Vulnerabilities (CVE)

Filtered by vendor Zulip Subscribe
Filtered by product Zulip Server
Total 29 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2020-14194 1 Zulip 1 Zulip Server 2024-02-04 5.8 MEDIUM 5.4 MEDIUM
Zulip Server before 2.1.5 allows reverse tabnapping via a topic header link.
CVE-2020-10935 1 Zulip 1 Zulip Server 2024-02-04 3.5 LOW 5.4 MEDIUM
Zulip Server before 2.1.3 allows XSS via a Markdown link, with resultant account takeover.
CVE-2020-9445 1 Zulip 1 Zulip Server 2024-02-04 4.3 MEDIUM 6.1 MEDIUM
Zulip Server before 2.1.3 allows XSS via the modal_link feature in the Markdown functionality.
CVE-2020-14215 1 Zulip 1 Zulip Server 2024-02-04 5.0 MEDIUM 7.5 HIGH
Zulip Server before 2.1.5 has Incorrect Access Control because 0198_preregistrationuser_invited_as adds the administrator role to invitations.
CVE-2020-12759 1 Zulip 1 Zulip Server 2024-02-04 4.3 MEDIUM 6.1 MEDIUM
Zulip Server before 2.1.5 allows reflected XSS via the Dropbox webhook.
CVE-2020-15070 1 Zulip 1 Zulip Server 2024-02-04 6.5 MEDIUM 8.8 HIGH
Zulip Server 2.x before 2.1.7 allows eval injection if a privileged attacker were able to write directly to the postgres database, and chose to write a crafted custom profile field value.
CVE-2019-18933 1 Zulip 1 Zulip Server 2024-02-04 7.5 HIGH 9.8 CRITICAL
In Zulip Server versions from 1.7.0 to before 2.0.7, a bug in the new user signup process meant that users who registered their account using social authentication (e.g., GitHub or Google SSO) in an organization that also allows password authentication could have their personal API key stolen by an unprivileged attacker, allowing nearly full access to the user's account.
CVE-2019-19775 1 Zulip 1 Zulip Server 2024-02-04 5.8 MEDIUM 6.1 MEDIUM
The image thumbnailing handler in Zulip Server versions 1.9.0 to before 2.0.8 allowed an open redirect that was visible to logged-in users.
CVE-2019-16216 1 Zulip 1 Zulip Server 2024-02-04 3.5 LOW 5.4 MEDIUM
Zulip server before 2.0.5 incompletely validated the MIME types of uploaded files. A user who is logged into the server could upload files of certain types to mount a stored cross-site scripting attack on other logged-in users. On a Zulip server using the default local uploads backend, the attack is only effective against browsers lacking support for Content-Security-Policy such as Internet Explorer 11. On a Zulip server using the S3 uploads backend, the attack is confined to the origin of the configured S3 uploads hostname and cannot reach the Zulip server itself.