Lucene search

K
nvd[email protected]NVD:CVE-2011-2380
HistoryAug 09, 2011 - 7:55 p.m.

CVE-2011-2380

2011-08-0919:55:01
CWE-200
web.nvd.nist.gov
1

5 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:L/Au:N/C:P/I:N/A:N

6.3 Medium

AI Score

Confidence

Low

0.006 Low

EPSS

Percentile

77.9%

Bugzilla 2.23.3 through 2.22.7, 3.0.x through 3.3.x, 3.4.x before 3.4.12, 3.5.x, 3.6.x before 3.6.6, 3.7.x, 4.0.x before 4.0.2, and 4.1.x before 4.1.3 allows remote attackers to determine the existence of private group names via a crafted parameter during (1) bug creation or (2) bug editing.

Affected configurations

NVD
Node
mozillabugzillaMatch2.22.7
OR
mozillabugzillaMatch2.23
OR
mozillabugzillaMatch2.23.1
OR
mozillabugzillaMatch2.23.2
OR
mozillabugzillaMatch2.23.3
Node
mozillabugzillaMatch3.4
OR
mozillabugzillaMatch3.4rc1
OR
mozillabugzillaMatch3.4.1
OR
mozillabugzillaMatch3.4.2
OR
mozillabugzillaMatch3.4.3
OR
mozillabugzillaMatch3.4.4
OR
mozillabugzillaMatch3.4.5
OR
mozillabugzillaMatch3.4.6
OR
mozillabugzillaMatch3.4.7
OR
mozillabugzillaMatch3.4.8
OR
mozillabugzillaMatch3.4.9
OR
mozillabugzillaMatch3.4.10
OR
mozillabugzillaMatch3.4.11
Node
mozillabugzillaMatch3.5
OR
mozillabugzillaMatch3.5.1
OR
mozillabugzillaMatch3.5.2
OR
mozillabugzillaMatch3.5.3
Node
mozillabugzillaMatch3.6
OR
mozillabugzillaMatch3.6rc1
OR
mozillabugzillaMatch3.6.0
OR
mozillabugzillaMatch3.6.1
OR
mozillabugzillaMatch3.6.2
OR
mozillabugzillaMatch3.6.3
OR
mozillabugzillaMatch3.6.4
OR
mozillabugzillaMatch3.6.5
Node
mozillabugzillaMatch3.7
OR
mozillabugzillaMatch3.7.1
OR
mozillabugzillaMatch3.7.2
OR
mozillabugzillaMatch3.7.3
Node
mozillabugzillaMatch4.0
OR
mozillabugzillaMatch4.0rc1
OR
mozillabugzillaMatch4.0rc2
OR
mozillabugzillaMatch4.0.1
Node
mozillabugzillaMatch4.1
OR
mozillabugzillaMatch4.1.1
OR
mozillabugzillaMatch4.1.2
Node
mozillabugzillaMatch3.0rc1
OR
mozillabugzillaMatch3.0.0
OR
mozillabugzillaMatch3.0.1
OR
mozillabugzillaMatch3.0.2
OR
mozillabugzillaMatch3.0.3
OR
mozillabugzillaMatch3.0.4
OR
mozillabugzillaMatch3.0.5
OR
mozillabugzillaMatch3.0.6
OR
mozillabugzillaMatch3.0.7
OR
mozillabugzillaMatch3.0.8
OR
mozillabugzillaMatch3.0.9
OR
mozillabugzillaMatch3.0.10
OR
mozillabugzillaMatch3.0.11
OR
mozillabugzillaMatch3.1.0
OR
mozillabugzillaMatch3.1.1
OR
mozillabugzillaMatch3.1.2
OR
mozillabugzillaMatch3.1.3
OR
mozillabugzillaMatch3.1.4
OR
mozillabugzillaMatch3.2rc1
OR
mozillabugzillaMatch3.2rc2
OR
mozillabugzillaMatch3.2.1
OR
mozillabugzillaMatch3.2.2
OR
mozillabugzillaMatch3.2.3
OR
mozillabugzillaMatch3.2.4
OR
mozillabugzillaMatch3.2.5
OR
mozillabugzillaMatch3.2.6
OR
mozillabugzillaMatch3.2.7
OR
mozillabugzillaMatch3.2.8
OR
mozillabugzillaMatch3.2.9
OR
mozillabugzillaMatch3.2.10
OR
mozillabugzillaMatch3.3.1
OR
mozillabugzillaMatch3.3.2
OR
mozillabugzillaMatch3.3.3
OR
mozillabugzillaMatch3.3.4

5 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:L/Au:N/C:P/I:N/A:N

6.3 Medium

AI Score

Confidence

Low

0.006 Low

EPSS

Percentile

77.9%