Lookup for vulnerable packages by Package URL.
| Purl | pkg:deb/debian/znuny@0?distro=trixie |
| Type | deb |
| Namespace | debian |
| Name | znuny |
| Version | 0 |
| Qualifiers |
|
| Subpath | |
| Is_vulnerable | false |
| Next_non_vulnerable_version | 6.4.5-1 |
| Latest_non_vulnerable_version | 6.5.19-1 |
| Affected_by_vulnerabilities |
|
| Fixing_vulnerabilities |
| 0 |
| url |
VCID-12v6-61me-ffa1 |
| vulnerability_id |
VCID-12v6-61me-ffa1 |
| summary |
An issue was discovered in Znuny 7.0.1 through 7.0.16 where the ticket detail view in the customer front allows the execution of external JavaScript. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2024-32492 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.0065 |
| scoring_system |
epss |
| scoring_elements |
0.70885 |
| published_at |
2026-04-18T12:55:00Z |
|
| 1 |
| value |
0.0065 |
| scoring_system |
epss |
| scoring_elements |
0.70864 |
| published_at |
2026-04-11T12:55:00Z |
|
| 2 |
| value |
0.0065 |
| scoring_system |
epss |
| scoring_elements |
0.70848 |
| published_at |
2026-04-12T12:55:00Z |
|
| 3 |
| value |
0.0065 |
| scoring_system |
epss |
| scoring_elements |
0.70833 |
| published_at |
2026-04-13T12:55:00Z |
|
| 4 |
| value |
0.0065 |
| scoring_system |
epss |
| scoring_elements |
0.70878 |
| published_at |
2026-04-16T12:55:00Z |
|
| 5 |
| value |
0.0065 |
| scoring_system |
epss |
| scoring_elements |
0.70787 |
| published_at |
2026-04-02T12:55:00Z |
|
| 6 |
| value |
0.0065 |
| scoring_system |
epss |
| scoring_elements |
0.70806 |
| published_at |
2026-04-04T12:55:00Z |
|
| 7 |
| value |
0.0065 |
| scoring_system |
epss |
| scoring_elements |
0.70781 |
| published_at |
2026-04-07T12:55:00Z |
|
| 8 |
| value |
0.0065 |
| scoring_system |
epss |
| scoring_elements |
0.70825 |
| published_at |
2026-04-08T12:55:00Z |
|
| 9 |
| value |
0.0065 |
| scoring_system |
epss |
| scoring_elements |
0.70841 |
| published_at |
2026-04-09T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2024-32492 |
|
| 1 |
| reference_url |
https://znuny.com |
| reference_id |
znuny.com |
| reference_type |
|
| scores |
| 0 |
| value |
7.1 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N |
|
| 1 |
| value |
Track |
| scoring_system |
ssvc |
| scoring_elements |
SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-05T15:52:23Z/ |
|
|
| url |
https://znuny.com |
|
| 2 |
|
|
| fixed_packages |
|
| aliases |
CVE-2024-32492
|
| risk_score |
null |
| exploitability |
null |
| weighted_severity |
null |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-12v6-61me-ffa1 |
|
| 1 |
| url |
VCID-2yyp-zhcc-mbgq |
| vulnerability_id |
VCID-2yyp-zhcc-mbgq |
| summary |
Specially crafted string in OTRS system configuration can allow the execution of any system command. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2021-36100 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.0072 |
| scoring_system |
epss |
| scoring_elements |
0.72417 |
| published_at |
2026-04-07T12:55:00Z |
|
| 1 |
| value |
0.0072 |
| scoring_system |
epss |
| scoring_elements |
0.72423 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.0072 |
| scoring_system |
epss |
| scoring_elements |
0.7244 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.0072 |
| scoring_system |
epss |
| scoring_elements |
0.72456 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.0072 |
| scoring_system |
epss |
| scoring_elements |
0.72468 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.0072 |
| scoring_system |
epss |
| scoring_elements |
0.72492 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.0072 |
| scoring_system |
epss |
| scoring_elements |
0.72474 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
0.0072 |
| scoring_system |
epss |
| scoring_elements |
0.72464 |
| published_at |
2026-04-13T12:55:00Z |
|
| 8 |
| value |
0.0072 |
| scoring_system |
epss |
| scoring_elements |
0.72506 |
| published_at |
2026-04-16T12:55:00Z |
|
| 9 |
| value |
0.0072 |
| scoring_system |
epss |
| scoring_elements |
0.72514 |
| published_at |
2026-04-18T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2021-36100 |
|
| 1 |
|
|
| fixed_packages |
|
