Note:
This project will be discontinued after December 13, 2021. [more]
Product:
Rocket\.chat
(Rocket\.chat)Repositories |
Unknown: This might be proprietary software. |
#Vulnerabilities | 49 |
Date | Id | Summary | Products | Score | Patch | Annotated |
---|---|---|---|---|---|---|
2019-10-21 | CVE-2019-17220 | Rocket.Chat before 2.1.0 allows XSS via a URL on a ![title] line. | Rocket\.chat | N/A | ||
2018-01-03 | CVE-2017-1000493 | Rocket.Chat Server version 0.59 and prior is vulnerable to a NoSQL injection leading to administrator account takeover | Rocket\.chat | 9.8 | ||
2018-07-10 | CVE-2018-13879 | A reflected XSS issue was discovered in the registration form in Rocket.Chat before 0.66. When one creates an account, the next step will ask for a username. This field will not save HTML control characters but an error will be displayed that shows the attempted username unescaped via packages/rocketchat-ui-login/client/username/username.js in packages/rocketchat-ui-login/client/username/username.html. | Rocket\.chat | 5.4 | ||
2018-07-10 | CVE-2018-13878 | An XSS issue was discovered in packages/rocketchat-mentions/Mentions.js in Rocket.Chat before 0.65. The real name of a username is displayed unescaped when the user is mentioned (using the @ symbol) in a channel or private chat. Consequently, it is possible to exfiltrate the secret token of every user and also admins in the channel. | Rocket\.chat | 6.1 |