The following security issues have been discovered in
	     Bugzilla:
	  LDAP Injection
	  When the user logs in using LDAP, the username is not
	     escaped when building the uid=$username filter which is
	     used to query the LDAP directory. This could potentially
	     lead to LDAP injection.
	  Directory Browsing
	  Extensions are not protected against directory browsing
	     and users can access the source code of the templates
	     which may contain sensitive data.
	     Directory browsing is blocked in Bugzilla 4.3.3 only,
	     because it requires a configuration change in the Apache
	     httpd.conf file to allow local .htaccess files to use
	     Options -Indexes. To not break existing installations,
	     this fix has not been backported to stable branches.
	     The access to templates is blocked for all supported
	     branches except the old 3.6 branch, because this branch
	     doesn't have .htaccess in the bzr repository and cannot
	     be fixed easily for existing installations without
	     potentially conflicting with custom changes.