github.com/mattermost/mattermost/server/public/model vulnerabilities

  • licenses detected

    • >=v0.0.0-20230613002302-62a3ee8adcb5 <v0.0.0-20230613135810-be590a1f0c0f; >=v0.0.0-20230622213803-fece5d5dd276 <v0.0.0-20230627214255-4e92dde5b3d8; >=v0.0.0-20230824225739-172c6f7a898c <v0.0.0-20230908141758-15faf4a69c12; >=v0.0.0-20230915185742-16d70e16d8f8 <v0.0.0-20231016054636-8d151d285989; >=v0.0.5 <v0.0.6-0.20230630045927-05cd245e9799; >=v0.0.6-0.20230705221755-44a95d9f6901 <v0.0.6-0.20230710123332-2abcdfe76a49
    • >=v0.0.0-20230601065843-a1614da6f810 <v0.0.0-20230613002302-62a3ee8adcb5; >=v0.0.0-20230613135810-be590a1f0c0f <v0.0.0-20230622213803-fece5d5dd276; >=v0.0.0-20230627214255-4e92dde5b3d8 <v0.0.0-20230824225739-172c6f7a898c; >=v0.0.0-20230908141758-15faf4a69c12 <v0.0.0-20230915185742-16d70e16d8f8; >=v0.0.0-20231016054636-8d151d285989 <v0.0.5; >=v0.0.6-0.20230630045927-05cd245e9799 <v0.0.6-0.20230705221755-44a95d9f6901; >=v0.0.6-0.20230710123332-2abcdfe76a49

Direct Vulnerabilities

Known vulnerabilities in the github.com/mattermost/mattermost/server/public/model package. This does not include vulnerabilities belonging to this package’s dependencies.

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.
Fix for free
Vulnerability Vulnerable Version
  • L
Incorrect Implementation of Authentication Algorithm

>=9.5.0 <9.5.11 >=9.11.0 <9.11.3 >=10.0.0 <10.1.0
  • M
Incorrect Authorization

>=9.10.0 <9.10.3 >=9.11.0 <9.11.2 >=9.5.0 <9.5.10 >=10.0.0 <10.0.1
  • M
Incorrect Implementation of Authentication Algorithm

<9.5.10
  • M
Access Control Bypass

>=9.5.0 <9.5.9
  • M
Improper Check for Unusual or Exceptional Conditions

>=9.5.0-rc1 <9.5.9-rc1 >=9.11.0-rc1 <9.11.1-rc1
  • H
Improper Access Control

>=9.5.0 <9.5.8 >=9.8.0 <9.8.3 >=9.9.0 <9.9.2 >=9.10.0 <9.10.1
  • M
Improper Check for Unusual or Exceptional Conditions

>=9.5.0 <9.5.8 >=9.8.0 <9.8.3 >=9.9.0 <9.9.2 >=9.10.0 <9.10.1
  • M
Improper Access Control

<9.5.7 >=9.9.0 <9.9.1
  • H
Improper Access Control

<9.5.7 >=9.7.0 <9.7.6 >=9.8.0 <9.8.2 >=9.9.0 <9.9.1
  • M
Improper Access Control

<9.5.7 >=9.7.0 <9.7.6 >=9.8.0 <9.8.2 >=9.9.0 <9.9.1
  • M
Insertion of Sensitive Information into Log File

<9.5.6-rc1 >=9.6.0-rc1 <9.8.1-rc1
  • L
Unverified Ownership

<9.5.6-rc2 >=9.6.0-rc1 <9.6.3-rc2 >=9.7.0-rc1 <9.7.5-rc2 >=9.8.0-rc1 <9.8.1-rc2
  • M
Unverified Ownership

<9.5.6-rc1 >=9.6.0-rc1 <9.6.3-rc1 >=9.7.0-rc1 <9.7.5-rc1 >=9.8.0-rc1 <9.8.1-rc1
  • M
Exposure of Sensitive System Information Due to Uncleared Debug Information

<8.1.12-rc2 >=9.0.0-rc1 <9.4.5 >=9.5.0-rc1 <9.5.3 >=9.6.0-rc1 <9.6.1-rc2
  • L
Allocation of Resources Without Limits or Throttling

<8.1.12-rc3 >=9.5.0-rc1 <9.5.3 >=9.6.0-rc1 <9.6.1
  • M
Improper Check for Unusual or Exceptional Conditions

>=8.1.0 <8.1.12 >=9.4.0 <9.4.5 >=9.5.0 <9.5.3 >=9.6.0 <9.6.1
  • M
Uncontrolled Resource Consumption

<0.0.11