Page 9 of 47 results (0.010 seconds)

CVSS: 5.3EPSS: 2%CPEs: 1EXPL: 6

An email address enumeration vulnerability exists in the password reset function of Rocket.Chat through 3.9.1. Se presenta una vulnerabilidad de enumeración de direcciones de correo electrónico en la función password reset de Rocket.Chat versiones hasta 3.9.1 Rocket.Chat versions 3.7.1 and below suffers from an email address enumeration vulnerability. • http://packetstormsecurity.com/files/160845/Rocket.Chat-3.7.1-Email-Address-Enumeration.html http://seclists.org/fulldisclosure/2021/Jan/32 http://seclists.org/fulldisclosure/2021/Jan/43 http://www.openwall.com/lists/oss-security/2021/01/07/1 http://www.openwall.com/lists/oss-security/2021/01/08/1 http://www.openwall.com/lists/oss-security/2021/01/13/1 https://trovent.github.io/security-advisories/TRSA-2010-01/TRSA-2010-01.txt https://trovent.io/security-advisory-201 • CWE-203: Observable Discrepancy •

CVSS: 9.8EPSS: 0%CPEs: 6EXPL: 0

Rocket.Chat before 0.74.4, 1.x before 1.3.4, 2.x before 2.4.13, 3.x before 3.7.3, 3.8.x before 3.8.3, and 3.9.x before 3.9.1 mishandles SAML login. Rocket.Chat versiones anteriores a 0.74.4, versiones 1.x anteriores a 1.3.4, versiones 2.x anteriores a 2.4.13, versiones 3.x anteriores a 3.7.3, versiones 3.8.x anteriores a 3.8.3 y versiones 3.9.x anteriores a 3.9.1, maneja inapropiadamente el inicio de sesión de SAML. • https://github.com/RocketChat/Rocket.Chat/compare/3.8.2...3.8.3 https://github.com/RocketChat/Rocket.Chat/releases/tag/3.9.1 •

CVSS: 6.1EPSS: 0%CPEs: 1EXPL: 1

Rocket.Chat through 3.4.2 allows XSS where an attacker can send a specially crafted message to a channel or in a direct message to the client which results in remote code execution on the client side. Rocket.Chat versiones hasta 3.4.2, permite un ataque de tipo XSS donde un atacante puede enviar un mensaje especialmente diseñado hacia un canal o en un mensaje directo al cliente que resulta en la ejecución de código remota en el lado del cliente. • https://blog.redteam.pl/2020/08/rocket-chat-xss-rce-cve-2020-15926.html https://github.com/RocketChat/Rocket.Chat/commits/develop https://github.com/RocketChat/Rocket.Chat/pull/18356 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 6.1EPSS: 0%CPEs: 1EXPL: 2

Rocket.Chat before 2.1.0 allows XSS via a URL on a ![title] line. Rocket.Chat versiones anteriores a 2.1.0, permite un ataque de tipo XSS por medio de una URL en una línea ![title]. Rocket.Chat version 2.1.0 suffers from a cross site scripting vulnerability. • https://www.exploit-db.com/exploits/47537 http://packetstormsecurity.com/files/154944/Rocket.Chat-2.1.0-Cross-Site-Scripting.html https://github.com/RocketChat/Rocket.Chat/commits/develop https://github.com/RocketChat/Rocket.Chat/releases https://www.nezami.me • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 5.4EPSS: 0%CPEs: 1EXPL: 0

A reflected XSS issue was discovered in the registration form in Rocket.Chat before 0.66. When one creates an account, the next step will ask for a username. This field will not save HTML control characters but an error will be displayed that shows the attempted username unescaped via packages/rocketchat-ui-login/client/username/username.js in packages/rocketchat-ui-login/client/username/username.html. Se ha descubierto un problema de Cross-Site Scripting (XSS) reflejado en el formulario de registro en Rocket.Chat en versiones anteriores a la 0.66. Cuando se crea una cuenta, el siguiente paso solicitará un nombre de usuario. • https://github.com/RocketChat/Rocket.Chat/issues/10795 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •