matrix-synapse@1.90.0rc1 vulnerabilities
Homeserver for the Matrix decentralised comms protocol
-
latest version
1.119.0
-
latest non vulnerable version
-
first published
6 years ago
-
latest version published
15 hours ago
-
licenses detected
- [0.33.5,1.99.0rc1)
Direct Vulnerabilities
Known vulnerabilities in the matrix-synapse package. This does not include vulnerabilities belonging to this package’s dependencies.
Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.Vulnerability | Vulnerable Version |
---|---|
matrix-synapse is an ecosystem for open federated Instant Messaging and VoIP. Affected versions of this package are vulnerable to Allocation of Resources Without Limits or Throttling due to a weakness in how the How to fix Allocation of Resources Without Limits or Throttling? Upgrade |
[,1.105.1)
|
matrix-synapse is an ecosystem for open federated Instant Messaging and VoIP. Affected versions of this package are vulnerable to Information Exposure. An attacker can query remote users' device information which can be used to enumerate the remote users known to a homeserver. How to fix Information Exposure? Upgrade |
[,1.95.1)
|
matrix-synapse is an ecosystem for open federated Instant Messaging and VoIP. Affected versions of this package are vulnerable to Allocation of Resources Without Limits or Throttling via the How to fix Allocation of Resources Without Limits or Throttling? Upgrade |
[,1.94.0rc1)
|
matrix-synapse is an ecosystem for open federated Instant Messaging and VoIP. Affected versions of this package are vulnerable to Improper Input Validation due to the improper validation of receipts. An attacker can forge read receipts for any event by knowing the room ID and event ID. How to fix Improper Input Validation? Upgrade |
[0.34.0,1.93.0)
|
matrix-synapse is an ecosystem for open federated Instant Messaging and VoIP. Affected versions of this package are vulnerable to Information Exposure due to temporarily stored plaintext passwords in the server database. An attacker can potentially access these passwords if they have access to the database backups. How to fix Information Exposure? Upgrade |
[1.66.0,1.93.0)
|