Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
| Vendor | Product | Affected Versions | CPE | Subscribe |
|---|---|---|---|---|
| Mattermost | Mattermost | 0 ~ 11.0.4 | - |
| # | POC Description | Source Link | Shenlong Link |
|---|
No public POC found.
Login to generate AI POC| CVE-2026-3108 | 8.0 HIGH | Terminal Escape Injection in mmctl Report Posts Command |
| CVE-2026-3112 | 6.8 MEDIUM | Arbitrary File Read via Advanced Logging Support Packet |
| CVE-2026-3114 | 6.5 MEDIUM | Zip Bomb Denial of Service via Unrestricted Archive Decompression |
| CVE-2026-4274 | 5.4 MEDIUM | Insufficient authorization in shared channel membership sync grants team-level access inst |
| CVE-2026-3113 | 5.0 MEDIUM | mmctl export download command doesn’t restrict permissions to created file to file owner |
| CVE-2026-3115 | 4.3 MEDIUM | Guest users can view group member IDs without respecting view restrictions |
| CVE-2026-3109 | 2.2 LOW | Missing timestamp validation in Zoom webhook handler |
No comments yet