| CVE |
Vendors |
Products |
Updated |
CVSS v3.1 |
| An issue was discovered in Mattermost Server before 3.0.0. It offers superfluous APIs for a Team Administrator to view account details. |
| An issue was discovered in Mattermost Server before 3.0.0. It allows XSS via a redirect URL. |
| An issue was discovered in Mattermost Server before 3.0.0. It potentially allows attackers to obtain sensitive information (credential fields within config.json) via the System Console UI. |
| An issue was discovered in Mattermost Server before 3.0.0. It has a superfluous API in which the System Admin can change the account name and e-mail address of an LDAP account. |
| An issue was discovered in Mattermost Server before 3.0.0. It does not ensure that a cookie is used over SSL. |
| An issue was discovered in Mattermost Server before 3.0.0. It allows attackers to obtain sensitive information about team URLs via an API. |
| An issue was discovered in Mattermost Server before 3.0.0. A password-reset link could be reused. |
| An issue was discovered in Mattermost Server before 3.0.0. It allows XSS via a Legal or Support setting. |
| An issue was discovered in Mattermost Server before 3.0.2. The purposes of a session ID and a Session Token were mishandled. |
| An issue was discovered in Mattermost Server before 3.1.0. It allows XSS because the noreferrer and noopener protection mechanisms were not in place. |
| An issue was discovered in Mattermost Server before 3.1.0. It allows XSS via theme color-code values. |
| An issue was discovered in Mattermost Server before 3.2.0. It mishandles brute-force attempts at password change. |
| An issue was discovered in Mattermost Server before 3.2.0. Attackers could read LDAP fields via injection. |
| An issue was discovered in Mattermost Server before 3.2.0. It allowed crafted posts that could cause a web browser to hang. |
| An issue was discovered in Mattermost Server before 3.2.0. The initial_load API disclosed unnecessary personal information. |
| An issue was discovered in Mattermost Server before 3.3.0. An attacker could use the WebSocket feature to send pop-up messages to users or change a post's appearance. |
| An issue was discovered in Mattermost Desktop App before 3.4.0. Strings could be executed as code via injection. |
| An issue was discovered in Mattermost Server before 3.5.1. XSS can occur via file preview. |
| An issue was discovered in Mattermost Server before 3.5.1. E-mail address verification can be bypassed. |
| Xerox WorkCentre 3655, 3655i, 58XX, 58XXi, 59XX, 59XXi, 6655, 6655i, 72XX, 72XXi, 78XX, 78XXi, 7970, and 7970i devices before 073.xxx.086.15410 do not properly escape parameters in the support/remoteUI/configrui.php script, which can allow an unauthenticated attacker to execute OS commands on the device. |