Filtered by vendor Mattermost
Subscriptions
Total
324 CVE
CVE | Vendors | Products | Updated | CVSS v3.1 |
---|---|---|---|---|
CVE-2023-1562 | 1 Mattermost | 1 Mattermost | 2024-11-21 | 3.5 Low |
Mattermost fails to check the "Show Full Name" setting when rendering the result for the /plugins/focalboard/api/v2/users API call, allowing an attacker to learn the full name of a board owner. | ||||
CVE-2023-1421 | 1 Mattermost | 1 Mattermost Server | 2024-11-21 | 3.5 Low |
A reflected cross-site scripting vulnerability in the OAuth flow completion endpoints in Mattermost allows an attacker to send AJAX requests on behalf of the victim via sharing a crafted link with a malicious state parameter. | ||||
CVE-2022-4045 | 1 Mattermost | 1 Mattermost | 2024-11-21 | 3.1 Low |
A denial-of-service vulnerability in the Mattermost allows an authenticated user to crash the server via multiple requests to one of the API endpoints which could fetch a large amount of data. | ||||
CVE-2022-4044 | 1 Mattermost | 1 Mattermost | 2024-11-21 | 4.3 Medium |
A denial-of-service vulnerability in Mattermost allows an authenticated user to crash the server via multiple large autoresponder messages. | ||||
CVE-2022-4019 | 1 Mattermost | 1 Mattermost | 2024-11-21 | 4.3 Medium |
A denial-of-service vulnerability in the Mattermost Playbooks plugin allows an authenticated user to crash the server via multiple large requests to one of the Playbooks API endpoints. | ||||
CVE-2022-3257 | 1 Mattermost | 1 Mattermost Server | 2024-11-21 | 3.1 Low |
Mattermost version 7.1.x and earlier fails to sufficiently process a specifically crafted GIF file when it is uploaded while drafting a post, which allows authenticated users to cause resource exhaustion while processing the file, resulting in server-side Denial of Service. | ||||
CVE-2022-3147 | 1 Mattermost | 1 Mattermost Server | 2024-11-21 | 3.1 Low |
Mattermost version 7.0.x and earlier fails to sufficiently limit the in-memory sizes of concurrently uploaded JPEG images, which allows authenticated users to cause resource exhaustion on specific system configurations, resulting in server-side Denial of Service. | ||||
CVE-2022-2408 | 1 Mattermost | 1 Mattermost | 2024-11-21 | 4.3 Medium |
The Guest account feature in Mattermost version 6.7.0 and earlier fails to properly restrict the permissions, which allows a guest user to fetch a list of all public channels in the team, in spite of not being part of those channels. | ||||
CVE-2022-2406 | 1 Mattermost | 1 Mattermost | 2024-11-21 | 4.3 Medium |
The legacy Slack import feature in Mattermost version 6.7.0 and earlier fails to properly limit the sizes of imported files, which allows an authenticated attacker to crash the server by importing large files via the Slack import REST API. | ||||
CVE-2022-2401 | 1 Mattermost | 1 Mattermost Server | 2024-11-21 | 6.5 Medium |
Unrestricted information disclosure of all users in Mattermost version 6.7.0 and earlier allows team members to access some sensitive information by directly accessing the APIs. | ||||
CVE-2022-2366 | 1 Mattermost | 1 Mattermost Server | 2024-11-21 | 5.6 Medium |
Incorrect default configuration for trusted IP header in Mattermost version 6.7.0 and earlier allows attacker to bypass some of the rate limitations in place or use manipulated IPs for audit logging via manipulating the request headers. | ||||
CVE-2022-1982 | 1 Mattermost | 1 Mattermost Server | 2024-11-21 | 4.3 Medium |
Uncontrolled resource consumption in Mattermost version 6.6.0 and earlier allows an authenticated attacker to crash the server via a crafted SVG attachment on a post. | ||||
CVE-2022-1548 | 1 Mattermost | 1 Playbooks | 2024-11-21 | 3.7 Low |
Mattermost Playbooks plugin 1.25 and earlier fails to properly restrict user-level permissions, which allows playbook members to escalate their membership privileges and perform actions restricted to playbook admins. | ||||
CVE-2022-1385 | 1 Mattermost | 1 Mattermost Server | 2024-11-21 | 3.7 Low |
Mattermost 6.4.x and earlier fails to properly invalidate pending email invitations when the action is performed from the system console, which allows accidentally invited users to join the workspace and access information from the public teams and channels. | ||||
CVE-2022-1384 | 1 Mattermost | 1 Mattermost Server | 2024-11-21 | 4.7 Medium |
Mattermost version 6.4.x and earlier fails to properly check the plugin version when a plugin is installed from the Marketplace, which allows an authenticated and an authorized user to install and exploit an old plugin version from the Marketplace which might have known vulnerabilities. | ||||
CVE-2022-1337 | 1 Mattermost | 1 Mattermost Server | 2024-11-21 | 4.3 Medium |
The image proxy component in Mattermost version 6.4.1 and earlier allocates memory for multiple copies of a proxied image, which allows an authenticated attacker to crash the server via links to very large image files. | ||||
CVE-2022-1333 | 1 Mattermost | 1 Playbooks | 2024-11-21 | 3.5 Low |
Mattermost Playbooks plugin v1.24.0 and earlier fails to properly check the limit on the number of webhooks, which allows authenticated and authorized users to create a specifically drafted Playbook which could trigger a large amount of webhook requests leading to Denial of Service. | ||||
CVE-2022-1332 | 1 Mattermost | 1 Mattermost Server | 2024-11-21 | 4.3 Medium |
One of the API in Mattermost version 6.4.1 and earlier fails to properly protect the permissions, which allows the authenticated members with restricted custom admin role to bypass the restrictions and view the server logs and server config.json file contents. | ||||
CVE-2022-1003 | 1 Mattermost | 1 Mattermost | 2024-11-21 | 3.3 Low |
One of the API in Mattermost version 6.3.0 and earlier fails to properly protect the permissions, which allows the system administrators to combine the two distinct privileges/capabilities in a way that allows them to override certain restricted configurations like EnableUploads. | ||||
CVE-2022-1002 | 1 Mattermost | 1 Mattermost | 2024-11-21 | 2 Low |
Mattermost 6.3.0 and earlier fails to properly sanitize the HTML content in the email invitation sent to guest users, which allows registered users with special permissions to invite guest users to inject unescaped HTML content in the email invitations. |