fkie_cve-2017-14635
Vulnerability from fkie_nvd
Published
2017-09-21 13:29
Modified
2025-04-20 01:37
Severity ?
Summary
In Open Ticket Request System (OTRS) 3.3.x before 3.3.18, 4.x before 4.0.25, and 5.x before 5.0.23, remote authenticated users can leverage statistics-write permissions to gain privileges via code injection.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
otrs | otrs | 3.3.0 | |
otrs | otrs | 3.3.0 | |
otrs | otrs | 3.3.0 | |
otrs | otrs | 3.3.0 | |
otrs | otrs | 3.3.0 | |
otrs | otrs | 3.3.0 | |
otrs | otrs | 3.3.0 | |
otrs | otrs | 3.3.1 | |
otrs | otrs | 3.3.2 | |
otrs | otrs | 3.3.3 | |
otrs | otrs | 3.3.4 | |
otrs | otrs | 3.3.5 | |
otrs | otrs | 3.3.6 | |
otrs | otrs | 3.3.7 | |
otrs | otrs | 3.3.8 | |
otrs | otrs | 3.3.9 | |
otrs | otrs | 3.3.10 | |
otrs | otrs | 3.3.11 | |
otrs | otrs | 3.3.12 | |
otrs | otrs | 3.3.13 | |
otrs | otrs | 3.3.14 | |
otrs | otrs | 3.3.15 | |
otrs | otrs | 3.3.16 | |
otrs | otrs | 3.3.17 | |
otrs | otrs | 4.0.0 | |
otrs | otrs | 4.0.0 | |
otrs | otrs | 4.0.0 | |
otrs | otrs | 4.0.0 | |
otrs | otrs | 4.0.0 | |
otrs | otrs | 4.0.0 | |
otrs | otrs | 4.0.1 | |
otrs | otrs | 4.0.2 | |
otrs | otrs | 4.0.3 | |
otrs | otrs | 4.0.4 | |
otrs | otrs | 4.0.5 | |
otrs | otrs | 4.0.6 | |
otrs | otrs | 4.0.7 | |
otrs | otrs | 4.0.8 | |
otrs | otrs | 4.0.9 | |
otrs | otrs | 4.0.10 | |
otrs | otrs | 4.0.11 | |
otrs | otrs | 4.0.12 | |
otrs | otrs | 4.0.13 | |
otrs | otrs | 4.0.14 | |
otrs | otrs | 4.0.15 | |
otrs | otrs | 4.0.16 | |
otrs | otrs | 4.0.17 | |
otrs | otrs | 4.0.18 | |
otrs | otrs | 4.0.19 | |
otrs | otrs | 4.0.20 | |
otrs | otrs | 4.0.21 | |
otrs | otrs | 4.0.22 | |
otrs | otrs | 4.0.23 | |
otrs | otrs | 4.0.24 | |
otrs | otrs | 5.0.0 | |
otrs | otrs | 5.0.0 | |
otrs | otrs | 5.0.0 | |
otrs | otrs | 5.0.0 | |
otrs | otrs | 5.0.0 | |
otrs | otrs | 5.0.0 | |
otrs | otrs | 5.0.1 | |
otrs | otrs | 5.0.2 | |
otrs | otrs | 5.0.3 | |
otrs | otrs | 5.0.4 | |
otrs | otrs | 5.0.5 | |
otrs | otrs | 5.0.6 | |
otrs | otrs | 5.0.7 | |
otrs | otrs | 5.0.8 | |
otrs | otrs | 5.0.9 | |
otrs | otrs | 5.0.10 | |
otrs | otrs | 5.0.11 | |
otrs | otrs | 5.0.12 | |
otrs | otrs | 5.0.13 | |
otrs | otrs | 5.0.14 | |
otrs | otrs | 5.0.15 | |
otrs | otrs | 5.0.16 | |
otrs | otrs | 5.0.17 | |
otrs | otrs | 5.0.18 | |
otrs | otrs | 5.0.19 | |
otrs | otrs | 5.0.20 | |
otrs | otrs | 5.0.21 | |
otrs | otrs | 5.0.22 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:otrs:otrs:3.3.0:*:*:*:*:*:*:*", "matchCriteriaId": "4B4C9653-D2B6-4A2E-A1E3-59D9E47D4F4D", "vulnerable": true }, { "criteria": "cpe:2.3:a:otrs:otrs:3.3.0:beta1:*:*:*:*:*:*", "matchCriteriaId": "F950A3B9-9347-4271-9AE2-816BB37F2FF2", "vulnerable": true }, { "criteria": "cpe:2.3:a:otrs:otrs:3.3.0:beta2:*:*:*:*:*:*", "matchCriteriaId": "78F12260-F695-492E-9F93-34873E8CD42B", "vulnerable": true }, { "criteria": "cpe:2.3:a:otrs:otrs:3.3.0:beta3:*:*:*:*:*:*", "matchCriteriaId": "2CFBFFA0-A57E-44A8-9D37-25AD4D0D36F1", "vulnerable": true }, { "criteria": "cpe:2.3:a:otrs:otrs:3.3.0:beta4:*:*:*:*:*:*", "matchCriteriaId": "C2ACF399-6BD0-4753-A8FA-A7031C5E898D", "vulnerable": true }, { "criteria": "cpe:2.3:a:otrs:otrs:3.3.0:beta5:*:*:*:*:*:*", "matchCriteriaId": "E314819D-7CF9-4DCC-8007-CFE73F3138A3", "vulnerable": true }, { "criteria": "cpe:2.3:a:otrs:otrs:3.3.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "1D286118-DA1F-43A4-9B0B-9A340887EA88", "vulnerable": true }, { "criteria": "cpe:2.3:a:otrs:otrs:3.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "82E2C445-2CC0-4F4E-BF4E-C2987E273448", "vulnerable": true }, { "criteria": "cpe:2.3:a:otrs:otrs:3.3.2:*:*:*:*:*:*:*", "matchCriteriaId": "DAB02A9C-AE23-4DF6-88E7-A606A3483036", "vulnerable": true }, { "criteria": "cpe:2.3:a:otrs:otrs:3.3.3:*:*:*:*:*:*:*", "matchCriteriaId": "D1AEB95F-BF0E-42DE-BB47-3CB10BB27DA7", "vulnerable": true }, { "criteria": "cpe:2.3:a:otrs:otrs:3.3.4:*:*:*:*:*:*:*", "matchCriteriaId": "88AAC1C3-14CE-41F9-A371-769BEF17551E", "vulnerable": true }, { "criteria": "cpe:2.3:a:otrs:otrs:3.3.5:*:*:*:*:*:*:*", "matchCriteriaId": "4CB04AB6-A380-4620-A196-A295FE7C170D", "vulnerable": true }, { "criteria": "cpe:2.3:a:otrs:otrs:3.3.6:*:*:*:*:*:*:*", "matchCriteriaId": "AB92BA3D-0A1A-47A9-ABFE-04D66F6BE7A7", "vulnerable": true }, { "criteria": "cpe:2.3:a:otrs:otrs:3.3.7:*:*:*:*:*:*:*", "matchCriteriaId": "E537B043-413F-4EA3-A6E5-8711DA1C53FC", "vulnerable": true }, { "criteria": "cpe:2.3:a:otrs:otrs:3.3.8:*:*:*:*:*:*:*", "matchCriteriaId": "C6931F41-690F-4B4C-A637-FBB18DB0895B", "vulnerable": true }, { "criteria": "cpe:2.3:a:otrs:otrs:3.3.9:*:*:*:*:*:*:*", "matchCriteriaId": "454607A9-6CAA-49F1-81D6-A2D1CC468C4D", "vulnerable": true }, { "criteria": "cpe:2.3:a:otrs:otrs:3.3.10:*:*:*:*:*:*:*", "matchCriteriaId": "ED8FD518-C35A-4E90-A8DB-F716F30614F5", "vulnerable": true }, { "criteria": "cpe:2.3:a:otrs:otrs:3.3.11:*:*:*:*:*:*:*", "matchCriteriaId": "75DAA2B2-9A7B-4948-BA48-3AFC5688DD57", "vulnerable": true }, { "criteria": "cpe:2.3:a:otrs:otrs:3.3.12:*:*:*:*:*:*:*", "matchCriteriaId": "CDC9ADBF-6530-4135-8481-7B12DAA86479", "vulnerable": true }, { "criteria": "cpe:2.3:a:otrs:otrs:3.3.13:*:*:*:*:*:*:*", "matchCriteriaId": "64505573-B426-4E5A-9182-FD716E009351", "vulnerable": true }, { "criteria": "cpe:2.3:a:otrs:otrs:3.3.14:*:*:*:*:*:*:*", "matchCriteriaId": "55560A17-9FCD-4AD4-9339-B6472D89520F", "vulnerable": true }, { "criteria": "cpe:2.3:a:otrs:otrs:3.3.15:*:*:*:*:*:*:*", "matchCriteriaId": "8FF1A81F-89F3-4F0A-A04F-0DD461C433EE", "vulnerable": true }, { "criteria": "cpe:2.3:a:otrs:otrs:3.3.16:*:*:*:*:*:*:*", "matchCriteriaId": "C9677F3F-8EF5-40C0-8CDD-DB9B03BDD175", "vulnerable": true }, { "criteria": "cpe:2.3:a:otrs:otrs:3.3.17:*:*:*:*:*:*:*", "matchCriteriaId": "27751304-9036-4710-B7A5-BEC55AF8B2C2", "vulnerable": true }, { "criteria": "cpe:2.3:a:otrs:otrs:4.0.0:beta1:*:*:*:*:*:*", "matchCriteriaId": "99632B5B-563F-434F-B49E-34EE29B6EAD1", "vulnerable": true }, { "criteria": "cpe:2.3:a:otrs:otrs:4.0.0:beta2:*:*:*:*:*:*", "matchCriteriaId": "8CBCC863-CE5B-43E2-8331-DDA8AE68E6E0", "vulnerable": true }, { "criteria": "cpe:2.3:a:otrs:otrs:4.0.0:beta3:*:*:*:*:*:*", "matchCriteriaId": "8C9CDD3C-6B34-4020-B692-CDE682254B64", "vulnerable": true }, { "criteria": "cpe:2.3:a:otrs:otrs:4.0.0:beta4:*:*:*:*:*:*", "matchCriteriaId": "46071699-8EA1-46BA-ADA1-5F572AF8EF18", "vulnerable": true }, { "criteria": "cpe:2.3:a:otrs:otrs:4.0.0:beta5:*:*:*:*:*:*", "matchCriteriaId": "D4AC339E-A6CC-4621-A4C4-6A39C30BCE3C", "vulnerable": true }, { "criteria": "cpe:2.3:a:otrs:otrs:4.0.