Vulnerability   
Search   
    Search 324607 CVE descriptions
and 145615 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.1.1.2.2023.3551
Category:Debian Local Security Checks
Title:Debian: Security Advisory (DLA-3551-1)
Summary:The remote host is missing an update for the Debian 'otrs2' package(s) announced via the DLA-3551-1 advisory.
Description:Summary:
The remote host is missing an update for the Debian 'otrs2' package(s) announced via the DLA-3551-1 advisory.

Vulnerability Insight:
Multiple vulnerabilities were found in otrs2, the Open-Source Ticket Request System, which could lead to impersonation, denial of service, information disclosure, or execution of arbitrary code.

CVE-2019-11358

A Prototype Pollution vulnerability was discovered in OTRS' embedded jQuery 3.2.1 copy, which could allow sending drafted messages as wrong agent.

This vulnerability is also known as OSA-2020-05.

CVE-2019-12248

Matthias Terlinde discovered that when an attacker sends a malicious email to an OTRS system and a logged in agent user later quotes it, the email could cause the browser to load external image resources.

A new configuration setting Ticket::Frontend::BlockLoadingRemoteContent has been added as part of the fix. It controls whether external content should be loaded, and it is disabled by default.

This vulnerability is also known as OSA-2019-08.

CVE-2019-12497

Jens Meister discovered that in the customer or external frontend, personal information of agents, like Name and mail address in external notes, could be disclosed.

New configuration settings Ticket::Frontend::CustomerTicketZoom###DisplayNoteFrom has been added as part of the fix. It controls if agent information should be displayed in external note sender field, or be substituted with a different generic name. Another option named Ticket::Frontend::CustomerTicketZoom###DefaultAgentName can then be used to define the generic agent name used in the latter case. By default, previous behavior is preserved, in which agent information is divulged in the external note From field, for the sake of backwards compatibility.

This vulnerability is also known as OSA-2019-09.

CVE-2019-12746

A user logged into OTRS as an agent might unknowingly disclose their session ID by sharing the link of an embedded ticket article with third parties. This identifier can be then potentially abused in order to impersonate the agent user.

This vulnerability is also known as OSA-2019-10.

CVE-2019-13458

An attacker who is logged into OTRS as an agent user with appropriate permissions can leverage OTRS tags in templates in order to disclose hashed user passwords.

This vulnerability is also known as OSA-2019-12.

CVE-2019-16375

An attacker who is logged into OTRS as an agent or customer user with appropriate permissions can create a carefully crafted string containing malicious JavaScript code as an article body. This malicious code is executed when an agent compose an answer to the original article.

This vulnerability is also known as OSA-2019-13.

CVE-2019-18179

An attacker who is logged into OTRS as an agent is able to list tickets assigned to other agents, which are in the queue where attacker doesn't have permissions.

This vulnerability is also known as OSA-2019-14.

CVE-2019-18180

OTRS can be put into an endless loop by providing filenames with overly long extensions. This applies to the PostMaster (sending in ... [Please see the references for more information on the vulnerabilities]

Affected Software/OS:
'otrs2' package(s) on Debian 10.

Solution:
Please install the updated package(s).

