Логотип exploitDog
product: "mattermost"
Консоль
Логотип exploitDog

exploitDog

product: "mattermost"
Mattermost

Mattermostбезопасная платформа для совместной работы, позволяющая объединить ваши команды, инструменты и процессы для ускорения критически важной работы.

Релизный цикл, информация об уязвимостях

Продукт: Mattermost
Вендор: Mattermost

График релизов

5.46.16.26.37.06.47.17.27.32021202220232024202520262027202820292030

Недавние уязвимости Mattermost

Количество 232

debian логотип

CVE-2023-2785

около 2 лет назад

Mattermost fails to properly truncate the postgres error log message o ...

CVSS3: 4.3
EPSS: Низкий
github логотип

GHSA-m9m2-f9hg-rh66

около 2 лет назад

When creating a playbook run via the /dialog API, Mattermost fails to validate all parameters, allowing an authenticated attacker to edit an arbitrary channel post.

CVSS3: 4.3
EPSS: Низкий
github логотип

GHSA-8jf2-78m7-7f8v

около 2 лет назад

Mattermost fails to verify if the requestor is a sysadmin or not, before allowing `install` requests to the Apps allowing a regular user send install requests to the Apps.

CVSS3: 4.2
EPSS: Низкий
github логотип

GHSA-hrr7-x743-5wr4

около 2 лет назад

Mattermost fails to properly check the permissions when executing commands allowing a member with no permissions to post a message in a channel to actually post it by executing channel commands.

CVSS3: 4.3
EPSS: Низкий
github логотип

GHSA-455c-vqrf-mghr

около 2 лет назад

Mattermost Server Missing Authorization vulnerability

CVSS3: 4.3
EPSS: Низкий
github логотип

GHSA-8m2w-p6c5-hh6c

около 2 лет назад

Mattermost fails to check channel membership when accessing message threads, allowing an attacker to access arbitrary posts by using the message threads API.

CVSS3: 6.5
EPSS: Низкий
github логотип

GHSA-4x9v-95w9-xp83

около 2 лет назад

Mattermost fails to check if an admin user account active after an oauth2 flow is started, allowing an attacker with admin privileges to retain persistent access to Mattermost by obtaining an oauth2 access token while the attacker's account is deactivated.

CVSS3: 6.2
EPSS: Низкий
nvd логотип

CVE-2023-2791

около 2 лет назад

When creating a playbook run via the /dialog API, Mattermost fails to validate all parameters, allowing an authenticated attacker to edit an arbitrary channel post.

CVSS3: 4.3
EPSS: Низкий
debian логотип

CVE-2023-2791

около 2 лет назад

When creating a playbook run via the /dialog API, Mattermost fails to ...

CVSS3: 4.3
EPSS: Низкий
nvd логотип

CVE-2023-2788

около 2 лет назад

Mattermost fails to check if an admin user account active after an oauth2 flow is started, allowing an attacker with admin privileges to retain persistent access to Mattermost by obtaining an oauth2 access token while the attacker's account is deactivated.

CVSS3: 6.2
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
1
debian логотип
CVE-2023-2785

Mattermost fails to properly truncate the postgres error log message o ...

CVSS3: 4.3
0%
Низкий
около 2 лет назад
github логотип
GHSA-m9m2-f9hg-rh66

When creating a playbook run via the /dialog API, Mattermost fails to validate all parameters, allowing an authenticated attacker to edit an arbitrary channel post.

CVSS3: 4.3
0%
Низкий
около 2 лет назад
github логотип
GHSA-8jf2-78m7-7f8v

Mattermost fails to verify if the requestor is a sysadmin or not, before allowing `install` requests to the Apps allowing a regular user send install requests to the Apps.

CVSS3: 4.2
0%
Низкий
около 2 лет назад
github логотип
GHSA-hrr7-x743-5wr4

Mattermost fails to properly check the permissions when executing commands allowing a member with no permissions to post a message in a channel to actually post it by executing channel commands.

CVSS3: 4.3
0%
Низкий
около 2 лет назад
github логотип
GHSA-455c-vqrf-mghr

Mattermost Server Missing Authorization vulnerability

CVSS3: 4.3
0%
Низкий
около 2 лет назад
github логотип
GHSA-8m2w-p6c5-hh6c

Mattermost fails to check channel membership when accessing message threads, allowing an attacker to access arbitrary posts by using the message threads API.

CVSS3: 6.5
0%
Низкий
около 2 лет назад
github логотип
GHSA-4x9v-95w9-xp83

Mattermost fails to check if an admin user account active after an oauth2 flow is started, allowing an attacker with admin privileges to retain persistent access to Mattermost by obtaining an oauth2 access token while the attacker's account is deactivated.

CVSS3: 6.2
0%
Низкий
около 2 лет назад
nvd логотип
CVE-2023-2791

When creating a playbook run via the /dialog API, Mattermost fails to validate all parameters, allowing an authenticated attacker to edit an arbitrary channel post.

CVSS3: 4.3
0%
Низкий
около 2 лет назад
debian логотип
CVE-2023-2791

When creating a playbook run via the /dialog API, Mattermost fails to ...

CVSS3: 4.3
0%
Низкий
около 2 лет назад
nvd логотип
CVE-2023-2788

Mattermost fails to check if an admin user account active after an oauth2 flow is started, allowing an attacker with admin privileges to retain persistent access to Mattermost by obtaining an oauth2 access token while the attacker's account is deactivated.

CVSS3: 6.2
0%
Низкий
около 2 лет назад

Уязвимостей на страницу


Поделиться