Search for vulnerabilities
Vulnerability details: VCID-y19m-zquu-aaar
Vulnerability ID VCID-y19m-zquu-aaar
Aliases CVE-2010-4767
Summary Open Ticket Request System (OTRS) before 2.3.6 does not properly handle e-mail messages in which the From line contains UTF-8 characters associated with diacritical marks and an invalid charset, which allows remote attackers to cause a denial of service (duplicate tickets and duplicate auto-responses) by sending a crafted message to a POP3 mailbox.
Status Published
Exploitability 0.5
Weighted Severity 4.5
Risk 2.2
Affected and Fixed Packages Package Details
Weaknesses (1)
System Score Found at
epss 0.00325 https://api.first.org/data/v1/epss?cve=CVE-2010-4767
epss 0.00325 https://api.first.org/data/v1/epss?cve=CVE-2010-4767
epss 0.00325 https://api.first.org/data/v1/epss?cve=CVE-2010-4767
epss 0.00325 https://api.first.org/data/v1/epss?cve=CVE-2010-4767
epss 0.00325 https://api.first.org/data/v1/epss?cve=CVE-2010-4767
epss 0.00325 https://api.first.org/data/v1/epss?cve=CVE-2010-4767
epss 0.00325 https://api.first.org/data/v1/epss?cve=CVE-2010-4767
epss 0.00325 https://api.first.org/data/v1/epss?cve=CVE-2010-4767
epss 0.00325 https://api.first.org/data/v1/epss?cve=CVE-2010-4767
epss 0.00325 https://api.first.org/data/v1/epss?cve=CVE-2010-4767
epss 0.00325 https://api.first.org/data/v1/epss?cve=CVE-2010-4767
epss 0.00325 https://api.first.org/data/v1/epss?cve=CVE-2010-4767
epss 0.00325 https://api.first.org/data/v1/epss?cve=CVE-2010-4767
epss 0.00325 https://api.first.org/data/v1/epss?cve=CVE-2010-4767
epss 0.00325 https://api.first.org/data/v1/epss?cve=CVE-2010-4767
epss 0.00325 https://api.first.org/data/v1/epss?cve=CVE-2010-4767
epss 0.00474 https://api.first.org/data/v1/epss?cve=CVE-2010-4767
epss 0.00474 https://api.first.org/data/v1/epss?cve=CVE-2010-4767
epss 0.00474 https://api.first.org/data/v1/epss?cve=CVE-2010-4767
epss 0.00474 https://api.first.org/data/v1/epss?cve=CVE-2010-4767
epss 0.00474 https://api.first.org/data/v1/epss?cve=CVE-2010-4767
epss 0.00474 https://api.first.org/data/v1/epss?cve=CVE-2010-4767
epss 0.00474 https://api.first.org/data/v1/epss?cve=CVE-2010-4767
epss 0.00474 https://api.first.org/data/v1/epss?cve=CVE-2010-4767
epss 0.00474 https://api.first.org/data/v1/epss?cve=CVE-2010-4767
epss 0.00474 https://api.first.org/data/v1/epss?cve=CVE-2010-4767
epss 0.00474 https://api.first.org/data/v1/epss?cve=CVE-2010-4767
epss 0.00474 https://api.first.org/data/v1/epss?cve=CVE-2010-4767
epss 0.00474 https://api.first.org/data/v1/epss?cve=CVE-2010-4767
epss 0.00474 https://api.first.org/data/v1/epss?cve=CVE-2010-4767
epss 0.00474 https://api.first.org/data/v1/epss?cve=CVE-2010-4767
epss 0.00474 https://api.first.org/data/v1/epss?cve=CVE-2010-4767
epss 0.00474 https://api.first.org/data/v1/epss?cve=CVE-2010-4767
epss 0.00474 https://api.first.org/data/v1/epss?cve=CVE-2010-4767
epss 0.00474 https://api.first.org/data/v1/epss?cve=CVE-2010-4767
epss 0.00474 https://api.first.org/data/v1/epss?cve=CVE-2010-4767
epss 0.00474 https://api.first.org/data/v1/epss?cve=CVE-2010-4767
epss 0.00474 https://api.first.org/data/v1/epss?cve=CVE-2010-4767
epss 0.00474 https://api.first.org/data/v1/epss?cve=CVE-2010-4767
epss 0.00474 https://api.first.org/data/v1/epss?cve=CVE-2010-4767
epss 0.00474 https://api.first.org/data/v1/epss?cve=CVE-2010-4767
epss 0.00474 https://api.first.org/data/v1/epss?cve=CVE-2010-4767
