Lucene search

K
nvd[email protected]NVD:CVE-2011-2381
HistoryAug 09, 2011 - 7:55 p.m.

CVE-2011-2381

2011-08-0919:55:01
CWE-94
web.nvd.nist.gov
5

CVSS2

4.3

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:N/C:N/I:P/A:N

AI Score

6.8

Confidence

Low

EPSS

0.012

Percentile

85.1%

CRLF injection vulnerability in Bugzilla 2.17.1 through 2.22.7, 3.0.x through 3.3.x, 3.4.x before 3.4.12, 3.5.x, 3.6.x before 3.6.6, 3.7.x, 4.0.x before 4.0.2, and 4.1.x before 4.1.3 allows remote attackers to inject arbitrary e-mail headers via an attachment description in a flagmail notification.

Affected configurations

Nvd
Node
mozillabugzillaMatch2.17.1
OR
mozillabugzillaMatch2.17.3
OR
mozillabugzillaMatch2.17.4
OR
mozillabugzillaMatch2.17.5
OR
mozillabugzillaMatch2.17.6
OR
mozillabugzillaMatch2.17.7
OR
mozillabugzillaMatch2.18
OR
mozillabugzillaMatch2.18rc1
OR
mozillabugzillaMatch2.18rc2
OR
mozillabugzillaMatch2.18rc3
OR
mozillabugzillaMatch2.18.1
OR
mozillabugzillaMatch2.18.2
OR
mozillabugzillaMatch2.18.3
OR
mozillabugzillaMatch2.18.4
OR
mozillabugzillaMatch2.18.5
OR
mozillabugzillaMatch2.18.6
OR
mozillabugzillaMatch2.19
OR
mozillabugzillaMatch2.19.1
OR
mozillabugzillaMatch2.19.2
OR
mozillabugzillaMatch2.19.3
OR
mozillabugzillaMatch2.20
OR
mozillabugzillaMatch2.20rc1
OR
mozillabugzillaMatch2.20rc2
OR
mozillabugzillaMatch2.20.1
OR
mozillabugzillaMatch2.20.2
OR
mozillabugzillaMatch2.20.3
OR
mozillabugzillaMatch2.20.4
OR
mozillabugzillaMatch2.20.5
OR
mozillabugzillaMatch2.20.6
OR
mozillabugzillaMatch2.20.7
OR
mozillabugzillaMatch2.21
OR
mozillabugzillaMatch2.21.1
OR
mozillabugzillaMatch2.21.2
OR
mozillabugzillaMatch2.22
OR
mozillabugzillaMatch2.22rc1
OR
mozillabugzillaMatch2.22.1
OR
mozillabugzillaMatch2.22.2
OR
mozillabugzillaMatch2.22.3
OR
mozillabugzillaMatch2.22.4
OR
mozillabugzillaMatch2.22.5
OR
mozillabugzillaMatch2.22.6
OR
mozillabugzillaMatch2.22.7
Node
mozillabugzillaMatch3.4
OR
mozillabugzillaMatch3.4rc1
OR
mozillabugzillaMatch3.4.1
OR
mozillabugzillaMatch3.4.2
OR
mozillabugzillaMatch3.4.3
OR
mozillabugzillaMatch3.4.4
OR
mozillabugzillaMatch3.4.5
OR
mozillabugzillaMatch3.4.6
OR
mozillabugzillaMatch3.4.7
OR
mozillabugzillaMatch3.4.8
OR
mozillabugzillaMatch3.4.9
OR
mozillabugzillaMatch3.4.10
OR
mozillabugzillaMatch3.4.11
Node
mozillabugzillaMatch3.5
OR
mozillabugzillaMatch3.5.1
OR
mozillabugzillaMatch3.5.2
OR
mozillabugzillaMatch3.5.3
Node
mozillabugzillaMatch3.6
OR
mozillabugzillaMatch3.6rc1
OR
