Total vulnerabilities in the database
Attacker is able to determine if the provided username exists (and it's valid) using Request New Password feature, based on the response time.
Software | From | Fixed in |
---|---|---|
otrs / otrs | 8.0.0 | 8.0.23 |
otrs / otrs | 7.0.0 | 7.0.35 |