Lucene search

K
cveMitreCVE-2009-0482
HistoryFeb 09, 2009 - 5:30 p.m.

CVE-2009-0482

2009-02-0917:30:00
CWE-352
mitre
web.nvd.nist.gov
30
cve-2009-0482
cross-site request forgery
csrf
bugzilla
vulnerability
security
nvd

CVSS2

5.8

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:N/I:P/A:P

AI Score

6.6

Confidence

Low

EPSS

0.002

Percentile

55.0%

Cross-site request forgery (CSRF) vulnerability in Bugzilla before 3.2 before 3.2.1, 3.3 before 3.3.2, and other versions before 3.2 allows remote attackers to perform bug updating activities as other users via a link or IMG tag to process_bug.cgi.

Affected configurations

Nvd
Node
mozillabugzillaMatch2.10
OR
mozillabugzillaMatch2.12
OR
mozillabugzillaMatch2.14
OR
mozillabugzillaMatch2.14.1
OR
mozillabugzillaMatch2.14.2
OR
mozillabugzillaMatch2.14.3
OR
mozillabugzillaMatch2.14.4
OR
mozillabugzillaMatch2.14.5
OR
mozillabugzillaMatch2.16
OR
mozillabugzillaMatch2.16rc1
OR
mozillabugzillaMatch2.16.1
OR
mozillabugzillaMatch2.16.2
OR
mozillabugzillaMatch2.16.3
OR
mozillabugzillaMatch2.16.4
OR
mozillabugzillaMatch2.16.5
OR
mozillabugzillaMatch2.16.6
OR
mozillabugzillaMatch2.16.7
OR
mozillabugzillaMatch2.16.8
OR
mozillabugzillaMatch2.16.9
OR
mozillabugzillaMatch2.16.10
OR
mozillabugzillaMatch2.16.11
OR
mozillabugzillaMatch2.16_rc2
OR
mozillabugzillaMatch2.17
OR
mozillabugzillaMatch2.17.1
OR
mozillabugzillaMatch2.17.2
OR
mozillabugzillaMatch2.17.3
OR
mozillabugzillaMatch2.17.4
OR
mozillabugzillaMatch2.17.5
OR
mozillabugzillaMatch2.17.6
OR
mozillabugzillaMatch2.17.7
OR
mozillabugzillaMatch2.18
OR
mozillabugzillaMatch2.18rc1
OR
mozillabugzillaMatch2.18rc2
OR
mozillabugzillaMatch2.18rc3
OR
mozillabugzillaMatch2.18.1
OR
mozillabugzillaMatch2.18.2
OR
mozillabugzillaMatch2.18.3
OR
mozillabugzillaMatch2.18.4
OR
mozillabugzillaMatch2.18.5
OR
mozillabugzillaMatch2.18.6
OR
mozillabugzillaMatch2.18.7
OR
mozillabugzillaMatch2.18.8
OR
mozillabugzillaMatch2.18.9
OR
mozillabugzillaMatch2.19
OR
mozillabugzillaMatch2.19.1
OR
mozillabugzillaMatch2.19.2
OR
mozillabugzillaMatch2.19.3
OR
mozillabugzillaMatch2.20
OR
mozillabugzillaMatch2.20rc1
OR
mozillabugzillaMatch2.20rc2
OR
mozillabugzillaMatch2.20.1
OR
mozillabugzillaMatch2.20.2
OR
mozillabugzillaMatch2.20.3
OR
mozillabugzillaMatch2.20.4
OR
mozillabugzillaMatch2.20.5
OR
mozillabugzillaMatch2.20.6
OR
mozillabugzillaMatch2.21
OR
mozillabugzillaMatch2.21.1
OR
mozillabugzillaMatch2.21.2
OR
mozillabugzillaMatch2.22
OR
mozillabugzillaMatch2.22rc1
OR
mozillabugzillaMatch2.22.1
OR
mozillabugzillaMatch2.22.2
OR
mozillabugzillaMatch2.22.3
OR
mozillabugzillaMatch2.22.4
OR
mozillabugzillaMatch2.22.5
OR
mozillabugzillaMatch2.22.6
OR
mozillabugzillaMatch3.0.0
OR
mozillabugzillaMatch3.0.1
OR
mozillabugzillaMatch3.0.2
OR
mozillabugzillaMatch3.0.3
OR
mozillabugzillaMatch3.0.4
OR
mozillabugzillaMatch3.0.5
OR
mozillabugzillaMatch3.0.6
OR
mozillabugzillaMatch3.2
OR
mozillabugzillaMatch3.3.1
VendorProductVersionCPE
mozillabugzilla2.10cpe:2.3:a:mozilla:bugzilla:2.10:*:*:*:*:*:*:*
mozillabugzilla2.12cpe:2.3:a:mozilla:bugzilla:2.12:*:*:*:*:*:*:*
mozillabugzilla2.14cpe:2.3:a:mozilla:bugzilla:2.14:*:*:*:*:*:*:*
mozillabugzilla2.14.1cpe:2.3:a:mozilla:bugzilla:2.14.1:*:*:*:*:*:*:*
mozillabugzilla2.14.2cpe:2.3:a:mozilla:bugzilla:2.14.2:*:*:*:*:*:*:*
mozillabugzilla2.14.3cpe:2.3:a:mozilla:bugzilla:2.14.3:*:*:*:*:*:*:*
mozillabugzilla2.14.4cpe:2.3:a:mozilla:bugzilla:2.14.4:*:*:*:*:*:*:*
mozillabugzilla2.14.5cpe:2.3:a:mozilla:bugzilla:2.14.5:*:*:*:*:*:*:*
mozillabugzilla2.16cpe:2.3:a:mozilla:bugzilla:2.16:*:*:*:*:*:*:*
mozillabugzilla2.16cpe:2.3:a:mozilla:bugzilla:2.16:rc1:*:*:*:*:*:*
Rows per page:
1-10 of 761

CVSS2

5.8

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:N/I:P/A:P

AI Score

6.6

Confidence

Low

EPSS

0.002

Percentile

55.0%