| 0 |
| url |
VCID-12v6-61me-ffa1 |
| vulnerability_id |
VCID-12v6-61me-ffa1 |
| summary |
An issue was discovered in Znuny 7.0.1 through 7.0.16 where the ticket detail view in the customer front allows the execution of external JavaScript. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2024-32492 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.0065 |
| scoring_system |
epss |
| scoring_elements |
0.70885 |
| published_at |
2026-04-18T12:55:00Z |
|
| 1 |
| value |
0.0065 |
| scoring_system |
epss |
| scoring_elements |
0.70864 |
| published_at |
2026-04-11T12:55:00Z |
|
| 2 |
| value |
0.0065 |
| scoring_system |
epss |
| scoring_elements |
0.70848 |
| published_at |
2026-04-12T12:55:00Z |
|
| 3 |
| value |
0.0065 |
| scoring_system |
epss |
| scoring_elements |
0.70833 |
| published_at |
2026-04-13T12:55:00Z |
|
| 4 |
| value |
0.0065 |
| scoring_system |
epss |
| scoring_elements |
0.70878 |
| published_at |
2026-04-16T12:55:00Z |
|
| 5 |
| value |
0.0065 |
| scoring_system |
epss |
| scoring_elements |
0.70787 |
| published_at |
2026-04-02T12:55:00Z |
|
| 6 |
| value |
0.0065 |
| scoring_system |
epss |
| scoring_elements |
0.70806 |
| published_at |
2026-04-04T12:55:00Z |
|
| 7 |
| value |
0.0065 |
| scoring_system |
epss |
| scoring_elements |
0.70781 |
| published_at |
2026-04-07T12:55:00Z |
|
| 8 |
| value |
0.0065 |
| scoring_system |
epss |
| scoring_elements |
0.70825 |
| published_at |
2026-04-08T12:55:00Z |
|
| 9 |
| value |
0.0065 |
| scoring_system |
epss |
| scoring_elements |
0.70841 |
| published_at |
2026-04-09T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2024-32492 |
|
| 1 |
| reference_url |
https://znuny.com |
| reference_id |
znuny.com |
| reference_type |
|
| scores |
| 0 |
| value |
7.1 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N |
|
| 1 |
| value |
Track |
| scoring_system |
ssvc |
| scoring_elements |
SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-05T15:52:23Z/ |
|
|
| url |
https://znuny.com |
|
| 2 |
|
|
| fixed_packages |
|
| aliases |
CVE-2024-32492
|
| risk_score |
null |
| exploitability |
null |
| weighted_severity |
null |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-12v6-61me-ffa1 |
|
| 1 |
| url |
VCID-169g-wxmh-qqbw |
| vulnerability_id |
VCID-169g-wxmh-qqbw |
| summary |
Znuny before LTS 6.5.1 through 6.5.10 and 7.0.1 through 7.0.16 allows XSS. JavaScript code in the short description of the SLA field in Activity Dialogues is executed. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2024-48937 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.01525 |
| scoring_system |
epss |
| scoring_elements |
0.81315 |
| published_at |
2026-04-18T12:55:00Z |
|
| 1 |
| value |
0.01525 |
| scoring_system |
epss |
| scoring_elements |
0.81243 |
| published_at |
2026-04-07T12:55:00Z |
|
| 2 |
| value |
0.01525 |
| scoring_system |
epss |
| scoring_elements |
0.81271 |
| published_at |
2026-04-08T12:55:00Z |
|
| 3 |
| value |
0.01525 |
| scoring_system |
epss |
| scoring_elements |
0.81276 |
| published_at |
2026-04-13T12:55:00Z |
|
| 4 |
| value |
0.01525 |
| scoring_system |
epss |
| scoring_elements |
0.81297 |
| published_at |
2026-04-11T12:55:00Z |
|
| 5 |
| value |
0.01525 |
| scoring_system |
epss |
| scoring_elements |
0.81283 |
| published_at |
2026-04-12T12:55:00Z |
|
| 6 |
| value |
0.01525 |
| scoring_system |
epss |
| scoring_elements |
0.81313 |
| published_at |
2026-04-16T12:55:00Z |
|
| 7 |
| value |
0.01525 |
| scoring_system |
epss |
| scoring_elements |
0.81222 |
| published_at |
2026-04-02T12:55:00Z |
|
| 8 |
| value |
0.01525 |
| scoring_system |
epss |
| scoring_elements |
0.81245 |
| published_at |
2026-04-04T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2024-48937 |
|
| 1 |
|
| 2 |
| reference_url |
https://www.znuny.com |
| reference_id |
www.znuny.com |
| reference_type |
|
| scores |
| 0 |
| value |
6.1 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N |
|
| 1 |
| value |
Track |
| scoring_system |
ssvc |
| scoring_elements |
SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T15:39:09Z/ |
|
|
| url |
https://www.znuny.com |
|
| 3 |
|
|
| fixed_packages |
|
| aliases |
CVE-2024-48937
|
| risk_score |
1.5 |
| exploitability |
0.5 |
| weighted_severity |
3.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-169g-wxmh-qqbw |
|
| 2 |
| url |
VCID-1mkr-c1ay-jygw |
| vulnerability_id |
VCID-1mkr-c1ay-jygw |
| summary |
An issue was discovered in Znuny through 7.1.3. A cookie is set without the HttpOnly flag. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2025-26844 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00366 |
| scoring_system |
epss |
| scoring_elements |
0.58657 |
| published_at |
2026-04-18T12:55:00Z |
|
| 1 |
| value |
0.00366 |
| scoring_system |
epss |
| scoring_elements |
0.58639 |
| published_at |
2026-04-12T12:55:00Z |
|
| 2 |
| value |
0.00366 |
| scoring_system |
epss |
| scoring_elements |
0.58619 |
| published_at |
2026-04-13T12:55:00Z |
|
| 3 |
| value |
0.00366 |
| scoring_system |
epss |
| scoring_elements |
0.58652 |
| published_at |
2026-04-16T12:55:00Z |
|
| 4 |
| value |
0.00366 |
| scoring_system |
epss |
| scoring_elements |
0.58592 |
| published_at |
2026-04-02T12:55:00Z |
|
| 5 |
| value |
0.00366 |
| scoring_system |
epss |
| scoring_elements |
0.58613 |
| published_at |
2026-04-04T12:55:00Z |
|
| 6 |
| value |
0.00366 |
| scoring_system |
epss |
| scoring_elements |
0.58583 |
| published_at |
2026-04-07T12:55:00Z |
|
| 7 |
| value |
0.00366 |
| scoring_system |
epss |
| scoring_elements |
0.58635 |
| published_at |
2026-04-08T12:55:00Z |
|
| 8 |
| value |
0.00366 |
| scoring_system |
epss |
| scoring_elements |
0.58641 |
| published_at |
2026-04-09T12:55:00Z |
|
| 9 |
| value |
0.00366 |
| scoring_system |
epss |
| scoring_elements |
0.58658 |
| published_at |
2026-04-11T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2025-26844 |
|
| 1 |
| reference_url |
https://www.znuny.com |
| reference_id |
www.znuny.com |
| reference_type |
|
| scores |
| 0 |
| value |
9.8 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |
|
| 1 |
| value |
Track |
| scoring_system |
ssvc |
| scoring_elements |
SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-05-08T18:48:53Z/ |
|
|
| url |
https://www.znuny.com |
|
| 2 |
|
|
| fixed_packages |
|
| aliases |
CVE-2025-26844
|
| risk_score |
2.5 |
| exploitability |
0.5 |
| weighted_severity |
4.9 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-1mkr-c1ay-jygw |
|
| 3 |
| url |
VCID-2rbn-u9eg-sua7 |
| vulnerability_id |
VCID-2rbn-u9eg-sua7 |
| summary |
An issue was discovered in Znuny through 6.5.14 and 7.x through 7.1.6. Custom AJAX calls to the AgentPreferences UpdateAJAX subaction can be used to set user preferences with arbitrary keys. When fetching user data via GetUserData, these keys and values are retrieved and given as a whole to other function calls, which then might use these keys/values to affect permissions or other settings. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2025-43926 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00213 |
| scoring_system |
epss |
| scoring_elements |
0.43828 |
| published_at |
2026-04-18T12:55:00Z |
|
| 1 |
| value |
0.00213 |
| scoring_system |
epss |
| scoring_elements |
0.43791 |
| published_at |
2026-04-12T12:55:00Z |
|
| 2 |
| value |
0.00213 |
| scoring_system |
epss |
| scoring_elements |
0.43775 |
| published_at |
2026-04-13T12:55:00Z |
|
| 3 |
| value |
0.00213 |
| scoring_system |
epss |
| scoring_elements |
0.43836 |
| published_at |
2026-04-16T12:55:00Z |
|
| 4 |
| value |
0.00213 |
| scoring_system |
epss |
| scoring_elements |
0.43794 |
| published_at |
2026-04-02T12:55:00Z |
|
| 5 |
| value |
0.00213 |
| scoring_system |
epss |
| scoring_elements |
0.43819 |
| published_at |
2026-04-04T12:55:00Z |
|
| 6 |
| value |
0.00213 |
| scoring_system |
epss |
| scoring_elements |
0.4375 |
| published_at |
2026-04-07T12:55:00Z |
|
| 7 |
| value |
0.00213 |
| scoring_system |
epss |
| scoring_elements |
0.43801 |
| published_at |
2026-04-08T12:55:00Z |
|
| 8 |
| value |
0.00213 |
| scoring_system |
epss |
| scoring_elements |
0.43804 |
| published_at |
2026-04-09T12:55:00Z |
|
| 9 |
| value |
0.00213 |
| scoring_system |
epss |
| scoring_elements |
0.43824 |
| published_at |
2026-04-11T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2025-43926 |
|
| 1 |
|
| 2 |
| reference_url |
https://znuny.com |
| reference_id |
znuny.com |
| reference_type |
|
| scores |
| 0 |
| value |
6.1 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N |
|
| 1 |
| value |
Track |
| scoring_system |
ssvc |
| scoring_elements |
SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-12T18:30:23Z/ |
|
|
| url |
https://znuny.com |
|
| 3 |
|
|
| fixed_packages |
|
| aliases |
CVE-2025-43926
|
| risk_score |
1.5 |
| exploitability |
0.5 |
| weighted_severity |
3.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-2rbn-u9eg-sua7 |
|
| 4 |
| url |
VCID-2yyp-zhcc-mbgq |
| vulnerability_id |
VCID-2yyp-zhcc-mbgq |
| summary |
Specially crafted string in OTRS system configuration can allow the execution of any system command. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2021-36100 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.0072 |
| scoring_system |
epss |
| scoring_elements |
0.72417 |
| published_at |
2026-04-07T12:55:00Z |
|
| 1 |
| value |
0.0072 |
| scoring_system |
epss |
| scoring_elements |
0.72423 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.0072 |
| scoring_system |
epss |
| scoring_elements |
0.7244 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.0072 |
| scoring_system |
epss |
| scoring_elements |
0.72456 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.0072 |
| scoring_system |
epss |
| scoring_elements |
0.72468 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.0072 |
| scoring_system |
epss |
| scoring_elements |
0.72492 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.0072 |
| scoring_system |
epss |
| scoring_elements |
0.72474 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
0.0072 |
| scoring_system |
epss |
| scoring_elements |
0.72464 |
| published_at |
2026-04-13T12:55:00Z |
|
| 8 |
| value |
0.0072 |
| scoring_system |
epss |
| scoring_elements |
0.72506 |
| published_at |
2026-04-16T12:55:00Z |
|
| 9 |
| value |
0.0072 |
| scoring_system |
epss |
| scoring_elements |
0.72514 |
| published_at |
2026-04-18T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2021-36100 |
|
| 1 |
|
|
| fixed_packages |
|
| aliases |
CVE-2021-36100
|
| risk_score |
null |
| exploitability |
null |
| weighted_severity |
null |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-2yyp-zhcc-mbgq |
|
| 5 |
| url |
VCID-57jx-quzh-fubc |
| vulnerability_id |
VCID-57jx-quzh-fubc |
| summary |
Agents are able to list customer user emails without required permissions in the bulk action screen. This issue affects: OTRS AG ((OTRS)) Community Edition: 6.0.x version 6.0.1 and later versions. OTRS AG OTRS: 7.0.x versions prior to 7.0.27. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2021-21443 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.0022 |
| scoring_system |
epss |
| scoring_elements |
0.44548 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.0022 |
| scoring_system |
epss |
| scoring_elements |
0.44628 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.0022 |
| scoring_system |
epss |
| scoring_elements |
0.44648 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.0022 |
| scoring_system |
epss |
| scoring_elements |
0.44585 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.0022 |
| scoring_system |
epss |
| scoring_elements |
0.44637 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.0022 |
| scoring_system |
epss |
| scoring_elements |
0.44639 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.0022 |
| scoring_system |
epss |
| scoring_elements |
0.44655 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.0022 |
| scoring_system |
epss |
| scoring_elements |
0.44625 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.0022 |
| scoring_system |
epss |
| scoring_elements |
0.44626 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.0022 |
| scoring_system |
epss |
| scoring_elements |
0.4468 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.0022 |
| scoring_system |
epss |
| scoring_elements |
0.44672 |
| published_at |
2026-04-18T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2021-21443 |
|
| 1 |
|
| 2 |
|
|
| fixed_packages |
|
| aliases |
CVE-2021-21443
|
| risk_score |
null |
| exploitability |
0.5 |
| weighted_severity |
0.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-57jx-quzh-fubc |
|
| 6 |
| url |
VCID-9431-8f5f-rfct |
| vulnerability_id |
VCID-9431-8f5f-rfct |
| summary |
DoS attack can be performed when an email contains specially designed URL in the body. It can lead to the high CPU usage and cause low quality of service, or in extreme case bring the system to a halt. This issue affects: OTRS AG ((OTRS)) Community Edition 6.0.x version 6.0.1 and later versions. OTRS AG OTRS 7.0.x version 7.0.26 and prior versions; 8.0.x version 8.0.13 and prior versions. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2021-21439 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00348 |
| scoring_system |
epss |
| scoring_elements |
0.57232 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00348 |
| scoring_system |
epss |
| scoring_elements |
0.57314 |
| published_at |
2026-04-07T12:55:00Z |
|
| 2 |
| value |
0.00348 |
| scoring_system |
epss |
| scoring_elements |
0.57337 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00348 |
| scoring_system |
epss |
| scoring_elements |
0.57365 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.00348 |
| scoring_system |
epss |
| scoring_elements |
0.57367 |
| published_at |
2026-04-16T12:55:00Z |
|
| 5 |
| value |
0.00348 |
| scoring_system |
epss |
| scoring_elements |
0.57382 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.00348 |
| scoring_system |
epss |
| scoring_elements |
0.57362 |
| published_at |
2026-04-18T12:55:00Z |
|
| 7 |
| value |
0.00348 |
| scoring_system |
epss |
| scoring_elements |
0.57341 |
| published_at |
2026-04-13T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2021-21439 |
|
| 1 |
|
| 2 |
|
|
| fixed_packages |
|
| aliases |
CVE-2021-21439
|
| risk_score |
null |
| exploitability |
0.5 |
| weighted_severity |
0.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-9431-8f5f-rfct |
|
| 7 |
| url |
VCID-cqx8-tegf-pfhh |
| vulnerability_id |
VCID-cqx8-tegf-pfhh |
| summary |
An issue was discovered in Znuny through 7.1.3. If access to a ticket is not given, the content of S/MIME encrypted e-mail messages is visible to users with access to the CommunicationLog. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2025-26842 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00287 |
| scoring_system |
epss |
| scoring_elements |
0.52225 |
| published_at |
2026-04-18T12:55:00Z |
|
| 1 |
| value |
0.00287 |
| scoring_system |
epss |
| scoring_elements |
0.52222 |
| published_at |
2026-04-16T12:55:00Z |
|
| 2 |
| value |
0.00287 |
| scoring_system |
epss |
| scoring_elements |
0.5212 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.00287 |
| scoring_system |
epss |
| scoring_elements |
0.52147 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.00287 |
| scoring_system |
epss |
| scoring_elements |
0.52112 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.00287 |
| scoring_system |
epss |
| scoring_elements |
0.52166 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.00287 |
| scoring_system |
epss |
| scoring_elements |
0.52162 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.00287 |
| scoring_system |
epss |
| scoring_elements |
0.52213 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.00287 |
| scoring_system |
epss |
| scoring_elements |
0.52196 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.00287 |
| scoring_system |
epss |
| scoring_elements |
0.52182 |
| published_at |
2026-04-13T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2025-26842 |
|
| 1 |
|
|
| fixed_packages |
|
| aliases |
CVE-2025-26842
|
| risk_score |
1.9 |
| exploitability |
0.5 |
| weighted_severity |
3.8 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-cqx8-tegf-pfhh |
|
| 8 |
| url |
VCID-cx2r-g5rk-1yhn |
| vulnerability_id |
VCID-cx2r-g5rk-1yhn |
| summary |
Improper Input Validation vulnerability in OTRS AG OTRS, OTRS AG ((OTRS)) Community Edition allows SQL Injection via TicketSearch Webservice This issue affects OTRS: from 7.0.1 before 7.0.40 Patch 1, from 8.0.1 before 8.0.28 Patch 1; ((OTRS)) Community Edition: from 6.0.1 through 6.0.34. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-4427 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.0041 |
| scoring_system |
epss |
| scoring_elements |
0.61384 |
| published_at |
2026-04-18T12:55:00Z |
|
| 1 |
| value |
0.0041 |
| scoring_system |
epss |
| scoring_elements |
0.6136 |
| published_at |
2026-04-12T12:55:00Z |
|
| 2 |
| value |
0.0041 |
| scoring_system |
epss |
| scoring_elements |
0.61341 |
| published_at |
2026-04-13T12:55:00Z |
|
| 3 |
| value |
0.0041 |
| scoring_system |
epss |
| scoring_elements |
0.6138 |
| published_at |
2026-04-16T12:55:00Z |
|
| 4 |
| value |
0.0041 |
| scoring_system |
epss |
| scoring_elements |
0.61294 |
| published_at |
2026-04-02T12:55:00Z |
|
| 5 |
| value |
0.0041 |
| scoring_system |
epss |
| scoring_elements |
0.61323 |
| published_at |
2026-04-04T12:55:00Z |
|
| 6 |
| value |
0.0041 |
| scoring_system |
epss |
| scoring_elements |
0.61291 |
| published_at |
2026-04-07T12:55:00Z |
|
| 7 |
| value |
0.0041 |
| scoring_system |
epss |
| scoring_elements |
0.61339 |
| published_at |
2026-04-08T12:55:00Z |
|
| 8 |
| value |
0.0041 |
| scoring_system |
epss |
| scoring_elements |
0.61354 |
| published_at |
2026-04-09T12:55:00Z |
|
| 9 |
| value |
0.0041 |
| scoring_system |
epss |
| scoring_elements |
0.61374 |
| published_at |
2026-04-11T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-4427 |
|
| 1 |
|
| 2 |
|
|
| fixed_packages |
|
| aliases |
CVE-2022-4427
|
| risk_score |
null |
| exploitability |
null |
| weighted_severity |
null |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-cx2r-g5rk-1yhn |
|
| 9 |
| url |
VCID-kfqh-mtw2-3feu |
| vulnerability_id |
VCID-kfqh-mtw2-3feu |
| summary |
An issue was discovered in Znuny before 7.1.5. When generating a support bundle, not all passwords are masked. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2025-26847 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00298 |
| scoring_system |
epss |
| scoring_elements |
0.532 |
| published_at |
2026-04-18T12:55:00Z |
|
| 1 |
| value |
0.00298 |
| scoring_system |
epss |
| scoring_elements |
0.53169 |
| published_at |
2026-04-12T12:55:00Z |
|
| 2 |
| value |
0.00298 |
| scoring_system |
epss |
| scoring_elements |
0.53153 |
| published_at |
2026-04-13T12:55:00Z |
|
| 3 |
| value |
0.00298 |
| scoring_system |
epss |
| scoring_elements |
0.53193 |
| published_at |
2026-04-16T12:55:00Z |
|
| 4 |
| value |
0.00298 |
| scoring_system |
epss |
| scoring_elements |
0.53097 |
| published_at |
2026-04-02T12:55:00Z |
|
| 5 |
| value |
0.00298 |
| scoring_system |
epss |
| scoring_elements |
0.53121 |
| published_at |
2026-04-04T12:55:00Z |
|
| 6 |
| value |
0.00298 |
| scoring_system |
epss |
| scoring_elements |
0.53089 |
| published_at |
2026-04-07T12:55:00Z |
|
| 7 |
| value |
0.00298 |
| scoring_system |
epss |
| scoring_elements |
0.5314 |
| published_at |
2026-04-08T12:55:00Z |
|
| 8 |
| value |
0.00298 |
| scoring_system |
epss |
| scoring_elements |
0.53134 |
| published_at |
2026-04-09T12:55:00Z |
|
| 9 |
| value |
0.00298 |
| scoring_system |
epss |
| scoring_elements |
0.53184 |
| published_at |
2026-04-11T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2025-26847 |
|
| 1 |
|
| 2 |
| reference_url |
https://www.znuny.com |
| reference_id |
www.znuny.com |
| reference_type |
|
| scores |
| 0 |
| value |
9.1 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H |
|
| 1 |
| value |
Track |
| scoring_system |
ssvc |
| scoring_elements |
SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-05-08T18:58:30Z/ |
|
|
| url |
https://www.znuny.com |
|
| 3 |
|
|
| fixed_packages |
|
| aliases |
CVE-2025-26847
|
| risk_score |
2.2 |
| exploitability |
0.5 |
| weighted_severity |
4.5 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-kfqh-mtw2-3feu |
|
| 10 |
| url |
VCID-kr13-v6jr-5kg6 |
| vulnerability_id |
VCID-kr13-v6jr-5kg6 |
| summary |
An issue was discovered in Znuny and Znuny LTS 6.0.31 through 6.5.7 and Znuny 7.0.1 through 7.0.16 where a logged-in user can upload a file (via a manipulated AJAX Request) to an arbitrary writable location by traversing paths. Arbitrary code can be executed if this location is publicly available through the web server. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2024-32491 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00585 |
| scoring_system |
epss |
| scoring_elements |
0.69101 |
| published_at |
2026-04-18T12:55:00Z |
|
| 1 |
| value |
0.00585 |
| scoring_system |
epss |
| scoring_elements |
0.69097 |
| published_at |
2026-04-11T12:55:00Z |
|
| 2 |
| value |
0.00585 |
| scoring_system |
epss |
| scoring_elements |
0.69083 |
| published_at |
2026-04-12T12:55:00Z |
|
| 3 |
| value |
0.00585 |
| scoring_system |
epss |
| scoring_elements |
0.69053 |
| published_at |
2026-04-13T12:55:00Z |
|
| 4 |
| value |
0.00585 |
| scoring_system |
epss |
| scoring_elements |
0.69092 |
| published_at |
2026-04-16T12:55:00Z |
|
| 5 |
| value |
0.00585 |
| scoring_system |
epss |
| scoring_elements |
0.69004 |
| published_at |
2026-04-02T12:55:00Z |
|
| 6 |
| value |
0.00585 |
| scoring_system |
epss |
| scoring_elements |
0.69024 |
| published_at |
2026-04-04T12:55:00Z |
|
| 7 |
| value |
0.00585 |
| scoring_system |
epss |
| scoring_elements |
0.69005 |
| published_at |
2026-04-07T12:55:00Z |
|
| 8 |
| value |
0.00585 |
| scoring_system |
epss |
| scoring_elements |
0.69055 |
| published_at |
2026-04-08T12:55:00Z |
|
| 9 |
| value |
0.00585 |
| scoring_system |
epss |
| scoring_elements |
0.69074 |
| published_at |
2026-04-09T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2024-32491 |
|
| 1 |
| reference_url |
https://znuny.com |
| reference_id |
znuny.com |
| reference_type |
|
| scores |
| 0 |
| value |
9.8 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |
|
| 1 |
| value |
Track |
| scoring_system |
ssvc |
| scoring_elements |
SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-04-30T15:40:28Z/ |
|
|
| url |
https://znuny.com |
|
| 2 |
|
|
| fixed_packages |
|
| aliases |
CVE-2024-32491
|
| risk_score |
2.5 |
| exploitability |
0.5 |
| weighted_severity |
4.9 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-kr13-v6jr-5kg6 |
|
| 11 |
| url |
VCID-ndgh-dr9p-kqbu |
| vulnerability_id |
VCID-ndgh-dr9p-kqbu |
| summary |
An issue was discovered in Znuny LTS 6.5.1 through 6.5.7 and Znuny 7.0.1 through 7.0.16 where a logged-in agent is able to inject SQL in the draft form ID parameter of an AJAX request. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2024-32493 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00608 |
| scoring_system |
epss |
| scoring_elements |
0.6976 |
| published_at |
2026-04-18T12:55:00Z |
|
| 1 |
| value |
0.00608 |
| scoring_system |
epss |
| scoring_elements |
0.69739 |
| published_at |
2026-04-11T12:55:00Z |
|
| 2 |
| value |
0.00608 |
| scoring_system |
epss |
| scoring_elements |
0.69724 |
| published_at |
2026-04-12T12:55:00Z |
|
| 3 |
| value |
0.00608 |
| scoring_system |
epss |
| scoring_elements |
0.69711 |
| published_at |
2026-04-13T12:55:00Z |
|
| 4 |
| value |
0.00608 |
| scoring_system |
epss |
| scoring_elements |
0.69751 |
| published_at |
2026-04-16T12:55:00Z |
|
| 5 |
| value |
0.00608 |
| scoring_system |
epss |
| scoring_elements |
0.69655 |
| published_at |
2026-04-02T12:55:00Z |
|
| 6 |
| value |
0.00608 |
| scoring_system |
epss |
| scoring_elements |
0.69672 |
| published_at |
2026-04-04T12:55:00Z |
|
| 7 |
| value |
0.00608 |
| scoring_system |
epss |
| scoring_elements |
0.69649 |
| published_at |
2026-04-07T12:55:00Z |
|
| 8 |
| value |
0.00608 |
| scoring_system |
epss |
| scoring_elements |
0.69699 |
| published_at |
2026-04-08T12:55:00Z |
|
| 9 |
| value |
0.00608 |
| scoring_system |
epss |
| scoring_elements |
0.69716 |
| published_at |
2026-04-09T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2024-32493 |
|
| 1 |
| reference_url |
https://znuny.com |
| reference_id |
znuny.com |
| reference_type |
|
| scores |
| 0 |
| value |
8.8 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H |
|
| 1 |
| value |
Track |
| scoring_system |
ssvc |
| scoring_elements |
SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-30T14:46:04Z/ |
|
|
| url |
https://znuny.com |
|
| 2 |
|
|
| fixed_packages |
|
| aliases |
CVE-2024-32493
|
| risk_score |
2.2 |
| exploitability |
0.5 |
| weighted_severity |
4.4 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-ndgh-dr9p-kqbu |
|
| 12 |
| url |
VCID-qysv-aehy-d7ay |
| vulnerability_id |
VCID-qysv-aehy-d7ay |
| summary |
Improper Input Validation vulnerability in the ContentType parameter for attachments on TicketCreate or TicketUpdate operations of the OTRS Generic Interface modules allows any authenticated attacker to to perform an host header injection for the ContentType header of the attachment. This issue affects OTRS: from 7.0.X before 7.0.45, from 8.0.X before 8.0.35; ((OTRS)) Community Edition: from 6.0.1 through 6.0.34. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-38060 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00226 |
| scoring_system |
epss |
| scoring_elements |
0.45375 |
| published_at |
2026-04-18T12:55:00Z |
|
| 1 |
| value |
0.00233 |
| scoring_system |
epss |
| scoring_elements |
0.46117 |
| published_at |
2026-04-08T12:55:00Z |
|
| 2 |
| value |
0.00233 |
| scoring_system |
epss |
| scoring_elements |
0.46138 |
| published_at |
2026-04-11T12:55:00Z |
|
| 3 |
| value |
0.00233 |
| scoring_system |
epss |
| scoring_elements |
0.4611 |
| published_at |
2026-04-12T12:55:00Z |
|
| 4 |
| value |
0.00233 |
| scoring_system |
epss |
| scoring_elements |
0.46119 |
| published_at |
2026-04-13T12:55:00Z |
|
| 5 |
| value |
0.00233 |
| scoring_system |
epss |
| scoring_elements |
0.46176 |
| published_at |
2026-04-16T12:55:00Z |
|
| 6 |
| value |
0.00233 |
| scoring_system |
epss |
| scoring_elements |
0.46113 |
| published_at |
2026-04-04T12:55:00Z |
|
| 7 |
| value |
0.00233 |
| scoring_system |
epss |
| scoring_elements |
0.4606 |
| published_at |
2026-04-07T12:55:00Z |
|
| 8 |
| value |
0.00233 |
| scoring_system |
epss |
| scoring_elements |
0.46092 |
| published_at |
2026-04-02T12:55:00Z |
|
| 9 |
| value |
0.00233 |
| scoring_system |
epss |
| scoring_elements |
0.46114 |
| published_at |
2026-04-09T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-38060 |
|
| 1 |
|
| 2 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-38060
|
| risk_score |
2.9 |
| exploitability |
0.5 |
| weighted_severity |
5.7 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-qysv-aehy-d7ay |
|
| 13 |
| url |
VCID-s8fu-wpk4-3ycc |
| vulnerability_id |
VCID-s8fu-wpk4-3ycc |
| summary |
An issue was discovered in Znuny before 7.1.4. Permissions are not checked properly when using the Generic Interface to update ticket metadata. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2025-26846 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00404 |
| scoring_system |
epss |
| scoring_elements |
0.61011 |
| published_at |
2026-04-18T12:55:00Z |
|
| 1 |
| value |
0.00404 |
| scoring_system |
epss |
| scoring_elements |
0.60982 |
| published_at |
2026-04-12T12:55:00Z |
|
| 2 |
| value |
0.00404 |
| scoring_system |
epss |
| scoring_elements |
0.60963 |
| published_at |
2026-04-13T12:55:00Z |
|
| 3 |
| value |
0.00404 |
| scoring_system |
epss |
| scoring_elements |
0.61005 |
| published_at |
2026-04-16T12:55:00Z |
|
| 4 |
| value |
0.00404 |
| scoring_system |
epss |
| scoring_elements |
0.60916 |
| published_at |
2026-04-02T12:55:00Z |
|
| 5 |
| value |
0.00404 |
| scoring_system |
epss |
| scoring_elements |
0.60945 |
| published_at |
2026-04-04T12:55:00Z |
|
| 6 |
| value |
0.00404 |
| scoring_system |
epss |
| scoring_elements |
0.6091 |
| published_at |
2026-04-07T12:55:00Z |
|
| 7 |
| value |
0.00404 |
| scoring_system |
epss |
| scoring_elements |
0.60959 |
| published_at |
2026-04-08T12:55:00Z |
|
| 8 |
| value |
0.00404 |
| scoring_system |
epss |
| scoring_elements |
0.60975 |
| published_at |
2026-04-09T12:55:00Z |
|
| 9 |
| value |
0.00404 |
| scoring_system |
epss |
| scoring_elements |
0.60997 |
| published_at |
2026-04-11T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2025-26846 |
|
| 1 |
| reference_url |
https://www.znuny.com |
| reference_id |
www.znuny.com |
| reference_type |
|
| scores |
| 0 |
| value |
9.8 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |
|
| 1 |
| value |
Track |
| scoring_system |
ssvc |
| scoring_elements |
SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-05-12T21:50:36Z/ |
|
|
| url |
https://www.znuny.com |
|
| 2 |
|
|
| fixed_packages |
|
| aliases |
CVE-2025-26846
|
| risk_score |
2.5 |
| exploitability |
0.5 |
| weighted_severity |
4.9 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-s8fu-wpk4-3ycc |
|
| 14 |
| url |
VCID-u3ed-wmjx-9fcq |
| vulnerability_id |
VCID-u3ed-wmjx-9fcq |
| summary |
Generated Support Bundles contains private S/MIME and PGP keys if containing folder is not hidden. This issue affects: OTRS AG ((OTRS)) Community Edition 6.0.x version 6.0.1 and later versions. OTRS AG OTRS 7.0.x version 7.0.27 and prior versions; 8.0.x version 8.0.14 and prior versions. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2021-21440 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00179 |
| scoring_system |
epss |
| scoring_elements |
0.394 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00179 |
| scoring_system |
epss |
| scoring_elements |
0.39563 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00179 |
| scoring_system |
epss |
| scoring_elements |
0.39586 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00179 |
| scoring_system |
epss |
| scoring_elements |
0.39501 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00179 |
| scoring_system |
epss |
| scoring_elements |
0.39556 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00179 |
| scoring_system |
epss |
| scoring_elements |
0.39572 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00179 |
| scoring_system |
epss |
| scoring_elements |
0.39582 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00179 |
| scoring_system |
epss |
| scoring_elements |
0.39544 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00179 |
| scoring_system |
epss |
| scoring_elements |
0.39528 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.00179 |
| scoring_system |
epss |
| scoring_elements |
0.39578 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.00179 |
| scoring_system |
epss |
| scoring_elements |
0.39549 |
| published_at |
2026-04-18T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2021-21440 |
|
| 1 |
|
| 2 |
|
|
| fixed_packages |
|
| aliases |
CVE-2021-21440
|
| risk_score |
null |
| exploitability |
0.5 |
| weighted_severity |
0.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-u3ed-wmjx-9fcq |
|
| 15 |
| url |
VCID-u8xm-v9ek-yuar |
| vulnerability_id |
VCID-u8xm-v9ek-yuar |
| summary |
There is a XSS vulnerability in the ticket overview screens. It's possible to collect various information by having an e-mail shown in the overview screen. Attack can be performed by sending specially crafted e-mail to the system and it doesn't require any user intraction. This issue affects: OTRS AG ((OTRS)) Community Edition 6.0.x version 6.0.1 and later versions. OTRS AG OTRS 7.0.x version 7.0.26 and prior versions. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2021-21441 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00296 |
| scoring_system |
epss |
| scoring_elements |
0.52823 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00296 |
| scoring_system |
epss |
| scoring_elements |
0.5285 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00296 |
| scoring_system |
epss |
| scoring_elements |
0.52876 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00296 |
| scoring_system |
epss |
| scoring_elements |
0.52844 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00296 |
| scoring_system |
epss |
| scoring_elements |
0.52895 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00296 |
| scoring_system |
epss |
| scoring_elements |
0.52889 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00296 |
| scoring_system |
epss |
| scoring_elements |
0.52939 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00296 |
| scoring_system |
epss |
| scoring_elements |
0.52923 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00296 |
| scoring_system |
epss |
| scoring_elements |
0.52907 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.00296 |
| scoring_system |
epss |
| scoring_elements |
0.52944 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.00296 |
| scoring_system |
epss |
| scoring_elements |
0.52951 |
| published_at |
2026-04-18T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2021-21441 |
