Filtered by vendor Rocket.chat
Subscribe
Total
50 CVE
CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
---|---|---|---|---|---|
CVE-2021-22886 | 1 Rocket.chat | 1 Rocket.chat | 2021-03-30 | 4.3 MEDIUM | 6.1 MEDIUM |
Rocket.Chat before 3.11, 3.10.5, 3.9.7, 3.8.8 is vulnerable to persistent cross-site scripting (XSS) using nested markdown tags allowing a remote attacker to inject arbitrary JavaScript in a message. This flaw leads to arbitrary file read and RCE on Rocket.Chat desktop app. | |||||
CVE-2020-8292 | 1 Rocket.chat | 1 Rocket.chat | 2021-02-01 | 4.3 MEDIUM | 5.4 MEDIUM |
Rocket.Chat server before 3.9.0 is vulnerable to a self cross-site scripting (XSS) vulnerability via the drag & drop functionality in message boxes. | |||||
CVE-2020-28208 | 1 Rocket.chat | 1 Rocket.chat | 2021-02-01 | 5.0 MEDIUM | 5.3 MEDIUM |
An email address enumeration vulnerability exists in the password reset function of Rocket.Chat through 3.9.1. | |||||
CVE-2020-8288 | 1 Rocket.chat | 1 Rocket.chat | 2021-02-01 | 3.5 LOW | 5.4 MEDIUM |
The `specializedRendering` function in Rocket.Chat server before 3.9.2 allows a cross-site scripting (XSS) vulnerability by way of the `value` parameter. | |||||
CVE-2020-29594 | 1 Rocket.chat | 1 Rocket.chat | 2021-01-04 | 7.5 HIGH | 9.8 CRITICAL |
Rocket.Chat before 0.74.4, 1.x before 1.3.4, 2.x before 2.4.13, 3.x before 3.7.3, 3.8.x before 3.8.3, and 3.9.x before 3.9.1 mishandles SAML login. | |||||
CVE-2020-15926 | 1 Rocket.chat | 1 Rocket.chat | 2020-08-20 | 4.3 MEDIUM | 6.1 MEDIUM |
Rocket.Chat through 3.4.2 allows XSS where an attacker can send a specially crafted message to a channel or in a direct message to the client which results in remote code execution on the client side. | |||||
CVE-2019-17220 | 1 Rocket.chat | 1 Rocket.chat | 2019-10-23 | 4.3 MEDIUM | 6.1 MEDIUM |
Rocket.Chat before 2.1.0 allows XSS via a URL on a ![title] line. | |||||
CVE-2017-1000493 | 1 Rocket.chat | 1 Rocket.chat | 2019-05-01 | 7.5 HIGH | 9.8 CRITICAL |
Rocket.Chat Server version 0.59 and prior is vulnerable to a NoSQL injection leading to administrator account takeover | |||||
CVE-2018-13878 | 1 Rocket.chat | 1 Rocket.chat | 2018-09-05 | 4.3 MEDIUM | 6.1 MEDIUM |
An XSS issue was discovered in packages/rocketchat-mentions/Mentions.js in Rocket.Chat before 0.65. The real name of a username is displayed unescaped when the user is mentioned (using the @ symbol) in a channel or private chat. Consequently, it is possible to exfiltrate the secret token of every user and also admins in the channel. | |||||
CVE-2018-13879 | 1 Rocket.chat | 1 Rocket.chat | 2018-09-05 | 3.5 LOW | 5.4 MEDIUM |
A reflected XSS issue was discovered in the registration form in Rocket.Chat before 0.66. When one creates an account, the next step will ask for a username. This field will not save HTML control characters but an error will be displayed that shows the attempted username unescaped via packages/rocketchat-ui-login/client/username/username.js in packages/rocketchat-ui-login/client/username/username.html. |