github.com/mattermost/.../model vulnerabilities

  • licenses detected

    • >=v0.0.0-20230613002302-62a3ee8adcb5 <v0.0.0-20230613135810-be590a1f0c0f; >=v0.0.0-20230622213803-fece5d5dd276 <v0.0.0-20230627214255-4e92dde5b3d8; >=v0.0.0-20230824225739-172c6f7a898c <v0.0.0-20230908141758-15faf4a69c12; >=v0.0.0-20230915185742-16d70e16d8f8 <v0.0.0-20231016054636-8d151d285989; >=v0.0.5 <v0.0.6-0.20230630045927-05cd245e9799; >=v0.0.6-0.20230705221755-44a95d9f6901 <v0.0.6-0.20230710123332-2abcdfe76a49
    • >=v0.0.0-20230601065843-a1614da6f810 <v0.0.0-20230613002302-62a3ee8adcb5; >=v0.0.0-20230613135810-be590a1f0c0f <v0.0.0-20230622213803-fece5d5dd276; >=v0.0.0-20230627214255-4e92dde5b3d8 <v0.0.0-20230824225739-172c6f7a898c; >=v0.0.0-20230908141758-15faf4a69c12 <v0.0.0-20230915185742-16d70e16d8f8; >=v0.0.0-20231016054636-8d151d285989 <v0.0.5; >=v0.0.6-0.20230630045927-05cd245e9799 <v0.0.6-0.20230705221755-44a95d9f6901; >=v0.0.6-0.20230710123332-2abcdfe76a49
  • Direct Vulnerabilities

    Known vulnerabilities in the github.com/mattermost/mattermost/server/public/model package. This does not include vulnerabilities belonging to this package’s dependencies.

    How to fix?

    Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

    Fix for free
    VulnerabilityVulnerable Version
    • M
    Improper Check for Unusual or Exceptional Conditions

    >=9.5.0 <9.5.12>=9.11.0 <9.11.4>=10.0.0 <10.0.2>=10.1.0 <10.1.2
    • L
    Incorrect Implementation of Authentication Algorithm

    >=9.5.0 <9.5.11>=9.11.0 <9.11.3>=10.0.0 <10.1.0
    • M
    Incorrect Authorization

    >=9.10.0 <9.10.3>=9.11.0 <9.11.2>=9.5.0 <9.5.10>=10.0.0 <10.0.1
    • M
    Incorrect Implementation of Authentication Algorithm

    <9.5.10
    • M
    Access Control Bypass

    >=9.5.0 <9.5.9
    • M
    Improper Check for Unusual or Exceptional Conditions

    >=9.5.0-rc1 <9.5.9-rc1>=9.11.0-rc1 <9.11.1-rc1
    • H
    Improper Access Control

    >=9.5.0 <9.5.8>=9.8.0 <9.8.3>=9.9.0 <9.9.2>=9.10.0 <9.10.1
    • M
    Improper Check for Unusual or Exceptional Conditions

    >=9.5.0 <9.5.8>=9.8.0 <9.8.3>=9.9.0 <9.9.2>=9.10.0 <9.10.1
    • M
    Improper Access Control

    <9.5.7>=9.9.0 <9.9.1
    • H
    Improper Access Control

    <9.5.7>=9.7.0 <9.7.6>=9.8.0 <9.8.2>=9.9.0 <9.9.1
    • M
    Improper Access Control

    <9.5.7>=9.7.0 <9.7.6>=9.8.0 <9.8.2>=9.9.0 <9.9.1
    • M
    Insertion of Sensitive Information into Log File

    <9.5.6-rc1>=9.6.0-rc1 <9.8.1-rc1
    • L
    Unverified Ownership

    <9.5.6-rc2>=9.6.0-rc1 <9.6.3-rc2>=9.7.0-rc1 <9.7.5-rc2>=9.8.0-rc1 <9.8.1-rc2
    • M
    Unverified Ownership

    <9.5.6-rc1>=9.6.0-rc1 <9.6.3-rc1>=9.7.0-rc1 <9.7.5-rc1>=9.8.0-rc1 <9.8.1-rc1
    • M
    Exposure of Sensitive System Information Due to Uncleared Debug Information

    <8.1.12-rc2>=9.0.0-rc1 <9.4.5>=9.5.0-rc1 <9.5.3>=9.6.0-rc1 <9.6.1-rc2
    • L
    Allocation of Resources Without Limits or Throttling

    <8.1.12-rc3>=9.5.0-rc1 <9.5.3>=9.6.0-rc1 <9.6.1
    • M
    Improper Check for Unusual or Exceptional Conditions

    >=8.1.0 <8.1.12>=9.4.0 <9.4.5>=9.5.0 <9.5.3>=9.6.0 <9.6.1
    • M
    Uncontrolled Resource Consumption

    <0.0.11