CVSS Score:
9.0

CVSS Vector:
AV:N/AC:L/Au:S/C:C/I:C/A:C

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2019-11358
BugTraq ID: 108023
http://www.securityfocus.com/bid/108023
Bugtraq: 20190421 [SECURITY] [DSA 4434-1] drupal7 security update (Google Search)
https://seclists.org/bugtraq/2019/Apr/32
Bugtraq: 20190509 dotCMS v5.1.1 Vulnerabilities (Google Search)
https://seclists.org/bugtraq/2019/May/18
Bugtraq: 20190612 [SECURITY] [DSA 4460-1] mediawiki security update (Google Search)
https://seclists.org/bugtraq/2019/Jun/12
https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44601
https://security.netapp.com/advisory/ntap-20190919-0001/
https://www.synology.com/security/advisory/Synology_SA_19_19
https://www.tenable.com/security/tns-2019-08
https://www.tenable.com/security/tns-2020-02
Debian Security Information: DSA-4434 (Google Search)
https://www.debian.org/security/2019/dsa-4434
Debian Security Information: DSA-4460 (Google Search)
https://www.debian.org/security/2019/dsa-4460
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4UOAZIFCSZ3ENEFOR5IXX6NFAD3HV7FA/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RLXRX23725JL366CNZGJZ7AQQB7LHQ6F/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KYH3OAGR2RTCHRA5NOKX2TES7SNQMWGO/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QV3PKZC3PQCO3273HAT76PAQZFBEO4KP/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5IABSKTYZ5JUGL735UKGXL5YPRYOPUYI/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WZW27UCJ5CYFL4KFFFMYMIBNMIU2ALG5/
http://seclists.org/fulldisclosure/2019/May/13
http://seclists.org/fulldisclosure/2019/May/11
http://seclists.org/fulldisclosure/2019/May/10
http://packetstormsecurity.com/files/152787/dotCMS-5.1.1-Vulnerable-Dependencies.html
http://packetstormsecurity.com/files/153237/RetireJS-CORS-Issue-Script-Execution.html
http://packetstormsecurity.com/files/156743/OctoberCMS-Insecure-Dependencies.html
https://supportportal.juniper.net/s/article/2021-07-Security-Bulletin-Junos-OS-Multiple-J-Web-vulnerabilities-resolved-in-Junos-OS-21-2R1
https://backdropcms.org/security/backdrop-sa-core-2019-009
https://blog.jquery.com/2019/04/10/jquery-3-4-0-released/
https://github.com/jquery/jquery/commit/753d591aea698e57d6db58c9f722cd0808619b1b
https://github.com/jquery/jquery/pull/4333
https://snyk.io/vuln/SNYK-JS-JQUERY-174006
https://www.drupal.org/sa-core-2019-006
https://www.oracle.com//security-alerts/cpujul2021.html
https://www.oracle.com/security-alerts/cpuApr2021.html
https://www.oracle.com/security-alerts/cpuapr2020.html
https://www.oracle.com/security-alerts/cpujan2020.html
https://www.oracle.com/security-alerts/cpujan2021.html
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.oracle.com/security-alerts/cpujul2020.html
https://www.oracle.com/security-alerts/cpuoct2020.html
https://www.oracle.com/security-alerts/cpuoct2021.html
https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html
https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html
https://www.privacy-wise.com/mitigating-cve-2019-11358-in-old-versions-of-jquery/
https://lists.apache.org/thread.html/6097cdbd6f0a337bedd9bb5cc441b2d525ff002a96531de367e4259f@%3Ccommits.airflow.apache.org%3E
https://lists.apache.org/thread.html/5928aa293e39d248266472210c50f176cac1535220f2486e6a7fa844@%3Ccommits.airflow.apache.org%3E
https://lists.apache.org/thread.html/88fb0362fd40e5b605ea8149f63241537b8b6fb5bfa315391fc5cbb7@%3Ccommits.airflow.apache.org%3E
https://lists.apache.org/thread.html/08720ef215ee7ab3386c05a1a90a7d1c852bf0706f176a7816bf65fc@%3Ccommits.airflow.apache.org%3E
https://lists.apache.org/thread.html/b736d0784cf02f5a30fbb4c5902762a15ad6d47e17e2c5a17b7d6205@%3Ccommits.airflow.apache.org%3E
https://lists.debian.org/debian-lts-announce/2019/05/msg00006.html
https://lists.debian.org/debian-lts-announce/2019/05/msg00029.html
https://lists.debian.org/debian-lts-announce/2020/02/msg00024.html
https://lists.debian.org/debian-lts-announce/2023/08/msg00040.html
https://lists.apache.org/thread.html/b0656d359c7d40ec9f39c8cc61bca66802ef9a2a12ee199f5b0c1442@%3Cdev.drill.apache.org%3E
https://lists.apache.org/thread.html/519eb0fd45642dcecd9ff74cb3e71c20a4753f7d82e2f07864b5108f@%3Cdev.drill.apache.org%3E
https://lists.apache.org/thread.html/f9bc3e55f4e28d1dcd1a69aae6d53e609a758e34d2869b4d798e13cc@%3Cissues.drill.apache.org%3E
https://lists.apache.org/thread.html/r7aac081cbddb6baa24b75e74abf0929bf309b176755a53e3ed810355@%3Cdev.flink.apache.org%3E
https://lists.apache.org/thread.html/rac25da84ecdcd36f6de5ad0d255f4e967209bbbebddb285e231da37d@%3Cissues.flink.apache.org%3E
https://lists.apache.org/thread.html/r41b5bfe009c845f67d4f68948cc9419ac2d62e287804aafd72892b08@%3Cissues.flink.apache.org%3E
https://lists.apache.org/thread.html/r2041a75d3fc09dec55adfd95d598b38d22715303f65c997c054844c9@%3Cissues.flink.apache.org%3E
https://lists.apache.org/thread.html/r7e8ebccb7c022e41295f6fdb7b971209b83702339f872ddd8cf8bf73@%3Cissues.flink.apache.org%3E
https://lists.apache.org/thread.html/r2baacab6e0acb5a2092eb46ae04fd6c3e8277b4fd79b1ffb7f3254fa@%3Cissues.flink.apache.org%3E
https://lists.apache.org/thread.html/bcce5a9c532b386c68dab2f6b3ce8b0cc9b950ec551766e76391caa3@%3Ccommits.nifi.apache.org%3E
https://lists.apache.org/thread.html/rca37935d661f4689cb4119f1b3b224413b22be161b678e6e6ce0c69b@%3Ccommits.nifi.apache.org%3E
http://www.openwall.com/lists/oss-security/2019/06/03/2
https://lists.apache.org/thread.html/ba79cf1658741e9f146e4c59b50aee56656ea95d841d358d006c18b6@%3Ccommits.roller.apache.org%3E
https://lists.apache.org/thread.html/r7d64895cc4dff84d0becfc572b20c0e4bf9bfa7b10c6f5f73e783734@%3Cdev.storm.apache.org%3E
https://lists.apache.org/thread.html/r38f0d1aa3c923c22977fe7376508f030f22e22c1379fbb155bf29766@%3Cdev.syncope.apache.org%3E
RedHat Security Advisories: RHBA-2019:1570
https://access.redhat.com/errata/RHBA-2019:1570
RedHat Security Advisories: RHSA-2019:1456
https://access.redhat.com/errata/RHSA-2019:1456
RedHat Security Advisories: RHSA-2019:2587
https://access.redhat.com/errata/RHSA-2019:2587
RedHat Security Advisories: RHSA-2019:3023
https://access.redhat.com/errata/RHSA-2019:3023
RedHat Security Advisories: RHSA-2019:3024
https://access.redhat.com/errata/RHSA-2019:3024
SuSE Security Announcement: openSUSE-SU-2019:1839 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00006.html
SuSE Security Announcement: openSUSE-SU-2019:1872 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00025.html
Common Vulnerability Exposure (CVE) ID: CVE-2019-12248
https://www.otrs.com/category/release-and-security-notes-en/
SuSE Security Announcement: openSUSE-SU-2020:0551 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00038.html
SuSE Security Announcement: openSUSE-SU-2020:1475 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00066.html
SuSE Security Announcement: openSUSE-SU-2020:1509 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00077.html
Common Vulnerability Exposure (CVE) ID: CVE-2019-12497
https://community.otrs.com/category/security-advisories-en/
Common Vulnerability Exposure (CVE) ID: CVE-2019-12746
Common Vulnerability Exposure (CVE) ID: CVE-2019-13458
Common Vulnerability Exposure (CVE) ID: CVE-2019-16375
Common Vulnerability Exposure (CVE) ID: CVE-2019-18179
https://community.otrs.com/security-advisory-2019-14-security-update-for-otrs-framework/
