Filtered by vendor Rocket.chat
Subscriptions
Total
57 CVE
| CVE | Vendors | Products | Updated | CVSS v3.1 |
|---|---|---|---|---|
| CVE-2021-32832 | 1 Rocket.chat | 1 Rocket.chat | 2024-11-21 | 4.3 Medium |
| Rocket.Chat is an open-source fully customizable communications platform developed in JavaScript. In Rocket.Chat before versions 3.11.3, 3.12.2, and 3.13 an issue with certain regular expressions could lead potentially to Denial of Service. This was fixed in versions 3.11.3, 3.12.2, and 3.13. | ||||
| CVE-2021-22911 | 1 Rocket.chat | 1 Rocket.chat | 2024-11-21 | 9.8 Critical |
| A improper input sanitization vulnerability exists in Rocket.Chat server 3.11, 3.12 & 3.13 that could lead to unauthenticated NoSQL injection, resulting potentially in RCE. | ||||
| CVE-2021-22910 | 1 Rocket.chat | 1 Rocket.chat | 2024-11-21 | 9.8 Critical |
| A sanitization vulnerability exists in Rocket.Chat server versions <3.13.2, <3.12.4, <3.11.4 that allowed queries to an endpoint which could result in a NoSQL injection, potentially leading to RCE. | ||||
| CVE-2021-22892 | 1 Rocket.chat | 1 Rocket.chat | 2024-11-21 | 7.5 High |
| An information disclosure vulnerability exists in the Rocket.Chat server fixed v3.13, v3.12.2 & v3.11.3 that allowed email addresses to be disclosed by enumeration and validation checks. | ||||
| CVE-2021-22886 | 1 Rocket.chat | 1 Rocket.chat | 2024-11-21 | 6.1 Medium |
| Rocket.Chat before 3.11, 3.10.5, 3.9.7, 3.8.8 is vulnerable to persistent cross-site scripting (XSS) using nested markdown tags allowing a remote attacker to inject arbitrary JavaScript in a message. This flaw leads to arbitrary file read and RCE on Rocket.Chat desktop app. | ||||
| CVE-2020-8292 | 1 Rocket.chat | 1 Rocket.chat | 2024-11-21 | 5.4 Medium |
| Rocket.Chat server before 3.9.0 is vulnerable to a self cross-site scripting (XSS) vulnerability via the drag & drop functionality in message boxes. | ||||
| CVE-2020-8291 | 1 Rocket.chat | 1 Rocket.chat | 2024-11-21 | 6.1 Medium |
| A link preview rendering issue in Rocket.Chat versions before 3.9 could lead to potential XSS attacks. | ||||
| CVE-2020-8288 | 1 Rocket.chat | 1 Rocket.chat | 2024-11-21 | 5.4 Medium |
| The `specializedRendering` function in Rocket.Chat server before 3.9.2 allows a cross-site scripting (XSS) vulnerability by way of the `value` parameter. | ||||
| CVE-2020-29594 | 1 Rocket.chat | 1 Rocket.chat | 2024-11-21 | 9.8 Critical |
| Rocket.Chat before 0.74.4, 1.x before 1.3.4, 2.x before 2.4.13, 3.x before 3.7.3, 3.8.x before 3.8.3, and 3.9.x before 3.9.1 mishandles SAML login. | ||||
| CVE-2020-28208 | 1 Rocket.chat | 1 Rocket.chat | 2024-11-21 | 5.3 Medium |
| An email address enumeration vulnerability exists in the password reset function of Rocket.Chat through 3.9.1. | ||||
| CVE-2020-26763 | 1 Rocket.chat | 1 Rocket.chat | 2024-11-21 | 7.5 High |
| The Rocket.Chat desktop application 2.17.11 opens external links without user interaction. | ||||
| CVE-2020-15926 | 1 Rocket.chat | 1 Rocket.chat | 2024-11-21 | 6.1 Medium |
| Rocket.Chat through 3.4.2 allows XSS where an attacker can send a specially crafted message to a channel or in a direct message to the client which results in remote code execution on the client side. | ||||
| CVE-2019-17220 | 1 Rocket.chat | 1 Rocket.chat | 2024-11-21 | 6.1 Medium |
| Rocket.Chat before 2.1.0 allows XSS via a URL on a ![title] line. | ||||
| CVE-2018-13879 | 1 Rocket.chat | 1 Rocket.chat | 2024-11-21 | N/A |
| A reflected XSS issue was discovered in the registration form in Rocket.Chat before 0.66. When one creates an account, the next step will ask for a username. This field will not save HTML control characters but an error will be displayed that shows the attempted username unescaped via packages/rocketchat-ui-login/client/username/username.js in packages/rocketchat-ui-login/client/username/username.html. | ||||
| CVE-2018-13878 | 1 Rocket.chat | 1 Rocket.chat | 2024-11-21 | N/A |
| An XSS issue was discovered in packages/rocketchat-mentions/Mentions.js in Rocket.Chat before 0.65. The real name of a username is displayed unescaped when the user is mentioned (using the @ symbol) in a channel or private chat. Consequently, it is possible to exfiltrate the secret token of every user and also admins in the channel. | ||||
| CVE-2017-1000493 | 1 Rocket.chat | 1 Rocket.chat | 2024-11-21 | N/A |
| Rocket.Chat Server version 0.59 and prior is vulnerable to a NoSQL injection leading to administrator account takeover | ||||
| CVE-2024-39713 | 1 Rocket.chat | 1 Rocket.chat | 2024-09-06 | 8.6 High |
| A Server-Side Request Forgery (SSRF) affects Rocket.Chat's Twilio webhook endpoint before version 6.10.1. | ||||