Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
| Vendor | Product | Affected Versions | CPE | Subscribe |
|---|---|---|---|---|
| Mattermost | Mattermost | 0 ~ 8.1.5 | - |
| # | POC Description | Source Link | Shenlong Link |
|---|
No public POC found.
Login to generate AI POC| CVE-2023-45316 | 7.3 HIGH | Reflected client side path traversal leading to CSRF in Playbooks |
| CVE-2023-46701 | 6.5 MEDIUM | Inaccessible Post Information Leak via Run Timeline IDOR |
| CVE-2023-45847 | 4.3 MEDIUM | Playbook Plugin Crash via Run Checklist |
| CVE-2023-49809 | 4.3 MEDIUM | Todo plugin gets crashed and disabled by member |
| CVE-2023-49607 | 4.3 MEDIUM | Playbook plugin crash via missing interface type assertion |
| CVE-2023-6547 | 3.7 LOW | Playbooks access/modification by removed team member |
| CVE-2023-6727 | 3.1 LOW | Leak Inaccessible Playbook Information via Channel Action IDOR |
No comments yet