https://lists.debian.org/debian-lts-announce/2020/01/msg00000.html
Common Vulnerability Exposure (CVE) ID: CVE-2019-18180
Common Vulnerability Exposure (CVE) ID: CVE-2020-11022
https://github.com/jquery/jquery/security/advisories/GHSA-gxr4-xjj5-5px2
https://security.netapp.com/advisory/ntap-20200511-0006/
https://www.drupal.org/sa-core-2020-002
https://www.tenable.com/security/tns-2020-10
https://www.tenable.com/security/tns-2020-11
https://www.tenable.com/security/tns-2021-02
https://www.tenable.com/security/tns-2021-10
Debian Security Information: DSA-4693 (Google Search)
https://www.debian.org/security/2020/dsa-4693
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AVKYXLWCLZBV2N7M46KYK4LVA5OXWPBY/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VOE7P7APPRQKD4FGNHBKJPDY6FFCOH3W/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QPN2L2XVQGUA2V5HNQJWHK3APSK3VN7K/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SFP4UK4EGP4AFH2MWYJ5A5Z4I7XVFQ6B/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SAPQVX3XDNPGFT26QAQ6AJIXZZBZ4CD4/
https://security.gentoo.org/glsa/202007-03
http://packetstormsecurity.com/files/162159/jQuery-1.2-Cross-Site-Scripting.html
https://blog.jquery.com/2020/04/10/jquery-3-5-0-released/
https://github.com/jquery/jquery/commit/1d61fd9407e6fbe82fe55cb0b938307aa0791f77
https://jquery.com/upgrade-guide/3.5/
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.oracle.com/security-alerts/cpujul2022.html
https://lists.apache.org/thread.html/rdf44341677cf7eec7e9aa96dcf3f37ed709544863d619cca8c36f133@%3Ccommits.airflow.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/03/msg00033.html
https://lists.apache.org/thread.html/rbb448222ba62c430e21e13f940be4cb5cfc373cd3bce56b48c0ffa67@%3Cdev.flink.apache.org%3E
https://lists.apache.org/thread.html/r706cfbc098420f7113968cc377247ec3d1439bce42e679c11c609e2d@%3Cissues.flink.apache.org%3E
https://lists.apache.org/thread.html/r49ce4243b4738dd763caeb27fa8ad6afb426ae3e8c011ff00b8b1f48@%3Cissues.flink.apache.org%3E
https://lists.apache.org/thread.html/r564585d97bc069137e64f521e68ba490c7c9c5b342df5d73c49a0760@%3Cissues.flink.apache.org%3E
https://lists.apache.org/thread.html/r8f70b0f65d6bedf316ecd899371fd89e65333bc988f6326d2956735c@%3Cissues.flink.apache.org%3E
https://lists.apache.org/thread.html/rede9cfaa756e050a3d83045008f84a62802fc68c17f2b4eabeaae5e4@%3Cissues.flink.apache.org%3E
https://lists.apache.org/thread.html/ree3bd8ddb23df5fa4e372d11c226830ea3650056b1059f3965b3fce2@%3Cissues.flink.apache.org%3E
https://lists.apache.org/thread.html/r54565a8f025c7c4f305355fdfd75b68eca442eebdb5f31c2e7d977ae@%3Cissues.flink.apache.org%3E
https://lists.apache.org/thread.html/re4ae96fa5c1a2fe71ccbb7b7ac1538bd0cb677be270a2bf6e2f8d108@%3Cissues.flink.apache.org%3E
https://lists.apache.org/thread.html/r0483ba0072783c2e1bfea613984bfb3c86e73ba8879d780dc1cc7d36@%3Cissues.flink.apache.org%3E
SuSE Security Announcement: openSUSE-SU-2020:1060 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00067.html
SuSE Security Announcement: openSUSE-SU-2020:1106 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00085.html
SuSE Security Announcement: openSUSE-SU-2020:1888 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00039.html
Common Vulnerability Exposure (CVE) ID: CVE-2020-11023
https://github.com/jquery/jquery/security/advisories/GHSA-jpcq-cgw6-v4j6
http://packetstormsecurity.com/files/162160/jQuery-1.0.3-Cross-Site-Scripting.html
https://blog.jquery.com/2020/04/10/jquery-3-5-0-released
https://lists.apache.org/thread.html/r9006ad2abf81d02a0ef2126bab5177987e59095b7194a487c4ea247c@%3Ccommits.felix.apache.org%3E
https://lists.apache.org/thread.html/r07ab379471fb15644bf7a92e4a98cbc7df3cf4e736abae0cc7625fe6@%3Cdev.felix.apache.org%3E
https://lists.apache.org/thread.html/r3702ede0ff83a29ba3eb418f6f11c473d6e3736baba981a8dbd9c9ef@%3Cdev.felix.apache.org%3E
https://lists.apache.org/thread.html/rf0f8939596081d84be1ae6a91d6248b96a02d8388898c372ac807817@%3Cdev.felix.apache.org%3E
https://lists.apache.org/thread.html/r9e0bd31b7da9e7403478d22652b8760c946861f8ebd7bd750844898e@%3Cdev.felix.apache.org%3E
https://lists.apache.org/thread.html/r2c85121a47442036c7f8353a3724aa04f8ecdfda1819d311ba4f5330@%3Cdev.felix.apache.org%3E
https://lists.apache.org/thread.html/r4dba67be3239b34861f1b9cfdf9dfb3a90272585dcce374112ed6e16@%3Cdev.felix.apache.org%3E
https://lists.apache.org/thread.html/r55f5e066cc7301e3630ce90bbbf8d28c82212ae1f2d4871012141494@%3Cdev.felix.apache.org%3E
https://lists.apache.org/thread.html/rab82dd040f302018c85bd07d33f5604113573514895ada523c3401d9@%3Ccommits.hive.apache.org%3E
https://lists.apache.org/thread.html/rf661a90a15da8da5922ba6127b3f5f8194d4ebec8855d60a0dd13248@%3Cdev.hive.apache.org%3E
https://lists.apache.org/thread.html/ra3c9219fcb0b289e18e9ec5a5ebeaa5c17d6b79a201667675af6721c@%3Cgitbox.hive.apache.org%3E
https://lists.apache.org/thread.html/ra374bb0299b4aa3e04edde01ebc03ed6f90cf614dad40dd428ce8f72@%3Cgitbox.hive.apache.org%3E
https://lists.apache.org/thread.html/rb25c3bc7418ae75cba07988dafe1b6912f76a9dd7d94757878320d61@%3Cgitbox.hive.apache.org%3E
https://lists.apache.org/thread.html/rf1ba79e564fe7efc56aef7c986106f1cf67a3427d08e997e088e7a93@%3Cgitbox.hive.apache.org%3E
https://lists.apache.org/thread.html/ra32c7103ded9041c7c1cb8c12c8d125a6b2f3f3270e2937ef8417fac@%3Cgitbox.hive.apache.org%3E
https://lists.apache.org/thread.html/r1fed19c860a0d470f2a3eded12795772c8651ff583ef951ddac4918c@%3Cgitbox.hive.apache.org%3E
https://lists.apache.org/thread.html/r094f435595582f6b5b24b66fedf80543aa8b1d57a3688fbcc21f06ec@%3Cissues.hive.apache.org%3E
https://lists.apache.org/thread.html/r9c5fda81e4bca8daee305b4c03283dddb383ab8428a151d4cb0b3b15@%3Cissues.hive.apache.org%3E
https://lists.apache.org/thread.html/r6e97b37963926f6059ecc1e417721608723a807a76af41d4e9dbed49@%3Cissues.hive.apache.org%3E
https://lists.apache.org/thread.html/rb69b7d8217c1a6a2100247a5d06ce610836b31e3f5d73fc113ded8e7@%3Cissues.hive.apache.org%3E
https://lists.apache.org/thread.html/rd38b4185a797b324c8dd940d9213cf99fcdc2dbf1fc5a63ba7dee8c9@%3Cissues.hive.apache.org%3E
https://lists.apache.org/thread.html/radcb2aa874a79647789f3563fcbbceaf1045a029ee8806b59812a8ea@%3Cissues.hive.apache.org%3E
https://lists.apache.org/thread.html/r4aadb98086ca72ed75391f54167522d91489a0d0ae25b12baa8fc7c5@%3Cissues.hive.apache.org%3E
https://lists.apache.org/thread.html/ra406b3adfcffcb5ce8707013bdb7c35e3ffc2776a8a99022f15274c6@%3Cissues.hive.apache.org%3E
https://lists.apache.org/thread.html/r0593393ca1e97b1e7e098fe69d414d6bd0a467148e9138d07e86ebbb@%3Cissues.hive.apache.org%3E
https://lists.apache.org/thread.html/r6c4df3b33e625a44471009a172dabe6865faec8d8f21cac2303463b1@%3Cissues.hive.apache.org%3E
https://lists.apache.org/thread.html/rda99599896c3667f2cc9e9d34c7b6ef5d2bbed1f4801e1d75a2b0679@%3Ccommits.nifi.apache.org%3E
Common Vulnerability Exposure (CVE) ID: CVE-2020-1765
https://lists.debian.org/debian-lts-announce/2020/01/msg00027.html
Common Vulnerability Exposure (CVE) ID: CVE-2020-1766
Common Vulnerability Exposure (CVE) ID: CVE-2020-1767
Common Vulnerability Exposure (CVE) ID: CVE-2020-1769
https://otrs.com/release-notes/otrs-security-advisory-2020-06/
Common Vulnerability Exposure (CVE) ID: CVE-2020-1770
https://otrs.com/release-notes/otrs-security-advisory-2020-07/
