Lookup for vulnerabilities affecting packages.

Vulnerability_idVCID-qysv-aehy-d7ay
SummaryImproper Input Validation vulnerability in the ContentType parameter for attachments on TicketCreate or TicketUpdate operations of the OTRS Generic Interface modules allows any authenticated attacker to to perform an host header injection for the ContentType header of the attachment.  This issue affects OTRS: from 7.0.X before 7.0.45, from 8.0.X before 8.0.35; ((OTRS)) Community Edition: from 6.0.1 through 6.0.34.
Aliases
0
alias CVE-2023-38060
Fixed_packages
0
url pkg:deb/debian/znuny@6.5.3-1?distro=trixie
purl pkg:deb/debian/znuny@6.5.3-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/znuny@6.5.3-1%3Fdistro=trixie
1
url pkg:deb/debian/znuny@6.5.15-2~bpo12%2B1
purl pkg:deb/debian/znuny@6.5.15-2~bpo12%2B1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/znuny@6.5.15-2~bpo12%252B1
2
url pkg:deb/debian/znuny@6.5.15-2?distro=trixie
purl pkg:deb/debian/znuny@6.5.15-2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-4sdd-c9p8-3fac
1
vulnerability VCID-zd8d-c1nk-g7a4
2
vulnerability VCID-zhfb-ajkc-5uc4
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/znuny@6.5.15-2%3Fdistro=trixie
3
url pkg:deb/debian/znuny@6.5.19-1?distro=trixie
purl pkg:deb/debian/znuny@6.5.19-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/znuny@6.5.19-1%3Fdistro=trixie
Affected_packages
0
url pkg:deb/debian/znuny@6.5.1-1
purl pkg:deb/debian/znuny@6.5.1-1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-169g-wxmh-qqbw
1
vulnerability VCID-1mkr-c1ay-jygw
2
vulnerability VCID-2rbn-u9eg-sua7
3
vulnerability VCID-4sdd-c9p8-3fac
4
vulnerability VCID-cqx8-tegf-pfhh
5
vulnerability VCID-kfqh-mtw2-3feu
6
vulnerability VCID-kr13-v6jr-5kg6
7
vulnerability VCID-ndgh-dr9p-kqbu
8
vulnerability VCID-qysv-aehy-d7ay
9
vulnerability VCID-s8fu-wpk4-3ycc
10
vulnerability VCID-x1sc-wvc6-a3hz
11
vulnerability VCID-yrdb-btgm-p3cd
12
vulnerability VCID-zd8d-c1nk-g7a4
13
vulnerability VCID-zhfb-ajkc-5uc4
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/znuny@6.5.1-1
1
url pkg:deb/debian/znuny@6.5.1-1?distro=trixie
purl pkg:deb/debian/znuny@6.5.1-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-169g-wxmh-qqbw
1
vulnerability VCID-1mkr-c1ay-jygw
2
vulnerability VCID-2rbn-u9eg-sua7
3
vulnerability VCID-4sdd-c9p8-3fac
4
vulnerability VCID-cqx8-tegf-pfhh
5
vulnerability VCID-kfqh-mtw2-3feu
6
vulnerability VCID-kr13-v6jr-5kg6
7
vulnerability VCID-ndgh-dr9p-kqbu
8
vulnerability VCID-qysv-aehy-d7ay
9
vulnerability VCID-s8fu-wpk4-3ycc
10
vulnerability VCID-x1sc-wvc6-a3hz
11
vulnerability VCID-yrdb-btgm-p3cd
12
vulnerability VCID-zd8d-c1nk-g7a4
13
vulnerability VCID-zhfb-ajkc-5uc4
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/znuny@6.5.1-1%3Fdistro=trixie
References
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-38060
reference_id
reference_type
scores
0
value 0.00226
scoring_system epss
scoring_elements 0.45375
published_at 2026-04-18T12:55:00Z
1
value 0.00233
scoring_system epss
scoring_elements 0.46117
published_at 2026-04-08T12:55:00Z
2
value 0.00233
scoring_system epss
scoring_elements 0.46138
published_at 2026-04-11T12:55:00Z
3
value 0.00233
scoring_system epss
scoring_elements 0.4611
published_at 2026-04-12T12:55:00Z
4
value 0.00233
scoring_system epss
scoring_elements 0.46119
published_at 2026-04-13T12:55:00Z
5
value 0.00233
scoring_system epss
scoring_elements 0.46176
published_at 2026-04-16T12:55:00Z
6
value 0.00233
scoring_system epss
scoring_elements 0.46113
published_at 2026-04-04T12:55:00Z
7
value 0.00233
scoring_system epss
scoring_elements 0.4606
published_at 2026-04-07T12:55:00Z
8
value 0.00233
scoring_system epss
scoring_elements 0.46092
published_at 2026-04-02T12:55:00Z
9
value 0.00233
scoring_system epss
scoring_elements 0.46114
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-38060
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38060
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38060
2
reference_url https://otrs.com/release-notes/otrs-security-advisory-2023-04/
reference_id otrs-security-advisory-2023-04
reference_type
scores
0
value 6.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-17T13:01:31Z/
url https://otrs.com/release-notes/otrs-security-advisory-2023-04/
Weaknesses
0
cwe_id 20
name Improper Input Validation
description The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
Exploits
Severity_range_score6.3 - 6.3
Exploitability0.5
Weighted_severity5.7
Risk_score2.9
Resource_urlhttp://public2.vulnerablecode.io/vulnerabilities/VCID-qysv-aehy-d7ay