Search for packages
| purl | pkg:deb/debian/znuny@6.5.15-2?distro=trixie |
| Vulnerability | Summary | Fixed by |
|---|---|---|
|
VCID-4sdd-c9p8-3fac
Aliases: CVE-2025-52204 |
A Cross-Site Scripting (XSS) vulnerability exists in Znuny::ITSM 6.5.x in the customer.pl endpoint via the OTRSCustomerInterface parameter |
Affected by 0 other vulnerabilities. |
|
VCID-zd8d-c1nk-g7a4
Aliases: CVE-2025-3573 GHSA-rrj2-ph5q-jxw2 |
jquery-validation vulnerable to Cross-site Scripting Versions of the package jquery-validation before 1.20.0 are vulnerable to Cross-site Scripting (XSS) in the showLabel() function, which may take input from a user-controlled placeholder value. This value will populate a message via $.validator.messages in a user localizable dictionary. |
Affected by 0 other vulnerabilities. Affected by 0 other vulnerabilities. |
|
VCID-zhfb-ajkc-5uc4
Aliases: CVE-2025-59490 |
Affected by 0 other vulnerabilities. |
| Vulnerability | Summary | Aliases |
|---|---|---|
| VCID-12v6-61me-ffa1 | An issue was discovered in Znuny 7.0.1 through 7.0.16 where the ticket detail view in the customer front allows the execution of external JavaScript. |
CVE-2024-32492
|
| VCID-169g-wxmh-qqbw | Znuny before LTS 6.5.1 through 6.5.10 and 7.0.1 through 7.0.16 allows XSS. JavaScript code in the short description of the SLA field in Activity Dialogues is executed. |
CVE-2024-48937
|
| VCID-1mkr-c1ay-jygw | An issue was discovered in Znuny through 7.1.3. A cookie is set without the HttpOnly flag. |
CVE-2025-26844
|
| VCID-2rbn-u9eg-sua7 | An issue was discovered in Znuny through 6.5.14 and 7.x through 7.1.6. Custom AJAX calls to the AgentPreferences UpdateAJAX subaction can be used to set user preferences with arbitrary keys. When fetching user data via GetUserData, these keys and values are retrieved and given as a whole to other function calls, which then might use these keys/values to affect permissions or other settings. |
CVE-2025-43926
|
| VCID-2yyp-zhcc-mbgq | Specially crafted string in OTRS system configuration can allow the execution of any system command. |
CVE-2021-36100
|
| VCID-57jx-quzh-fubc | Agents are able to list customer user emails without required permissions in the bulk action screen. This issue affects: OTRS AG ((OTRS)) Community Edition: 6.0.x version 6.0.1 and later versions. OTRS AG OTRS: 7.0.x versions prior to 7.0.27. |
CVE-2021-21443
|
| VCID-9431-8f5f-rfct | DoS attack can be performed when an email contains specially designed URL in the body. It can lead to the high CPU usage and cause low quality of service, or in extreme case bring the system to a halt. This issue affects: OTRS AG ((OTRS)) Community Edition 6.0.x version 6.0.1 and later versions. OTRS AG OTRS 7.0.x version 7.0.26 and prior versions; 8.0.x version 8.0.13 and prior versions. |
CVE-2021-21439
|
| VCID-cqx8-tegf-pfhh | An issue was discovered in Znuny through 7.1.3. If access to a ticket is not given, the content of S/MIME encrypted e-mail messages is visible to users with access to the CommunicationLog. |
CVE-2025-26842
|
| VCID-cx2r-g5rk-1yhn | Improper Input Validation vulnerability in OTRS AG OTRS, OTRS AG ((OTRS)) Community Edition allows SQL Injection via TicketSearch Webservice This issue affects OTRS: from 7.0.1 before 7.0.40 Patch 1, from 8.0.1 before 8.0.28 Patch 1; ((OTRS)) Community Edition: from 6.0.1 through 6.0.34. |
CVE-2022-4427
|
| VCID-kfqh-mtw2-3feu | An issue was discovered in Znuny before 7.1.5. When generating a support bundle, not all passwords are masked. |
CVE-2025-26847
|
| VCID-kr13-v6jr-5kg6 | An issue was discovered in Znuny and Znuny LTS 6.0.31 through 6.5.7 and Znuny 7.0.1 through 7.0.16 where a logged-in user can upload a file (via a manipulated AJAX Request) to an arbitrary writable location by traversing paths. Arbitrary code can be executed if this location is publicly available through the web server. |
CVE-2024-32491
|
| VCID-ndgh-dr9p-kqbu | An issue was discovered in Znuny LTS 6.5.1 through 6.5.7 and Znuny 7.0.1 through 7.0.16 where a logged-in agent is able to inject SQL in the draft form ID parameter of an AJAX request. |
CVE-2024-32493
|
| VCID-qysv-aehy-d7ay | Improper Input Validation vulnerability in the ContentType parameter for attachments on TicketCreate or TicketUpdate operations of the OTRS Generic Interface modules allows any authenticated attacker to to perform an host header injection for the ContentType header of the attachment. This issue affects OTRS: from 7.0.X before 7.0.45, from 8.0.X before 8.0.35; ((OTRS)) Community Edition: from 6.0.1 through 6.0.34. |
CVE-2023-38060
|
| VCID-s8fu-wpk4-3ycc | An issue was discovered in Znuny before 7.1.4. Permissions are not checked properly when using the Generic Interface to update ticket metadata. |
CVE-2025-26846
|
| VCID-u3ed-wmjx-9fcq | Generated Support Bundles contains private S/MIME and PGP keys if containing folder is not hidden. This issue affects: OTRS AG ((OTRS)) Community Edition 6.0.x version 6.0.1 and later versions. OTRS AG OTRS 7.0.x version 7.0.27 and prior versions; 8.0.x version 8.0.14 and prior versions. |
CVE-2021-21440
|
| VCID-u8xm-v9ek-yuar | There is a XSS vulnerability in the ticket overview screens. It's possible to collect various information by having an e-mail shown in the overview screen. Attack can be performed by sending specially crafted e-mail to the system and it doesn't require any user intraction. This issue affects: OTRS AG ((OTRS)) Community Edition 6.0.x version 6.0.1 and later versions. OTRS AG OTRS 7.0.x version 7.0.26 and prior versions. |
CVE-2021-21441
|
| VCID-x1sc-wvc6-a3hz | Znuny before LTS 6.5.1 through 6.5.10 and 7.0.1 through 7.0.16 allows DoS/ReDos via email. Parsing the content of emails where HTML code is copied from Microsoft Word could lead to high CPU usage and block the parsing process. |
CVE-2024-48938
|
| VCID-yrdb-btgm-p3cd | An Eval Injection issue was discovered in Znuny through 7.1.3. A user with write access to the configuration file can use this to execute a command executed by the user running the backup.pl script. |
CVE-2025-26845
|