https://lists.debian.org/debian-lts-announce/2020/05/msg00000.html
Common Vulnerability Exposure (CVE) ID: CVE-2020-1771
https://otrs.com/release-notes/otrs-security-advisory-2020-08/
Common Vulnerability Exposure (CVE) ID: CVE-2020-1772
https://otrs.com/release-notes/otrs-security-advisory-2020-09/
Common Vulnerability Exposure (CVE) ID: CVE-2020-1773
https://otrs.com/release-notes/otrs-security-advisory-2020-10/
Common Vulnerability Exposure (CVE) ID: CVE-2020-1774
Common Vulnerability Exposure (CVE) ID: CVE-2020-1776
https://otrs.com/release-notes/otrs-security-advisory-2020-13/
Common Vulnerability Exposure (CVE) ID: CVE-2021-21252
https://github.com/jquery-validation/jquery-validation/security/advisories/GHSA-jxwx-85vp-gvwm
https://github.com/jquery-validation/jquery-validation/commit/5d8f29eef363d043a8fec4eb86d42cadb5fa5f7d
https://github.com/jquery-validation/jquery-validation/pull/2371
https://www.npmjs.com/package/jquery-validation
Common Vulnerability Exposure (CVE) ID: CVE-2021-21439
https://otrs.com/release-notes/otrs-security-advisory-2021-09/
Common Vulnerability Exposure (CVE) ID: CVE-2021-21440
https://otrs.com/release-notes/otrs-security-advisory-2021-10/
Common Vulnerability Exposure (CVE) ID: CVE-2021-21441
https://otrs.com/release-notes/otrs-security-advisory-2021-11/
Common Vulnerability Exposure (CVE) ID: CVE-2021-21443
https://otrs.com/release-notes/otrs-security-advisory-2021-13/
Common Vulnerability Exposure (CVE) ID: CVE-2021-36091
https://otrs.com/release-notes/otrs-security-advisory-2021-14/
Common Vulnerability Exposure (CVE) ID: CVE-2021-36100
https://otrs.com/release-notes/otrs-security-advisory-2022-03/
Common Vulnerability Exposure (CVE) ID: CVE-2021-41182
FEDORA-2021-013ab302be
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NXIUUBRVLA4E7G7MMIKCEN75YN7UFERW/
FEDORA-2021-51c256bf87
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/O74SXYY7RGXREQDQUDQD4BPJ4QQTD2XQ/
FEDORA-2021-ab38307fc3
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SNXA7XRKGINWSUIPIZ6ZBCTV6N3KSHES/
FEDORA-2022-9d655503ea
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HVKIOWSXL2RF2ULNAP7PHESYCFSZIJE3/
FEDORA-2022-bf18450366
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SGSY236PYSFYIEBRGDERLA7OSY6D7XL4/
[debian-lts-announce] 20220119 [SECURITY] [DLA-2889-1] drupal7 security update
https://lists.debian.org/debian-lts-announce/2022/01/msg00014.html
https://blog.jqueryui.com/2021/10/jquery-ui-1-13-0-released/
https://github.com/jquery/jquery-ui/pull/1954/commits/6809ce843e5ac4128108ea4c15cbc100653c2b63
https://github.com/jquery/jquery-ui/security/advisories/GHSA-9gj3-hwp5-pmwc
https://security.netapp.com/advisory/ntap-20211118-0004/
https://www.drupal.org/sa-contrib-2022-004
https://www.drupal.org/sa-core-2022-002
https://www.tenable.com/security/tns-2022-09
Common Vulnerability Exposure (CVE) ID: CVE-2021-41183
https://bugs.jqueryui.com/ticket/15284
https://github.com/jquery/jquery-ui/pull/1953
https://github.com/jquery/jquery-ui/security/advisories/GHSA-j7qv-pgf6-hvh4
https://www.drupal.org/sa-core-2022-001
Common Vulnerability Exposure (CVE) ID: CVE-2021-41184
https://github.com/jquery/jquery-ui/commit/effa323f1505f2ce7a324e4f429fa9032c72f280
https://github.com/jquery/jquery-ui/security/advisories/GHSA-gpqq-952q-5327
Common Vulnerability Exposure (CVE) ID: CVE-2022-4427
https://otrs.com/release-notes/otrs-security-advisory-2022-15/
Common Vulnerability Exposure (CVE) ID: CVE-2023-38060
https://otrs.com/release-notes/otrs-security-advisory-2023-04/
CopyrightCopyright (C) 2023 Greenbone AG

This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2025 E-Soft Inc. All rights reserved.