Логотип exploitDog
bind:CVE-2023-2788
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2023-2788

Количество 3

Количество 3

nvd логотип

CVE-2023-2788

около 2 лет назад

Mattermost fails to check if an admin user account active after an oauth2 flow is started, allowing an attacker with admin privileges to retain persistent access to Mattermost by obtaining an oauth2 access token while the attacker's account is deactivated.

CVSS3: 6.2
EPSS: Низкий
debian логотип

CVE-2023-2788

около 2 лет назад

Mattermost fails to check if an admin user account active after an oau ...

CVSS3: 6.2
EPSS: Низкий
github логотип

GHSA-4x9v-95w9-xp83

около 2 лет назад

Mattermost fails to check if an admin user account active after an oauth2 flow is started, allowing an attacker with admin privileges to retain persistent access to Mattermost by obtaining an oauth2 access token while the attacker's account is deactivated.

CVSS3: 6.2
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2023-2788

Mattermost fails to check if an admin user account active after an oauth2 flow is started, allowing an attacker with admin privileges to retain persistent access to Mattermost by obtaining an oauth2 access token while the attacker's account is deactivated.

CVSS3: 6.2
0%
Низкий
около 2 лет назад
debian логотип
CVE-2023-2788

Mattermost fails to check if an admin user account active after an oau ...

CVSS3: 6.2
0%
Низкий
около 2 лет назад
github логотип
GHSA-4x9v-95w9-xp83

Mattermost fails to check if an admin user account active after an oauth2 flow is started, allowing an attacker with admin privileges to retain persistent access to Mattermost by obtaining an oauth2 access token while the attacker's account is deactivated.

CVSS3: 6.2
0%
Низкий
около 2 лет назад

Уязвимостей на страницу