|
| 1 |
|
| 2 |
|
|
| fixed_packages |
|
| aliases |
CVE-2021-21441
|
| risk_score |
null |
| exploitability |
0.5 |
| weighted_severity |
0.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-u8xm-v9ek-yuar |
|
| 16 |
| url |
VCID-x1sc-wvc6-a3hz |
| vulnerability_id |
VCID-x1sc-wvc6-a3hz |
| summary |
Znuny before LTS 6.5.1 through 6.5.10 and 7.0.1 through 7.0.16 allows DoS/ReDos via email. Parsing the content of emails where HTML code is copied from Microsoft Word could lead to high CPU usage and block the parsing process. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2024-48938 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00699 |
| scoring_system |
epss |
| scoring_elements |
0.72013 |
| published_at |
2026-04-18T12:55:00Z |
|
| 1 |
| value |
0.00699 |
| scoring_system |
epss |
| scoring_elements |
0.71961 |
| published_at |
2026-04-08T12:55:00Z |
|
| 2 |
| value |
0.00699 |
| scoring_system |
epss |
| scoring_elements |
0.71973 |
| published_at |
2026-04-09T12:55:00Z |
|
| 3 |
| value |
0.00699 |
| scoring_system |
epss |
| scoring_elements |
0.71997 |
| published_at |
2026-04-11T12:55:00Z |
|
| 4 |
| value |
0.00699 |
| scoring_system |
epss |
| scoring_elements |
0.71981 |
| published_at |
2026-04-12T12:55:00Z |
|
| 5 |
| value |
0.00699 |
| scoring_system |
epss |
| scoring_elements |
0.71965 |
| published_at |
2026-04-13T12:55:00Z |
|
| 6 |
| value |
0.00699 |
| scoring_system |
epss |
| scoring_elements |
0.72006 |
| published_at |
2026-04-16T12:55:00Z |
|
| 7 |
| value |
0.00699 |
| scoring_system |
epss |
| scoring_elements |
0.71926 |
| published_at |
2026-04-02T12:55:00Z |
|
| 8 |
| value |
0.00699 |
| scoring_system |
epss |
| scoring_elements |
0.71945 |
| published_at |
2026-04-04T12:55:00Z |
|
| 9 |
| value |
0.00699 |
| scoring_system |
epss |
| scoring_elements |
0.71922 |
| published_at |
2026-04-07T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2024-48938 |
|
| 1 |
|
| 2 |
| reference_url |
https://www.znuny.com |
| reference_id |
www.znuny.com |
| reference_type |
|
| scores |
| 0 |
| value |
7.5 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H |
|
| 1 |
| value |
Track |
| scoring_system |
ssvc |
| scoring_elements |
SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:44:51Z/ |
|
|
| url |
https://www.znuny.com |
|
| 3 |
|
|
| fixed_packages |
|
| aliases |
CVE-2024-48938
|
| risk_score |
1.9 |
| exploitability |
0.5 |
| weighted_severity |
3.8 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-x1sc-wvc6-a3hz |
|
| 17 |
| url |
VCID-yrdb-btgm-p3cd |
| vulnerability_id |
VCID-yrdb-btgm-p3cd |
| summary |
An Eval Injection issue was discovered in Znuny through 7.1.3. A user with write access to the configuration file can use this to execute a command executed by the user running the backup.pl script. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2025-26845 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.0041 |
| scoring_system |
epss |
| scoring_elements |
0.61379 |
| published_at |
2026-04-18T12:55:00Z |
|
| 1 |
| value |
0.0041 |
| scoring_system |
epss |
| scoring_elements |
0.61354 |
| published_at |
2026-04-12T12:55:00Z |
|
| 2 |
| value |
0.0041 |
| scoring_system |
epss |
| scoring_elements |
0.61336 |
| published_at |
2026-04-13T12:55:00Z |
|
| 3 |
| value |
0.0041 |
| scoring_system |
epss |
| scoring_elements |
0.61374 |
| published_at |
2026-04-16T12:55:00Z |
|
| 4 |
| value |
0.0041 |
| scoring_system |
epss |
| scoring_elements |
0.61289 |
| published_at |
2026-04-02T12:55:00Z |
|
| 5 |
| value |
0.0041 |
| scoring_system |
epss |
| scoring_elements |
0.61318 |
| published_at |
2026-04-04T12:55:00Z |
|
| 6 |
| value |
0.0041 |
| scoring_system |
epss |
| scoring_elements |
0.61286 |
| published_at |
2026-04-07T12:55:00Z |
|
| 7 |
| value |
0.0041 |
| scoring_system |
epss |
| scoring_elements |
0.61334 |
| published_at |
2026-04-08T12:55:00Z |
|
| 8 |
| value |
0.0041 |
| scoring_system |
epss |
| scoring_elements |
0.61349 |
| published_at |
2026-04-09T12:55:00Z |
|
| 9 |
| value |
0.0041 |
| scoring_system |
epss |
| scoring_elements |
0.61369 |
| published_at |
2026-04-11T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2025-26845 |
|
| 1 |
| reference_url |
https://www.znuny.com |
| reference_id |
www.znuny.com |
| reference_type |
|
| scores |
| 0 |
| value |
9.8 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |
|
| 1 |
| value |
Track |
| scoring_system |
ssvc |
| scoring_elements |
SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-05-08T18:45:30Z/ |
|
|
| url |
https://www.znuny.com |
|
| 2 |
|
|
| fixed_packages |
|
| aliases |
CVE-2025-26845
|
| risk_score |
2.5 |
| exploitability |
0.5 |
| weighted_severity |
4.9 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-yrdb-btgm-p3cd |
|