FreshPorts - VuXML

This page displays vulnerability information about FreeBSD Ports.

The VUXML data was last processed by FreshPorts on 2024-03-29 07:54:42 UTC

List all Vulnerabilities, by package

List all Vulnerabilities, by date

k68

These are the vulnerabilities relating to the commit you have selected:

VuXML IDDescription
1c8a039b-7b23-11e2-b17b-20cf30e32f6dbugzilla -- multiple vulnerabilities

A Bugzilla Security Advisory reports:

Cross-Site Scripting

When viewing a single bug report, which is the default, the bug ID is validated and rejected if it is invalid. But when viewing several bug reports at once, which is specified by the format=multiple parameter, invalid bug IDs can go through and are sanitized in the HTML page itself. But when an invalid page format is passed to the CGI script, the wrong HTML page is called and data are not correctly sanitized, which can lead to XSS.

Information Leak

When running a query in debug mode, the generated SQL query used to collect the data is displayed. The way this SQL query is built permits the user to determine if some confidential field value (such as a product name) exists. This problem only affects Bugzilla 4.0.9 and older. Newer releases are not affected by this issue.


Discovery 2013-02-19
Entry 2013-02-20
Modified 2013-03-31
bugzilla
de-bugzilla
ru-bugzilla
ja-bugzilla
ge 3.6.0 lt 3.6.13

ge 4.0.0 lt 4.0.10

ge 4.2.0 lt 4.2.5

CVE-2013-0785
https://bugzilla.mozilla.org/show_bug.cgi?id=842038
CVE-2013-0786
https://bugzilla.mozilla.org/show_bug.cgi?id=824399
1d96305d-6ae6-11dd-91d5-000c29d47fd7Bugzilla -- Directory Traversal in importxml.pl

A Bugzilla Security Advisory reports:

When importing bugs using importxml.pl, the --attach_path option can be specified, pointing to the directory where attachments to import are stored. If the XML file being read by importxml.pl contains a malicious

../relative_path/to/local_file

node, the script follows this relative path and attaches the local file pointed by it to the bug, making the file public. The security fix makes sure the relative path is always ignored.


Discovery 2008-06-03
Entry 2008-08-15
Modified 2010-05-12
bugzilla
ja-bugzilla
ge 2.22.1 lt 2.22.4

ge 3.* lt 3.0.4

CVE-2008-4437
https://bugzilla.mozilla.org/show_bug.cgi?id=437169
46f7b598-a781-11da-906a-fde5cdde365ebugzilla -- multiple vulnerabilities

Some vulnerabilities have been reported in Bugzilla, which can be exploited by malicious users to conduct SQL injection attacks, and by malicious people to disclose sensitive information and conduct script insertion attacks.


Discovery 2006-02-20
Entry 2006-02-27
Modified 2006-11-11
bugzilla
ja-bugzilla
ge 2.17.1 lt 2.20.1

CVE-2006-2420
CVE-2006-0916
CVE-2006-0915
CVE-2006-0914
CVE-2006-0913
http://www.bugzilla.org/security/2.18.4/
6d68618a-7199-11db-a2ad-000c6ec775d9bugzilla -- multiple vulnerabilities

A Bugzilla Security Advisory reports:

  • Sometimes the information put into the

    and

    tags in Bugzilla was not properly escaped, leading to a possible XSS vulnerability.

  • Bugzilla administrators were allowed to put raw, unfiltered HTML into many fields in Bugzilla, leading to a possible XSS vulnerability. Now, the HTML allowed in those fields is limited.
  • attachment.cgi could leak the names of private attachments
  • The "deadline" field was visible in the XML format of a bug, even to users who were not a member of the "timetrackinggroup."
  • A malicious user could pass a URL to an admin, and make the admin delete or change something that he had not intended to delete or change.
  • It is possible to inject arbitrary HTML into the showdependencygraph.cgi page, allowing for a cross-site scripting attack.

Discovery 2006-10-15
Entry 2006-11-11
bugzilla
ja-bugzilla
gt 2.* lt 2.22.1

CVE-2006-5453
CVE-2006-5454
CVE-2006-5455
http://www.bugzilla.org/security/2.18.5/
6e33f4ab-efed-11d9-8310-0001020eed82bugzilla -- multiple vulnerabilities

A Bugzilla Security Advisory reports:

Any user can change any flag on any bug, even if they don't have access to that bug, or even if they can't normally make bug changes. This also allows them to expose the summary of a bug.

Bugs are inserted into the database before they are marked as private, in Bugzilla code. Thus, MySQL replication can lag in between the time that the bug is inserted and when it is marked as private (usually less than a second). If replication lags at this point, the bug summary will be accessible to all users until replication catches up. Also, on a very slow machine, there may be a pause longer than a second that allows users to see the title of the newly-filed bug.


Discovery 2005-07-07
Entry 2005-07-08
Modified 2005-07-18
bugzilla
ja-bugzilla
ge 2.17.1 lt 2.18.2

http://www.bugzilla.org/security/2.18.1/
https://bugzilla.mozilla.org/show_bug.cgi?id=292544
CVE-2005-2173
CVE-2005-2174
https://bugzilla.mozilla.org/show_bug.cgi?id=293159
75231c63-f6a2-499d-8e27-787773bda284bugzilla -- multiple vulnerabilities

A Bugzilla Security Advisory reports:

This advisory covers three security issues that have recently been fixed in the Bugzilla code:

  • A possible cross-site scripting (XSS) vulnerability when filing bugs using the guided form.
  • When using email_in.pl, insufficiently escaped data may be passed to sendmail.
  • Users using the WebService interface may access Bugzilla's time-tracking fields even if they normally cannot see them.

We strongly advise that 2.20.x and 2.22.x users should upgrade to 2.20.5 and 2.22.3 respectively. 3.0 users, and users of 2.18.x or below, should upgrade to 3.0.1.


Discovery 2007-08-23
Entry 2007-09-21
bugzilla
ja-bugzilla
ge 2.20.* lt 2.22.3

ge 3.* lt 3.0.1

25425
CVE-2007-4538
CVE-2007-4539
CVE-2007-4543
http://www.bugzilla.org/security/2.20.4/
97c3a452-6e36-11d9-8324-000a95bc6faebugzilla -- cross-site scripting vulnerability

A Bugzilla advisory states:

This advisory covers a single cross-site scripting issue that has recently been discovered and fixed in the Bugzilla code: If a malicious user links to a Bugzilla site using a specially crafted URL, a script in the error page generated by Bugzilla will display the URL unaltered in the page, allowing scripts embedded in the URL to execute.


Discovery 2004-12-01
Entry 2005-01-24
bugzilla
ja-bugzilla
< 2.16.8

ge 2.17.* lt 2.18

CVE-2004-1061
http://www.bugzilla.org/security/2.16.7-nr/
https://bugzilla.mozilla.org/show_bug.cgi?id=272620