Mattermost version vulnerability in user modificatio
Reporter | Title | Published | Views | Family All 9 |
---|---|---|---|---|
![]() | Mattermost failed to disallow the modification of local users when syncing users in shared channels | 1 Aug 202415:32 | – | github |
![]() | GO-2024-3025 Mattermost failed to disallow the modification of local users when syncing users in shared channels in github.com/mattermost/mattermost-server | 6 Aug 202422:40 | – | osv |
![]() | GHSA-56MC-F9W7-2WXQ Mattermost failed to disallow the modification of local users when syncing users in shared channels | 1 Aug 202415:32 | – | osv |
![]() | CVE-2024-36492 | 1 Aug 202415:15 | – | osv |
![]() | Unspecified Vulnerability in Mattermost (CNVD-2024-35160) | 5 Aug 202400:00 | – | cnvd |
![]() | CVE-2024-36492 Existing local user overwritten by malicious remote | 1 Aug 202414:05 | – | vulnrichment |
![]() | CVE-2024-36492 Existing local user overwritten by malicious remote | 1 Aug 202414:05 | – | cvelist |
![]() | Improper Access Control | 9 Aug 202406:24 | – | veracode |
![]() | CVE-2024-36492 | 1 Aug 202415:15 | – | nvd |
[
{
"defaultStatus": "unaffected",
"product": "Mattermost",
"vendor": "Mattermost",
"versions": [
{
"status": "affected",
"version": "9.9.0"
},
{
"lessThanOrEqual": "9.5.6",
"status": "affected",
"version": "9.5.0",
"versionType": "semver"
},
{
"lessThanOrEqual": "9.7.5",
"status": "affected",
"version": "9.7.0",
"versionType": "semver"
},
{
"lessThanOrEqual": "9.8.1",
"status": "affected",
"version": "9.8.0",
"versionType": "semver"
},
{
"status": "unaffected",
"version": "9.10.0"
},
{
"status": "unaffected",
"version": "9.9.1"
},
{
"status": "unaffected",
"version": "9.5.7"
},
{
"status": "unaffected",
"version": "9.7.6"
},
{
"status": "unaffected",
"version": "9.8.2"
}
]
}
]
Source | Link |
---|---|
mattermost | www.mattermost.com/security-updates |
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo