CVE-2005-3138
Published Oct 5, 2005
Last updated 7 years ago
Overview
- Description
- Bugzilla 2.18rc1 through 2.18.3, 2.19 through 2.20rc2, and 2.21 allows remote attackers to obtain sensitive information such as the list of installed products via the config.cgi file, which is accessible even when the requirelogin parameter is set.
- Source
- cve@mitre.org
- NVD status
- Modified
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 5
- Impact score
- 2.9
- Exploitability score
- 10
- Vector string
- AV:N/AC:L/Au:N/C:P/I:N/A:N
Weaknesses
- nvd@nist.gov
- NVD-CWE-Other
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:mozilla:bugzilla:2.18:rc1:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "3635C0E9-2E43-4BAE-8267-2BB2F68B03BD" }, { "criteria": "cpe:2.3:a:mozilla:bugzilla:2.18:rc2:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4869A709-AF79-49BD-A7D2-D48A8D79A085" }, { "criteria": "cpe:2.3:a:mozilla:bugzilla:2.18:rc3:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "EAC72143-27C3-498F-AFAB-98AE043C0545" }, { "criteria": "cpe:2.3:a:mozilla:bugzilla:2.18.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "BE5E8E72-D493-460D-B5A0-F90C291398A5" }, { "criteria": "cpe:2.3:a:mozilla:bugzilla:2.18.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "04885D31-09F3-455F-A1A9-815E182ABCF9" }, { "criteria": "cpe:2.3:a:mozilla:bugzilla:2.18.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F153300E-42CC-4BDD-88EC-E8A0ADB4E3B7" }, { "criteria": "cpe:2.3:a:mozilla:bugzilla:2.19:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "725BD7BE-1769-4032-ADA8-9ED15528C770" }, { "criteria": "cpe:2.3:a:mozilla:bugzilla:2.19.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "239D70F4-7D86-4A57-ACEF-440F68994FB6" }, { "criteria": "cpe:2.3:a:mozilla:bugzilla:2.19.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "ABEE2C94-DA69-4A78-A15F-538383A7460E" }, { "criteria": "cpe:2.3:a:mozilla:bugzilla:2.19.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4F7CD64E-7FAA-40DC-B36E-8B7EB9D620FB" }, { "criteria": "cpe:2.3:a:mozilla:bugzilla:2.20:rc1:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B45F6C27-D89A-42A0-A304-5B0C57D2A9F1" }, { "criteria": "cpe:2.3:a:mozilla:bugzilla:2.20:rc2:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "196B7CD8-D721-4CFB-B126-78758128E900" }, { "criteria": "cpe:2.3:a:mozilla:bugzilla:2.21:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "2053CFB4-602E-4141-BB3D-A440E2A31D85" } ], "operator": "OR" } ] } ]