github.com/mattermost/.../model vulnerabilities

License

>=v3.5.1-0.20161123161237-48533aa48387+incompatible <v3.5.1+incompatible;
>=v0.0.0-20230613002302-62a3ee8adcb5 <v0.0.0-20230613135810-be590a1f0c0f;
>=v0.0.0-20230622213803-fece5d5dd276 <v0.0.0-20230627214255-4e92dde5b3d8;
>=v0.0.0-20230824225739-172c6f7a898c <v0.0.0-20230908141758-15faf4a69c12;
>=v0.0.0-20230601065843-a1614da6f810 <v0.0.0-20230613002302-62a3ee8adcb5;
>=v0.0.0-20230613135810-be590a1f0c0f <v0.0.0-20230622213803-fece5d5dd276;
>=v0.0.0-20230627214255-4e92dde5b3d8 <v0.0.0-20230824225739-172c6f7a898c;

Direct Vulnerabilities

Known vulnerabilities in the github.com/mattermost/mattermost/server/public/model package. This does not include vulnerabilities belonging to this package’s dependencies.

Fix vulnerabilities automatically

Snyk's AI Trust Platform automatically finds the best upgrade path and integrates with your development workflows. Secure your code at zero cost.

Fix for free
VulnerabilityVulnerable Version
  • M
Privilege Context Switching Error

>=10.5.0-rc1 <10.5.13>=10.11.0-rc1 <10.11.5>=10.12.0-rc1 <10.12.2>=11.0.0-alpha.1 <11.0.3
  • L
Privilege Context Switching Error

>=10.5.0-rc1 <10.5.13>=10.11.0-rc1 <10.11.5>=10.12.0-rc1 <10.12.2>=11.0.0-alpha.1 <11.1.0
  • C
Incorrect Implementation of Authentication Algorithm

>=10.5.0 <10.5.13>=10.11.0 <10.11.5>=10.12.0 <10.12.2>=11.0.0-alpha.1 <11.0.3
  • M
Missing Authentication for Critical Function

>=10.5.0 <10.5.12>=10.11.0 <10.11.4-rc2>=10.12.0 <10.12.1
  • L
Incorrect Authorization

<0.1.17
  • M
Incorrect Authorization

<0.1.17
  • L
Incorrect Authorization

<0.1.18
  • L
Insufficiently Protected Credentials

<0.1.14
  • M
Incorrect Authorization

<0.1.12
  • M
Incorrect Authorization

<0.1.12
  • M
Incorrect Authorization

<0.1.11
  • M
Overly Restrictive Account Lockout Mechanism

<0.1.11
  • M
Incorrect Authorization

<0.1.10
  • M
Incorrect Authorization

<0.1.10
  • M
Improper Check for Unusual or Exceptional Conditions

<0.1.8
  • L
Incorrect Implementation of Authentication Algorithm

<0.1.8
  • M
Incorrect Authorization

<0.1.8
  • M
Incorrect Implementation of Authentication Algorithm

<0.1.7
  • M
Access Control Bypass

<0.0.7
  • M
Improper Check for Unusual or Exceptional Conditions

<0.1.7
  • H
Improper Access Control

<0.1.6
  • M
Improper Check for Unusual or Exceptional Conditions

<0.1.6
  • M
Improper Access Control

<0.1.5
  • H
Improper Access Control

<0.1.5
  • M
Improper Access Control

<0.1.5
  • M
Insertion of Sensitive Information into Log File

<0.1.4
  • L
Unverified Ownership

<0.1.4
  • M
Unverified Ownership

<0.1.4
  • M
Exposure of Sensitive System Information Due to Uncleared Debug Information

<0.0.17
  • L
Allocation of Resources Without Limits or Throttling

<0.0.17
  • M
Improper Check for Unusual or Exceptional Conditions

<0.0.17
  • M
Uncontrolled Resource Consumption ('Resource Exhaustion')

<0.0.11