Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
| Vendor | Product | Affected Versions | CPE | Subscribe |
|---|---|---|---|---|
| Mattermost | Mattermost | 0 ~ 7.8.12 | - |
| # | POC Description | Source Link | Shenlong Link |
|---|
No public POC found.
Login to generate AI POC| CVE-2023-47168 | 4.3 MEDIUM | Open redirect in /oauth/<service>/mobile_login?redirect_to= |
| CVE-2023-6202 | 4.3 MEDIUM | Insecure Direct Object Reference in /plugins/focalboard/ api/v2/users of Mattermost Boards |
| CVE-2023-48369 | 4.3 MEDIUM | Log Flooding due to specially crafted requests in different endpoints |
| CVE-2023-40703 | 4.3 MEDIUM | Denial of Service via specially crafted block fields in Mattermost Boards |
| CVE-2023-48268 | 4.3 MEDIUM | Denial of Service via Board Import Zip Bomb |
| CVE-2023-45223 | 4.3 MEDIUM | Users full name disclosure through Mattermost Boards with Show Full Name Option disabled |
| CVE-2023-47865 | 4.3 MEDIUM | Username and Icon override can be used by members when Hardened Mode is enabled |
| CVE-2023-35075 | 3.1 LOW | HTML injection via channel autocomplete |
No comments yet