template."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://bugzilla.mozilla.org/show_bug.cgi?id=1064140",
"refsource": "CONFIRM",
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1064140"
},
{
"name": "MDVSA-2014:200",
"refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2014:200"
},
{
"name": "http://packetstormsecurity.com/files/128578/Bugzilla-Account-Creation-XSS-Information-Leak.html",
"refsource": "MISC",
"url": "http://packetstormsecurity.com/files/128578/Bugzilla-Account-Creation-XSS-Information-Leak.html"
},
{
"name": "FEDORA-2014-12591",
"refsource": "FEDORA",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-November/142524.html"
},
{
"name": "http://advisories.mageia.org/MGASA-2014-0412.html",
"refsource": "CONFIRM",
"url": "http://advisories.mageia.org/MGASA-2014-0412.html"
},
{
"name": "http://www.bugzilla.org/security/4.0.14/",
"refsource": "CONFIRM",
"url": "http://www.bugzilla.org/security/4.0.14/"
},
{
"name": "FEDORA-2014-12584",
"refsource": "FEDORA",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-October/141309.html"
},
{
"name": "FEDORA-2014-12530",
"refsource": "FEDORA",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-October/141321.html"
},
{
"name": "1030978",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1030978"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "f16b083a-5664-49f3-a51e-8d479e5ed7fe",
"assignerShortName": "mozilla",
"cveId": "CVE-2014-1571",
"datePublished": "2014-10-13T01:00:00",
"dateReserved": "2014-01-16T00:00:00",
"dateUpdated": "2024-08-06T09:42:36.529Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}