Bugzilla before 3.2.10, 3.4.x before 3.4.10, 3.6.x before 3.6.4, and 4.0.x before 4.0rc2 does not properly handle whitespace preceding a (1) javascript: or (2) data: URI, which allows remote attackers to conduct cross-site scripting (XSS) attacks via the URL (aka bug_file_loc) field.
lists.fedoraproject.org/pipermail/package-announce/2011-February/053665.html
lists.fedoraproject.org/pipermail/package-announce/2011-February/053678.html
osvdb.org/70699
secunia.com/advisories/43033
secunia.com/advisories/43165
www.bugzilla.org/security/3.2.9/
www.debian.org/security/2011/dsa-2322
www.securityfocus.com/bid/45982
www.vupen.com/english/advisories/2011/0207
www.vupen.com/english/advisories/2011/0271
bugzilla.mozilla.org/show_bug.cgi?id=619588
exchange.xforce.ibmcloud.com/vulnerabilities/65004