epss 0.00474 https://api.first.org/data/v1/epss?cve=CVE-2010-4767
epss 0.00474 https://api.first.org/data/v1/epss?cve=CVE-2010-4767
epss 0.00474 https://api.first.org/data/v1/epss?cve=CVE-2010-4767
epss 0.00474 https://api.first.org/data/v1/epss?cve=CVE-2010-4767
epss 0.00474 https://api.first.org/data/v1/epss?cve=CVE-2010-4767
epss 0.00474 https://api.first.org/data/v1/epss?cve=CVE-2010-4767
epss 0.00474 https://api.first.org/data/v1/epss?cve=CVE-2010-4767
epss 0.00474 https://api.first.org/data/v1/epss?cve=CVE-2010-4767
epss 0.00474 https://api.first.org/data/v1/epss?cve=CVE-2010-4767
epss 0.00474 https://api.first.org/data/v1/epss?cve=CVE-2010-4767
epss 0.00474 https://api.first.org/data/v1/epss?cve=CVE-2010-4767
epss 0.00474 https://api.first.org/data/v1/epss?cve=CVE-2010-4767
epss 0.00474 https://api.first.org/data/v1/epss?cve=CVE-2010-4767
epss 0.00474 https://api.first.org/data/v1/epss?cve=CVE-2010-4767
epss 0.00474 https://api.first.org/data/v1/epss?cve=CVE-2010-4767
epss 0.00474 https://api.first.org/data/v1/epss?cve=CVE-2010-4767
epss 0.00474 https://api.first.org/data/v1/epss?cve=CVE-2010-4767
epss 0.00474 https://api.first.org/data/v1/epss?cve=CVE-2010-4767
epss 0.00474 https://api.first.org/data/v1/epss?cve=CVE-2010-4767
epss 0.00474 https://api.first.org/data/v1/epss?cve=CVE-2010-4767
epss 0.00474 https://api.first.org/data/v1/epss?cve=CVE-2010-4767
epss 0.00474 https://api.first.org/data/v1/epss?cve=CVE-2010-4767
epss 0.00474 https://api.first.org/data/v1/epss?cve=CVE-2010-4767
epss 0.00474 https://api.first.org/data/v1/epss?cve=CVE-2010-4767
epss 0.00474 https://api.first.org/data/v1/epss?cve=CVE-2010-4767
epss 0.00474 https://api.first.org/data/v1/epss?cve=CVE-2010-4767
epss 0.00474 https://api.first.org/data/v1/epss?cve=CVE-2010-4767
epss 0.00474 https://api.first.org/data/v1/epss?cve=CVE-2010-4767
epss 0.00474 https://api.first.org/data/v1/epss?cve=CVE-2010-4767
epss 0.00474 https://api.first.org/data/v1/epss?cve=CVE-2010-4767
epss 0.00474 https://api.first.org/data/v1/epss?cve=CVE-2010-4767
epss 0.00474 https://api.first.org/data/v1/epss?cve=CVE-2010-4767
epss 0.00474 https://api.first.org/data/v1/epss?cve=CVE-2010-4767
epss 0.00474 https://api.first.org/data/v1/epss?cve=CVE-2010-4767
epss 0.00474 https://api.first.org/data/v1/epss?cve=CVE-2010-4767
epss 0.00474 https://api.first.org/data/v1/epss?cve=CVE-2010-4767
epss 0.00474 https://api.first.org/data/v1/epss?cve=CVE-2010-4767
epss 0.00474 https://api.first.org/data/v1/epss?cve=CVE-2010-4767
epss 0.00474 https://api.first.org/data/v1/epss?cve=CVE-2010-4767
epss 0.00474 https://api.first.org/data/v1/epss?cve=CVE-2010-4767
epss 0.00474 https://api.first.org/data/v1/epss?cve=CVE-2010-4767
epss 0.00474 https://api.first.org/data/v1/epss?cve=CVE-2010-4767
epss 0.00474 https://api.first.org/data/v1/epss?cve=CVE-2010-4767
epss 0.00474 https://api.first.org/data/v1/epss?cve=CVE-2010-4767
epss 0.00474 https://api.first.org/data/v1/epss?cve=CVE-2010-4767
epss 0.00474 https://api.first.org/data/v1/epss?cve=CVE-2010-4767
epss 0.00474 https://api.first.org/data/v1/epss?cve=CVE-2010-4767
epss 0.00474 https://api.first.org/data/v1/epss?cve=CVE-2010-4767
epss 0.00521 https://api.first.org/data/v1/epss?cve=CVE-2010-4767
cvssv2 5.0 https://nvd.nist.gov/vuln/detail/CVE-2010-4767
Reference id Reference type URL
http://bugs.otrs.org/show_bug.cgi?id=3426
