Vulnerabilities (CVE)

Filtered by vendor Rocket.chat Subscribe
Total 48 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2020-28208 1 Rocket.chat 1 Rocket.chat 2024-11-21 5.0 MEDIUM 5.3 MEDIUM
An email address enumeration vulnerability exists in the password reset function of Rocket.Chat through 3.9.1.
CVE-2020-26763 1 Rocket.chat 1 Rocket.chat 2024-11-21 5.0 MEDIUM 7.5 HIGH
The Rocket.Chat desktop application 2.17.11 opens external links without user interaction.
CVE-2020-15926 1 Rocket.chat 1 Rocket.chat 2024-11-21 4.3 MEDIUM 6.1 MEDIUM
Rocket.Chat through 3.4.2 allows XSS where an attacker can send a specially crafted message to a channel or in a direct message to the client which results in remote code execution on the client side.
CVE-2019-17220 1 Rocket.chat 1 Rocket.chat 2024-11-21 4.3 MEDIUM 6.1 MEDIUM
Rocket.Chat before 2.1.0 allows XSS via a URL on a ![title] line.
CVE-2018-13879 1 Rocket.chat 1 Rocket.chat 2024-11-21 3.5 LOW 5.4 MEDIUM
A reflected XSS issue was discovered in the registration form in Rocket.Chat before 0.66. When one creates an account, the next step will ask for a username. This field will not save HTML control characters but an error will be displayed that shows the attempted username unescaped via packages/rocketchat-ui-login/client/username/username.js in packages/rocketchat-ui-login/client/username/username.html.
CVE-2018-13878 1 Rocket.chat 1 Rocket.chat 2024-11-21 4.3 MEDIUM 6.1 MEDIUM
An XSS issue was discovered in packages/rocketchat-mentions/Mentions.js in Rocket.Chat before 0.65. The real name of a username is displayed unescaped when the user is mentioned (using the @ symbol) in a channel or private chat. Consequently, it is possible to exfiltrate the secret token of every user and also admins in the channel.
CVE-2017-1000493 1 Rocket.chat 1 Rocket.chat 2024-11-21 7.5 HIGH 9.8 CRITICAL
Rocket.Chat Server version 0.59 and prior is vulnerable to a NoSQL injection leading to administrator account takeover
CVE-2024-39713 1 Rocket.chat 1 Rocket.chat 2024-09-06 N/A 8.6 HIGH
A Server-Side Request Forgery (SSRF) affects Rocket.Chat's Twilio webhook endpoint before version 6.10.1.