| aliases |
CVE-2021-36100
|
| risk_score |
null |
| exploitability |
null |
| weighted_severity |
null |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-2yyp-zhcc-mbgq |
|
| 2 |
| url |
VCID-57jx-quzh-fubc |
| vulnerability_id |
VCID-57jx-quzh-fubc |
| summary |
Agents are able to list customer user emails without required permissions in the bulk action screen. This issue affects: OTRS AG ((OTRS)) Community Edition: 6.0.x version 6.0.1 and later versions. OTRS AG OTRS: 7.0.x versions prior to 7.0.27. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2021-21443 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.0022 |
| scoring_system |
epss |
| scoring_elements |
0.44548 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.0022 |
| scoring_system |
epss |
| scoring_elements |
0.44628 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.0022 |
| scoring_system |
epss |
| scoring_elements |
0.44648 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.0022 |
| scoring_system |
epss |
| scoring_elements |
0.44585 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.0022 |
| scoring_system |
epss |
| scoring_elements |
0.44637 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.0022 |
| scoring_system |
epss |
| scoring_elements |
0.44639 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.0022 |
| scoring_system |
epss |
| scoring_elements |
0.44655 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.0022 |
| scoring_system |
epss |
| scoring_elements |
0.44625 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.0022 |
| scoring_system |
epss |
| scoring_elements |
0.44626 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.0022 |
| scoring_system |
epss |
| scoring_elements |
0.4468 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.0022 |
| scoring_system |
epss |
| scoring_elements |
0.44672 |
| published_at |
2026-04-18T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2021-21443 |
|
| 1 |
|
| 2 |
|
|
| fixed_packages |
|
| aliases |
CVE-2021-21443
|
| risk_score |
null |
| exploitability |
0.5 |
| weighted_severity |
0.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-57jx-quzh-fubc |
|
| 3 |
| url |
VCID-9431-8f5f-rfct |
| vulnerability_id |
VCID-9431-8f5f-rfct |
| summary |
DoS attack can be performed when an email contains specially designed URL in the body. It can lead to the high CPU usage and cause low quality of service, or in extreme case bring the system to a halt. This issue affects: OTRS AG ((OTRS)) Community Edition 6.0.x version 6.0.1 and later versions. OTRS AG OTRS 7.0.x version 7.0.26 and prior versions; 8.0.x version 8.0.13 and prior versions. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2021-21439 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00348 |
| scoring_system |
epss |
| scoring_elements |
0.57232 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00348 |
| scoring_system |
epss |
| scoring_elements |
0.57314 |
| published_at |
2026-04-07T12:55:00Z |
|
| 2 |
| value |
0.00348 |
| scoring_system |
epss |
| scoring_elements |
0.57337 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00348 |
| scoring_system |
epss |
| scoring_elements |
0.57365 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.00348 |
| scoring_system |
epss |
| scoring_elements |
0.57367 |
| published_at |
2026-04-16T12:55:00Z |
|
| 5 |
| value |
0.00348 |
| scoring_system |
epss |
| scoring_elements |
0.57382 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.00348 |
| scoring_system |
epss |
| scoring_elements |
0.57362 |
| published_at |
2026-04-18T12:55:00Z |
|
| 7 |
| value |
0.00348 |
| scoring_system |
epss |
| scoring_elements |
0.57341 |
| published_at |
2026-04-13T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2021-21439 |
|
| 1 |
|
| 2 |
|
|
| fixed_packages |
|
| aliases |
CVE-2021-21439
|
| risk_score |
null |
| exploitability |
0.5 |
| weighted_severity |
0.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-9431-8f5f-rfct |
|
| 4 |
| url |
VCID-u3ed-wmjx-9fcq |
| vulnerability_id |
VCID-u3ed-wmjx-9fcq |
| summary |
