Логотип exploitDog
product: "mattermost"
Консоль
Логотип exploitDog

exploitDog

product: "mattermost"
Mattermost

Mattermostбезопасная платформа для совместной работы, позволяющая объединить ваши команды, инструменты и процессы для ускорения критически важной работы.

Релизный цикл, информация об уязвимостях

Продукт: Mattermost
Вендор: Mattermost

График релизов

5.46.16.26.37.06.47.17.27.32021202220232024202520262027202820292030

Недавние уязвимости Mattermost

Количество 239

github логотип

GHSA-4x9v-95w9-xp83

около 2 лет назад

Mattermost fails to check if an admin user account active after an oauth2 flow is started, allowing an attacker with admin privileges to retain persistent access to Mattermost by obtaining an oauth2 access token while the attacker's account is deactivated.

CVSS3: 6.2
EPSS: Низкий
github логотип

GHSA-455c-vqrf-mghr

около 2 лет назад

Mattermost Server Missing Authorization vulnerability

CVSS3: 4.3
EPSS: Низкий
github логотип

GHSA-m9m2-f9hg-rh66

около 2 лет назад

When creating a playbook run via the /dialog API, Mattermost fails to validate all parameters, allowing an authenticated attacker to edit an arbitrary channel post.

CVSS3: 4.3
EPSS: Низкий
github логотип

GHSA-8m2w-p6c5-hh6c

около 2 лет назад

Mattermost fails to check channel membership when accessing message threads, allowing an attacker to access arbitrary posts by using the message threads API.

CVSS3: 6.5
EPSS: Низкий
nvd логотип

CVE-2023-2791

около 2 лет назад

When creating a playbook run via the /dialog API, Mattermost fails to validate all parameters, allowing an authenticated attacker to edit an arbitrary channel post.

CVSS3: 4.3
EPSS: Низкий
debian логотип

CVE-2023-2791

около 2 лет назад

When creating a playbook run via the /dialog API, Mattermost fails to ...

CVSS3: 4.3
EPSS: Низкий
nvd логотип

CVE-2023-2788

около 2 лет назад

Mattermost fails to check if an admin user account active after an oauth2 flow is started, allowing an attacker with admin privileges to retain persistent access to Mattermost by obtaining an oauth2 access token while the attacker's account is deactivated.

CVSS3: 6.2
EPSS: Низкий
debian логотип

CVE-2023-2788

около 2 лет назад

Mattermost fails to check if an admin user account active after an oau ...

CVSS3: 6.2
EPSS: Низкий
nvd логотип

CVE-2023-2787

около 2 лет назад

Mattermost fails to check channel membership when accessing message threads, allowing an attacker to access arbitrary posts by using the message threads API.

CVSS3: 6.5
EPSS: Низкий
debian логотип

CVE-2023-2787

около 2 лет назад

Mattermost fails to check channel membership when accessing message th ...

CVSS3: 6.5
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
1
github логотип
GHSA-4x9v-95w9-xp83

Mattermost fails to check if an admin user account active after an oauth2 flow is started, allowing an attacker with admin privileges to retain persistent access to Mattermost by obtaining an oauth2 access token while the attacker's account is deactivated.

CVSS3: 6.2
0%
Низкий
около 2 лет назад
github логотип
GHSA-455c-vqrf-mghr

Mattermost Server Missing Authorization vulnerability

CVSS3: 4.3
0%
Низкий
около 2 лет назад
github логотип
GHSA-m9m2-f9hg-rh66

When creating a playbook run via the /dialog API, Mattermost fails to validate all parameters, allowing an authenticated attacker to edit an arbitrary channel post.

CVSS3: 4.3
0%
Низкий
около 2 лет назад
github логотип
GHSA-8m2w-p6c5-hh6c

Mattermost fails to check channel membership when accessing message threads, allowing an attacker to access arbitrary posts by using the message threads API.

CVSS3: 6.5
0%
Низкий
около 2 лет назад
nvd логотип
CVE-2023-2791

When creating a playbook run via the /dialog API, Mattermost fails to validate all parameters, allowing an authenticated attacker to edit an arbitrary channel post.

CVSS3: 4.3
0%
Низкий
около 2 лет назад
debian логотип
CVE-2023-2791

When creating a playbook run via the /dialog API, Mattermost fails to ...

CVSS3: 4.3
0%
Низкий
около 2 лет назад
nvd логотип
CVE-2023-2788

Mattermost fails to check if an admin user account active after an oauth2 flow is started, allowing an attacker with admin privileges to retain persistent access to Mattermost by obtaining an oauth2 access token while the attacker's account is deactivated.

CVSS3: 6.2
0%
Низкий
около 2 лет назад
debian логотип
CVE-2023-2788

Mattermost fails to check if an admin user account active after an oau ...

CVSS3: 6.2
0%
Низкий
около 2 лет назад
nvd логотип
CVE-2023-2787

Mattermost fails to check channel membership when accessing message threads, allowing an attacker to access arbitrary posts by using the message threads API.

CVSS3: 6.5
0%
Низкий
около 2 лет назад
debian логотип
CVE-2023-2787

Mattermost fails to check channel membership when accessing message th ...

CVSS3: 6.5
0%
Низкий
около 2 лет назад

Уязвимостей на страницу


Поделиться