https://api.first.org/data/v1/epss?cve=CVE-2010-4767
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4767
http://source.otrs.org/viewvc.cgi/otrs/CHANGES?revision=1.1807
cpe:2.3:a:otrs:otrs:*:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:otrs:otrs:*:*:*:*:*:*:*:*
cpe:2.3:a:otrs:otrs:0.5:beta1:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:otrs:otrs:0.5:beta1:*:*:*:*:*:*
cpe:2.3:a:otrs:otrs:0.5:beta2:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:otrs:otrs:0.5:beta2:*:*:*:*:*:*
cpe:2.3:a:otrs:otrs:0.5:beta3:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:otrs:otrs:0.5:beta3:*:*:*:*:*:*
cpe:2.3:a:otrs:otrs:0.5:beta4:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:otrs:otrs:0.5:beta4:*:*:*:*:*:*
cpe:2.3:a:otrs:otrs:0.5:beta5:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:otrs:otrs:0.5:beta5:*:*:*:*:*:*
cpe:2.3:a:otrs:otrs:0.5:beta6:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:otrs:otrs:0.5:beta6:*:*:*:*:*:*
cpe:2.3:a:otrs:otrs:0.5:beta7:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:otrs:otrs:0.5:beta7:*:*:*:*:*:*
cpe:2.3:a:otrs:otrs:0.5:beta8:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:otrs:otrs:0.5:beta8:*:*:*:*:*:*
cpe:2.3:a:otrs:otrs:1.0.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:otrs:otrs:1.0.0:*:*:*:*:*:*:*
cpe:2.3:a:otrs:otrs:1.0.1:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:otrs:otrs:1.0.1:*:*:*:*:*:*:*
cpe:2.3:a:otrs:otrs:1.0.2:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:otrs:otrs:1.0.2:*:*:*:*:*:*:*
cpe:2.3:a:otrs:otrs:1.0:rc1:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:otrs:otrs:1.0:rc1:*:*:*:*:*:*
cpe:2.3:a:otrs:otrs:1.0:rc2:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:otrs:otrs:1.0:rc2:*:*:*:*:*:*
cpe:2.3:a:otrs:otrs:1.0:rc3:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:otrs:otrs:1.0:rc3:*:*:*:*:*:*
cpe:2.3:a:otrs:otrs:1.1.0:rc1:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:otrs:otrs:1.1.0:rc1:*:*:*:*:*:*
cpe:2.3:a:otrs:otrs:1.1.0:rc2:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:otrs:otrs:1.1.0:rc2:*:*:*:*:*:*
cpe:2.3:a:otrs:otrs:1.1.1:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:otrs:otrs:1.1.1:*:*:*:*:*:*:*
cpe:2.3:a:otrs:otrs:1.1.2:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:otrs:otrs:1.1.2:*:*:*:*:*:*:*
cpe:2.3:a:otrs:otrs:1.1.3:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:otrs:otrs:1.1.3:*:*:*:*:*:*:*
cpe:2.3:a:otrs:otrs:1.1.4:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:otrs:otrs:1.1.4:*:*:*:*:*:*:*
cpe:2.3:a:otrs:otrs:1.1:rc1:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:otrs:otrs:1.1:rc1:*:*:*:*:*:*
cpe:2.3:a:otrs:otrs:1.2.0:beta1:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:otrs:otrs:1.2.0:beta1:*:*:*:*:*:*
cpe:2.3:a:otrs:otrs:1.2.0:beta2:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:otrs:otrs:1.2.0:beta2:*:*:*:*:*:*
cpe:2.3:a:otrs:otrs:1.2.0:beta3:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:otrs:otrs:1.2.0:beta3:*:*:*:*:*:*
cpe:2.3:a:otrs:otrs:1.2.1:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:otrs:otrs:1.2.1:*:*:*:*:*:*:*
cpe:2.3:a:otrs:otrs:1.2.2:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:otrs:otrs:1.2.2:*:*:*:*:*:*:*
cpe:2.3:a:otrs:otrs:1.2.3:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:otrs:otrs:1.2.3:*:*:*:*:*:*:*
