Lucene search

K

CVE-2024-39830 Timing attack during remote cluster token comparison when shared channels are enabled

🗓️ 03 Jul 2024 08:56:32Reported by MattermostType 
cvelist
 cvelist
🔗 www.cve.org👁 13 Views

CVE-2024-39830 Timing attack during remote cluster token compariso

Show more

AI Insights are available for you today

Leverage the power of AI to quickly understand vulnerabilities, impacts, and exploitability

Related
Affected
Refs
ReporterTitlePublishedViews
Family
Veracode
Improper Authentication
4 Jul 202409:32
veracode
NVD
CVE-2024-39830
3 Jul 202409:15
nvd
CVE
CVE-2024-39830
3 Jul 202409:15
cve
OSV
CVE-2024-39830
3 Jul 202409:15
osv
CNVD
Mattermost Improper Authorization Vulnerability
4 Jul 202400:00
cnvd
Vulnrichment
CVE-2024-39830 Timing attack during remote cluster token comparison when shared channels are enabled
3 Jul 202408:32
vulnrichment
[
  {
    "defaultStatus": "unaffected",
    "product": "Mattermost",
    "vendor": "Mattermost",
    "versions": [
      {
        "status": "affected",
        "version": "9.8.0"
      },
      {
        "lessThanOrEqual": "9.7.4",
        "status": "affected",
        "version": "9.7.0",
        "versionType": "semver"
      },
      {
        "lessThanOrEqual": "9.6.2",
        "status": "affected",
        "version": "9.6.0",
        "versionType": "semver"
      },
      {
        "lessThanOrEqual": "9.5.5",
        "status": "affected",
        "version": "9.5.0",
        "versionType": "semver"
      },
      {
        "status": "unaffected",
        "version": "9.9.0"
      },
      {
        "status": "unaffected",
        "version": "9.8.1"
      },
      {
        "status": "unaffected",
        "version": "9.7.5"
      },
      {
        "status": "unaffected",
        "version": "9.6.3"
      },
      {
        "status": "unaffected",
        "version": "9.5.6"
      }
    ]
  }
]

Transform Your Security Services

Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.

Book a live demo