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "68B923FE-6F43-44FA-8445-6019127DCA07", "vulnerable": true }, { "criteria": "cpe:2.3:a:otrs:otrs:4.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "CD316D98-1DC4-4DC7-A488-851E94CC5263", "vulnerable": true }, { "criteria": "cpe:2.3:a:otrs:otrs:4.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "8E9B81FE-4BA6-46B5-B390-1B05CB33C648", "vulnerable": true }, { "criteria": "cpe:2.3:a:otrs:otrs:4.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "5E38191D-DD62-476D-BB4A-80094B0FFD26", "vulnerable": true }, { "criteria": "cpe:2.3:a:otrs:otrs:4.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "875C5002-3E08-47A4-825C-282E6476507C", "vulnerable": true }, { "criteria": "cpe:2.3:a:otrs:otrs:4.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "CBE3222C-1C90-43D1-9E06-A9F867880900", "vulnerable": true }, { "criteria": "cpe:2.3:a:otrs:otrs:4.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "5A6257D3-FD70-486D-B11A-77FE5904FFFF", "vulnerable": true }, { "criteria": "cpe:2.3:a:otrs:otrs:4.0.7:*:*:*:*:*:*:*", "matchCriteriaId": "4CF6C894-111B-4432-B93B-989C8007CB6A", "vulnerable": true }, { "criteria": "cpe:2.3:a:otrs:otrs:4.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "CADCDD21-3665-4460-845F-DE9851607673", "vulnerable": true }, { "criteria": "cpe:2.3:a:otrs:otrs:4.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "DB52A359-2564-4E8D-929A-5402D04CDED0", "vulnerable": true }, { "criteria": "cpe:2.3:a:otrs:otrs:4.0.10:*:*:*:*:*:*:*", "matchCriteriaId": "7FE86BC8-E092-4436-B632-8D117980D242", "vulnerable": true }, { "criteria": "cpe:2.3:a:otrs:otrs:4.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "12C2FF70-9B69-43FD-872D-8E6F1CD59634", "vulnerable": true }, { "criteria": "cpe:2.3:a:otrs:otrs:4.0.12:*:*:*:*:*:*:*", "matchCriteriaId": "C2661294-7039-4C6A-8BFA-D790E93415C5", "vulnerable": true }, { "criteria": "cpe:2.3:a:otrs:otrs:4.0.13:*:*:*:*:*:*:*", "matchCriteriaId": "D9B3DBFC-A962-44C3-810D-A9538E328E64", "vulnerable": true }, { "criteria": "cpe:2.3:a:otrs:otrs:4.0.14:*:*:*:*:*:*:*", "matchCriteriaId": "51DFB908-1877-4C6F-BAFB-45B3B17CBE97", "vulnerable": true }, { "criteria": "cpe:2.3:a:otrs:otrs:4.0.15:*:*:*:*:*:*:*", "matchCriteriaId": "0B96AE1B-9B8B-40D9-99AA-797859FA0EFC", "vulnerable": true }, { "criteria": "cpe:2.3:a:otrs:otrs:4.0.16:*:*:*:*:*:*:*", "matchCriteriaId": "0B2C427B-DC2B-41F7-B3FC-BF0D51706F88", "vulnerable": true }, { "criteria": "cpe:2.3:a:otrs:otrs:4.0.17:*:*:*:*:*:*:*", "matchCriteriaId": "C1B4648D-E3C7-4C5D-897C-CC27F8082AC0", "vulnerable": true }, { "criteria": "cpe:2.3:a:otrs:otrs:4.0.18:*:*:*:*:*:*:*", "matchCriteriaId": "908263DC-2F85-4ED9-AF4A-884609B2A3F6", "vulnerable": true }, { "criteria": "cpe:2.3:a:otrs:otrs:4.0.19:*:*:*:*:*:*:*", "matchCriteriaId": "D5F64E91-CF0C-4C48-94F0-0474A3D484F5", "vulnerable": true }, { "criteria": "cpe:2.3:a:otrs:otrs:4.0.20:*:*:*:*:*:*:*", "matchCriteriaId": "974BFF95-01AC-454D-97CC-A82CA8823FFF", "vulnerable": true }, { "criteria": "cpe:2.3:a:otrs:otrs:4.0.21:*:*:*:*:*:*:*", "matchCriteriaId": "654C711F-2C10-4E7A-BFFF-9AD911576CDE", "vulnerable": true }, { "criteria": "cpe:2.3:a:otrs:otrs:4.0.22:*:*:*:*:*:*:*", "matchCriteriaId": "0CF723BA-E772-48F8-8B45-753CD372DCEE", "vulnerable": true }, { "criteria": "cpe:2.3:a:otrs:otrs:4.0.23:*:*:*:*:*:*:*", "matchCriteriaId": "A00DD7D5-EBB4-4E7F-8669-FA96FF9E6B6C", "vulnerable": true }, { "criteria": "cpe:2.3:a:otrs:otrs:4.0.24:*:*:*:*:*:*:*", "matchCriteriaId": "906E3FE6-2516-474C-9F91-539A77E0085C", "vulnerable": true }, { "criteria": "cpe:2.3:a:otrs:otrs:5.0.0:beta1:*:*:*:*:*:*", "matchCriteriaId": "CA73A62B-BFA7-4793-96E6-BB832418A259", "vulnerable": true }, { "criteria": "cpe:2.3:a:otrs:otrs:5.0.0:beta2:*:*:*:*:*:*", "matchCriteriaId": "DE138E72-61A0-4495-86CE-4342B93049CB", "vulnerable": true }, { "criteria": "cpe:2.3:a:otrs:otrs:5.0.0:beta3:*:*:*:*:*:*", "matchCriteriaId": "C473A55A-677C-4D0B-9C0D-D1B3857AE8BA", "vulnerable": true }, { "criteria": "cpe:2.3:a:otrs:otrs:5.0.0:beta4:*:*:*:*:*:*", "matchCriteriaId": "D977D160-7B24-4ADD-9818-4C93A9E7D865", "vulnerable": true }, { "criteria": "cpe:2.3:a:otrs:otrs:5.0.0:beta5:*:*:*:*:*:*", "matchCriteriaId": "472ACCD4-1B3D-4468-B084-D4E98032FF5C", "vulnerable": true }, { "criteria": "cpe:2.3:a:otrs:otrs:5.0.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "8838C987-53ED-4E05-99D1-57A56A899C5D", "vulnerable": true }, { "criteria": "cpe:2.3:a:otrs:otrs:5.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "A5C00BB3-3349-4DB3-B753-B36B88E1B9B2", "vulnerable": true }, { "criteria": "cpe:2.3:a:otrs:otrs:5.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "0D567DC5-332F-4F95-BA0B-B076661AB14D", "vulnerable": true }, { "criteria": "cpe:2.3:a:otrs:otrs:5.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "8361E43E-9140-49DC-9F06-865BDFC3A60E", "vulnerable": true }, { "criteria": "cpe:2.3:a:otrs:otrs:5.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "00DF625C-C5B1-4B7F-BDB4-34F751093104", "vulnerable": true }, { "criteria": "cpe:2.3:a:otrs:otrs:5.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "0124AD54-B58F-4D36-B45F-B836C321067F", "vulnerable": true }, { "criteria": "cpe:2.3:a:otrs:otrs:5.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "8D36D023-BE8C-47EF-934E-4E808FA3C0D5", "vulnerable": true }, { "criteria": "cpe:2.3:a:otrs:otrs:5.0.7:*:*:*:*:*:*:*", "matchCriteriaId": "56D7CD3E-A98A-4FBD-B267-E69E1711B741", "vulnerable": true }, { "criteria": "cpe:2.3:a:otrs:otrs:5.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "08621604-0098-45F9-9684-85973F4C3058", "vulnerable": true }, { "criteria": "cpe:2.3:a:otrs:otrs:5.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "2209CD7C-0539-4A36-B40A-D437F6926444", "vulnerable": true }, { "criteria": "cpe:2.3:a:otrs:otrs:5.0.10:*:*:*:*:*:*:*", "matchCriteriaId": "6F821217-A3A1-4CAC-9904-80543FD17808", "vulnerable": true }, { "criteria": "cpe:2.3:a:otrs:otrs:5.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "5CE3BC26-B6CE-4A47-87EE-ABF098D0D553", "vulnerable": true }, { "criteria": "cpe:2.3:a:otrs:otrs:5.0.12:*:*:*:*:*:*:*", "matchCriteriaId": "2B352C86-4538-4266-8FDE-AA8F4FD173AA", "vulnerable": true }, { "criteria": "cpe:2.3:a:otrs:otrs:5.0.13:*:*:*:*:*:*:*", "matchCriteriaId": "E569B83B-4DDF-48FE-9143-57CE2D0EBA87", "vulnerable": true }, { "criteria": "cpe:2.3:a:otrs:otrs:5.0.14:*:*:*:*:*:*:*", "matchCriteriaId": "A54B103C-3B32-4BD9-BE83-6E8B8D43F51D", "vulnerable": true }, { "criteria": "cpe:2.3:a:otrs:otrs:5.0.15:*:*:*:*:*:*:*", "matchCriteriaId": "0052F432-313F-416F-A655-BB5E3E880915", "vulnerable": true }, { "criteria": "cpe:2.3:a:otrs:otrs:5.0.16:*:*:*:*:*:*:*", "matchCriteriaId": "36E464C4-60E9-43C5-A42E-371B332C859B", "vulnerable": true }, { "criteria": "cpe:2.3:a:otrs:otrs:5.0.17:*:*:*:*:*:*:*", "matchCriteriaId": "0B011E9D-C067-4362-9181-EB568C59944D", "vulnerable": true }, { "criteria": "cpe:2.3:a:otrs:otrs:5.0.18:*:*:*:*:*:*:*", "matchCriteriaId": "DB0FD254-B891-4911-9DBC-C55E67F13C4B", "vulnerable": true }, { "criteria": "cpe:2.3:a:otrs:otrs:5.0.19:*:*:*:*:*:*:*", "matchCriteriaId": "5FE23C83-B4A3-4996-82A5-E19D6D43E0B8", "vulnerable": true }, { "criteria": "cpe:2.3:a:otrs:otrs:5.0.20:*:*:*:*:*:*:*", "matchCriteriaId": "0BA401F3-9ADF-4725-825F-7E94AF6589BC", "vulnerable": true }, { "criteria": "cpe:2.3:a:otrs:otrs:5.0.21:*:*:*:*:*:*:*", "matchCriteriaId": "B91E306F-59EC-43AC-8208-38FBBB6D2989", "vulnerable": true }, { "criteria": "cpe:2.3:a:otrs:otrs:5.0.22:*:*:*:*:*:*:*", "matchCriteriaId": "0B0B0D2F-29F9-4648-BB4D-81A70E429872", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "In Open Ticket Request System (OTRS) 3.3.x before 3.3.18, 4.x before 4.0.25, and 5.x before 5.0.23, remote authenticated users can leverage statistics-write permissions to gain privileges via code injection." }, { "lang": "es", "value": "En OTRS (Open Ticket Request System) en versiones 3.3.x anteriores a la 3.3.18, 4.x anteriores a la 4.0.25 y 5.x anteriores a la 5.0.23, los usuarios autenticados remotos pueden utilizar los permisos de escritura de estad\u00edsticas para obtener privilegios mediante la inyecci\u00f3n de c\u00f3digo." } ], "id": "CVE-2017-14635", "lastModified": "2025-04-20T01:37:25.860", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2017-09-21T13:29:00.267", "references": [ { "source": "cve@mitre.org", "url": "https://www.debian.org/security/2017/dsa-4021" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://www.otrs.com/security-advisory-2017-04-security-update-otrs-versions/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://www.debian.org/security/2017/dsa-4021" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.otrs.com/security-advisory-2017-04-security-update-otrs-versions/" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-20" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…
Loading…