mozillabugzillaMatch3.6.0
OR
mozillabugzillaMatch3.6.1
OR
mozillabugzillaMatch3.6.2
OR
mozillabugzillaMatch3.6.3
OR
mozillabugzillaMatch3.6.4
OR
mozillabugzillaMatch3.6.5
Node
mozillabugzillaMatch3.7
OR
mozillabugzillaMatch3.7.1
OR
mozillabugzillaMatch3.7.2
OR
mozillabugzillaMatch3.7.3
Node
mozillabugzillaMatch4.0
OR
mozillabugzillaMatch4.0rc1
OR
mozillabugzillaMatch4.0rc2
OR
mozillabugzillaMatch4.0.1
Node
mozillabugzillaMatch4.1
OR
mozillabugzillaMatch4.1.1
OR
mozillabugzillaMatch4.1.2
Node
mozillabugzillaMatch3.0
OR
mozillabugzillaMatch3.0rc1
OR
mozillabugzillaMatch3.0.0
OR
mozillabugzillaMatch3.0.1
OR
mozillabugzillaMatch3.0.2
OR
mozillabugzillaMatch3.0.3
OR
mozillabugzillaMatch3.0.4
OR
mozillabugzillaMatch3.0.5
OR
mozillabugzillaMatch3.0.6
OR
mozillabugzillaMatch3.0.7
OR
mozillabugzillaMatch3.0.8
OR
mozillabugzillaMatch3.0.9
OR
mozillabugzillaMatch3.0.10
OR
mozillabugzillaMatch3.0.11
OR
mozillabugzillaMatch3.1.0
OR
mozillabugzillaMatch3.1.1
OR
mozillabugzillaMatch3.1.2
OR
mozillabugzillaMatch3.1.3
OR
mozillabugzillaMatch3.1.4
OR
mozillabugzillaMatch3.2
OR
mozillabugzillaMatch3.2rc1
OR
mozillabugzillaMatch3.2rc2
OR
mozillabugzillaMatch3.2.1
OR
mozillabugzillaMatch3.2.2
OR
mozillabugzillaMatch3.2.3
OR
mozillabugzillaMatch3.2.4
OR
mozillabugzillaMatch3.2.5
OR
mozillabugzillaMatch3.2.6
OR
mozillabugzillaMatch3.2.7
OR
mozillabugzillaMatch3.2.8
OR
mozillabugzillaMatch3.2.9
OR
mozillabugzillaMatch3.2.10
OR
mozillabugzillaMatch3.3
OR
mozillabugzillaMatch3.3.1
OR
mozillabugzillaMatch3.3.2
OR
mozillabugzillaMatch3.3.3
OR
mozillabugzillaMatch3.3.4
VendorProductVersionCPE
mozillabugzilla2.17.1cpe:2.3:a:mozilla:bugzilla:2.17.1:*:*:*:*:*:*:*
mozillabugzilla2.17.3cpe:2.3:a:mozilla:bugzilla:2.17.3:*:*:*:*:*:*:*
mozillabugzilla2.17.4cpe:2.3:a:mozilla:bugzilla:2.17.4:*:*:*:*:*:*:*
mozillabugzilla2.17.5cpe:2.3:a:mozilla:bugzilla:2.17.5:*:*:*:*:*:*:*
mozillabugzilla2.17.6cpe:2.3:a:mozilla:bugzilla:2.17.6:*:*:*:*:*:*:*
mozillabugzilla2.17.7cpe:2.3:a:mozilla:bugzilla:2.17.7:*:*:*:*:*:*:*
mozillabugzilla2.18cpe:2.3:a:mozilla:bugzilla:2.18:*:*:*:*:*:*:*
mozillabugzilla2.18cpe:2.3:a:mozilla:bugzilla:2.18:rc1:*:*:*:*:*:*
mozillabugzilla2.18cpe:2.3:a:mozilla:bugzilla:2.18:rc2:*:*:*:*:*:*
mozillabugzilla2.18cpe:2.3:a:mozilla:bugzilla:2.18:rc3:*:*:*:*:*:*
Rows per page:
1-10 of 1151

CVSS2

4.3

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:N/C:N/I:P/A:N

AI Score

6.8

Confidence

Low

EPSS

0.012

Percentile

85.1%