cpe:2.3:a:otrs:otrs:1.2.4:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:otrs:otrs:1.2.4:*:*:*:*:*:*:*
cpe:2.3:a:otrs:otrs:1.3.0:beta1:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:otrs:otrs:1.3.0:beta1:*:*:*:*:*:*
cpe:2.3:a:otrs:otrs:1.3.0:beta2:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:otrs:otrs:1.3.0:beta2:*:*:*:*:*:*
cpe:2.3:a:otrs:otrs:1.3.0:beta3:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:otrs:otrs:1.3.0:beta3:*:*:*:*:*:*
cpe:2.3:a:otrs:otrs:1.3.0:beta4:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:otrs:otrs:1.3.0:beta4:*:*:*:*:*:*
cpe:2.3:a:otrs:otrs:1.3.1:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:otrs:otrs:1.3.1:*:*:*:*:*:*:*
cpe:2.3:a:otrs:otrs:1.3.2:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:otrs:otrs:1.3.2:*:*:*:*:*:*:*
cpe:2.3:a:otrs:otrs:1.3.3:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:otrs:otrs:1.3.3:*:*:*:*:*:*:*
cpe:2.3:a:otrs:otrs:2.0.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:otrs:otrs:2.0.0:*:*:*:*:*:*:*
cpe:2.3:a:otrs:otrs:2.0.0:beta1:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:otrs:otrs:2.0.0:beta1:*:*:*:*:*:*
cpe:2.3:a:otrs:otrs:2.0.0:beta2:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:otrs:otrs:2.0.0:beta2:*:*:*:*:*:*
cpe:2.3:a:otrs:otrs:2.0.0:beta4:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:otrs:otrs:2.0.0:beta4:*:*:*:*:*:*
cpe:2.3:a:otrs:otrs:2.0.0:beta5:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:otrs:otrs:2.0.0:beta5:*:*:*:*:*:*
cpe:2.3:a:otrs:otrs:2.0.0:beta6:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:otrs:otrs:2.0.0:beta6:*:*:*:*:*:*
cpe:2.3:a:otrs:otrs:2.0.1:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:otrs:otrs:2.0.1:*:*:*:*:*:*:*
cpe:2.3:a:otrs:otrs:2.0.2:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:otrs:otrs:2.0.2:*:*:*:*:*:*:*
cpe:2.3:a:otrs:otrs:2.0.3:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:otrs:otrs:2.0.3:*:*:*:*:*:*:*
cpe:2.3:a:otrs:otrs:2.0.4:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:otrs:otrs:2.0.4:*:*:*:*:*:*:*
cpe:2.3:a:otrs:otrs:2.0.5:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:otrs:otrs:2.0.5:*:*:*:*:*:*:*
cpe:2.3:a:otrs:otrs:2.1.0:beta1:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:otrs:otrs:2.1.0:beta1:*:*:*:*:*:*
cpe:2.3:a:otrs:otrs:2.1.0:beta2:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:otrs:otrs:2.1.0:beta2:*:*:*:*:*:*
cpe:2.3:a:otrs:otrs:2.1.1:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:otrs:otrs:2.1.1:*:*:*:*:*:*:*
cpe:2.3:a:otrs:otrs:2.1.2:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:otrs:otrs:2.1.2:*:*:*:*:*:*:*
cpe:2.3:a:otrs:otrs:2.1.3:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:otrs:otrs:2.1.3:*:*:*:*:*:*:*
cpe:2.3:a:otrs:otrs:2.1.4:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:otrs:otrs:2.1.4:*:*:*:*:*:*:*
cpe:2.3:a:otrs:otrs:2.1.5:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:otrs:otrs:2.1.5:*:*:*:*:*:*:*
cpe:2.3:a:otrs:otrs:2.1.6:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:otrs:otrs:2.1.6:*:*:*:*:*:*:*
cpe:2.3:a:otrs:otrs:2.1.7:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:otrs:otrs:2.1.7:*:*:*:*:*:*:*
cpe:2.3:a:otrs:otrs:2.1.8:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:otrs:otrs:2.1.8:*:*:*:*:*:*:*
cpe:2.3:a:otrs:otrs:2.1.9:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:otrs:otrs:2.1.9:*:*:*:*:*:*:*
