| CVE |
Vendors |
Products |
Updated |
CVSS v3.1 |
| Mattermost versions 11.5.x <= 11.5.1 fail to validate team-level run_create permission against the target team when creating a playbook run which allows an authenticated team member to create runs in teams where they lack permission via specifying a different team ID in the run creation API request. Mattermost Advisory ID: MMSA-2026-00629 |
| In Netatalk 3.0.2 through 4.4.2, arbitrary file read via attacker-controlled symlink creation. Fixed in 4.4.3. |
| In Netatalk 2.1.0 through 4.4.2, ldap simple-bind password exposure in log output. Fixed in 4.4.3. |
| In Netatalk 2.0.0 through 4.4.2, predictable afpd session token. Fixed in 4.4.3. |
| In Netatalk 3.1.4 through 4.4.2, bitwise or logic bug enables shell injection. Fixed in 4.4.3. |
| In Netatalk 1.5.0 through 4.4.2, integer underflow in dsi_writeinit() leads to denial of service. Fixed in 4.4.3. |
| In Netatalk 1.5.0 through 4.4.2, des-ecb auth with timing side channel. Fixed in 4.5.0. |
| In Netatalk 1.3 through 4.4.2, asp session id out-of-bounds access. Fixed in 4.4.3. |
| In Netatalk 3.1.0 through 4.4.2, heap out-of-bounds reads in spotlight rpc unmarshalling. Fixed in 4.4.3. |
| In Netatalk 2.1.0 through 4.4.2, ea header parsing heap over-read. Fixed in 4.5.0. |
| In Netatalk 3.0.0 through 4.4.2, integer underflow in volxlate. Fixed in 4.5.0. |
| In Netatalk 2.0.0 through 4.4.2, unbounded realloc in charset conversion. Fixed in 4.5.0. |
| In Netatalk 2.2.1 through 4.4.2, system() after failed chdir(). Fixed in 4.5.0. |
| In Netatalk 1.5.0 through 4.4.2, seteuid failure ignored in auth modules. Fixed in 4.5.0. |
| In Netatalk 3.1.0 through 4.4.2, shell injection via volume path. Fixed in 4.4.3. |
| In Netatalk 3.0.3 through 4.4.2, format string argument mismatch. Fixed in 4.5.0. |
| In Netatalk 3.1.0 through 4.4.2, sql injection in mysql cnid backend. Fixed in 4.4.3. |
| In Netatalk 2.0.4 through 4.4.2, stack buffer overflow via ucs-2 type confusion in convert_charset(). Fixed in 4.4.3. |
| In Netatalk 1.5.0 through 4.2.2, weak cryptography in dhcast128 uam. Fixed in 4.5.0. |
| In Netatalk 2.2.2 through 4.4.2, authentication bypass via admin auth user. Fixed in 4.5.0. |