Generated Support Bundles contains private S/MIME and PGP keys if containing folder is not hidden. This issue affects: OTRS AG ((OTRS)) Community Edition 6.0.x version 6.0.1 and later versions. OTRS AG OTRS 7.0.x version 7.0.27 and prior versions; 8.0.x version 8.0.14 and prior versions. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2021-21440 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00179 |
| scoring_system |
epss |
| scoring_elements |
0.394 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00179 |
| scoring_system |
epss |
| scoring_elements |
0.39563 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00179 |
| scoring_system |
epss |
| scoring_elements |
0.39586 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00179 |
| scoring_system |
epss |
| scoring_elements |
0.39501 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00179 |
| scoring_system |
epss |
| scoring_elements |
0.39556 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00179 |
| scoring_system |
epss |
| scoring_elements |
0.39572 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00179 |
| scoring_system |
epss |
| scoring_elements |
0.39582 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00179 |
| scoring_system |
epss |
| scoring_elements |
0.39544 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00179 |
| scoring_system |
epss |
| scoring_elements |
0.39528 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.00179 |
| scoring_system |
epss |
| scoring_elements |
0.39578 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.00179 |
| scoring_system |
epss |
| scoring_elements |
0.39549 |
| published_at |
2026-04-18T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2021-21440 |
|
| 1 |
|
| 2 |
|
|
| fixed_packages |
|
| aliases |
CVE-2021-21440
|
| risk_score |
null |
| exploitability |
0.5 |
| weighted_severity |
0.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-u3ed-wmjx-9fcq |
|
| 5 |
| url |
VCID-u8xm-v9ek-yuar |
| vulnerability_id |
VCID-u8xm-v9ek-yuar |
| summary |
There is a XSS vulnerability in the ticket overview screens. It's possible to collect various information by having an e-mail shown in the overview screen. Attack can be performed by sending specially crafted e-mail to the system and it doesn't require any user intraction. This issue affects: OTRS AG ((OTRS)) Community Edition 6.0.x version 6.0.1 and later versions. OTRS AG OTRS 7.0.x version 7.0.26 and prior versions. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2021-21441 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00296 |
| scoring_system |
epss |
| scoring_elements |
0.52823 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00296 |
| scoring_system |
epss |
| scoring_elements |
0.5285 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00296 |
| scoring_system |
epss |
| scoring_elements |
0.52876 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00296 |
| scoring_system |
epss |
| scoring_elements |
0.52844 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00296 |
| scoring_system |
epss |
| scoring_elements |
0.52895 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00296 |
| scoring_system |
epss |
| scoring_elements |
0.52889 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00296 |
| scoring_system |
epss |
| scoring_elements |
0.52939 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00296 |
| scoring_system |
epss |
| scoring_elements |
0.52923 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00296 |
| scoring_system |
epss |
| scoring_elements |
0.52907 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.00296 |
| scoring_system |
epss |
| scoring_elements |
0.52944 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.00296 |
| scoring_system |
epss |
| scoring_elements |
0.52951 |
| published_at |
2026-04-18T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2021-21441 |
|
| 1 |
|
| 2 |
|
|
| fixed_packages |
|
| aliases |
CVE-2021-21441
|
| risk_score |
null |
| exploitability |
0.5 |
| weighted_severity |
0.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-u8xm-v9ek-yuar |
|
|
| Risk_score | null |
| Resource_url | http://public2.vulnerablecode.io/packages/pkg:deb/debian/znuny@0%3Fdistro=trixie |