cpe:2.3:a:otrs:otrs:2.2.0:beta1:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:otrs:otrs:2.2.0:beta1:*:*:*:*:*:*
cpe:2.3:a:otrs:otrs:2.2.0:beta2:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:otrs:otrs:2.2.0:beta2:*:*:*:*:*:*
cpe:2.3:a:otrs:otrs:2.2.0:beta3:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:otrs:otrs:2.2.0:beta3:*:*:*:*:*:*
cpe:2.3:a:otrs:otrs:2.2.0:beta4:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:otrs:otrs:2.2.0:beta4:*:*:*:*:*:*
cpe:2.3:a:otrs:otrs:2.2.0:rc1:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:otrs:otrs:2.2.0:rc1:*:*:*:*:*:*
cpe:2.3:a:otrs:otrs:2.2.1:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:otrs:otrs:2.2.1:*:*:*:*:*:*:*
cpe:2.3:a:otrs:otrs:2.2.2:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:otrs:otrs:2.2.2:*:*:*:*:*:*:*
cpe:2.3:a:otrs:otrs:2.2.3:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:otrs:otrs:2.2.3:*:*:*:*:*:*:*
cpe:2.3:a:otrs:otrs:2.2.4:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:otrs:otrs:2.2.4:*:*:*:*:*:*:*
cpe:2.3:a:otrs:otrs:2.2.5:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:otrs:otrs:2.2.5:*:*:*:*:*:*:*
cpe:2.3:a:otrs:otrs:2.2.6:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:otrs:otrs:2.2.6:*:*:*:*:*:*:*
cpe:2.3:a:otrs:otrs:2.2.7:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:otrs:otrs:2.2.7:*:*:*:*:*:*:*
cpe:2.3:a:otrs:otrs:2.2.8:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:otrs:otrs:2.2.8:*:*:*:*:*:*:*
cpe:2.3:a:otrs:otrs:2.2.9:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:otrs:otrs:2.2.9:*:*:*:*:*:*:*
cpe:2.3:a:otrs:otrs:2.3.0:beta1:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:otrs:otrs:2.3.0:beta1:*:*:*:*:*:*
cpe:2.3:a:otrs:otrs:2.3.0:beta2:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:otrs:otrs:2.3.0:beta2:*:*:*:*:*:*
cpe:2.3:a:otrs:otrs:2.3.0:beta3:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:otrs:otrs:2.3.0:beta3:*:*:*:*:*:*
cpe:2.3:a:otrs:otrs:2.3.0:beta4:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:otrs:otrs:2.3.0:beta4:*:*:*:*:*:*
cpe:2.3:a:otrs:otrs:2.3.0:rc1:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:otrs:otrs:2.3.0:rc1:*:*:*:*:*:*
cpe:2.3:a:otrs:otrs:2.3.1:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:otrs:otrs:2.3.1:*:*:*:*:*:*:*
cpe:2.3:a:otrs:otrs:2.3.2:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:otrs:otrs:2.3.2:*:*:*:*:*:*:*
cpe:2.3:a:otrs:otrs:2.3.3:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:otrs:otrs:2.3.3:*:*:*:*:*:*:*
cpe:2.3:a:otrs:otrs:2.3.4:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:otrs:otrs:2.3.4:*:*:*:*:*:*:*
CVE-2010-4767 https://nvd.nist.gov/vuln/detail/CVE-2010-4767
No exploits are available.
Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P Found at https://nvd.nist.gov/vuln/detail/CVE-2010-4767
Exploitability (E) Access Vector (AV) Access Complexity (AC) Authentication (Au) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

high

functional

unproven

proof_of_concept

not_defined

local

adjacent_network

network

high

medium

low

multiple

single

none

none

partial

complete

none

partial

complete

none

partial

complete

Exploit Prediction Scoring System (EPSS)
Percentile 0.71304
EPSS Score 0.00325
Published At Nov. 1, 2024, midnight
Date Actor Action Source VulnerableCode Version
There are no relevant records.