Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-vwm5-27p4-hp3w

Опубликовано: 01 мая 2022
Источник: github
Github: Не прошло ревью

Описание

The offer_account_by_email function in User.pm in the WebService for Bugzilla before 3.0.2, and 3.1.x before 3.1.2, does not check the value of the createemailregexp parameter, which allows remote attackers to bypass intended restrictions on account creation.

The offer_account_by_email function in User.pm in the WebService for Bugzilla before 3.0.2, and 3.1.x before 3.1.2, does not check the value of the createemailregexp parameter, which allows remote attackers to bypass intended restrictions on account creation.

EPSS

Процентиль: 75%
0.0093
Низкий

Связанные уязвимости

nvd
около 18 лет назад

The offer_account_by_email function in User.pm in the WebService for Bugzilla before 3.0.2, and 3.1.x before 3.1.2, does not check the value of the createemailregexp parameter, which allows remote attackers to bypass intended restrictions on account creation.

debian
около 18 лет назад

The offer_account_by_email function in User.pm in the WebService for B ...

EPSS

Процентиль: 75%
0.0093
Низкий