Affected by GO-2022-0540
and 17 other vulnerabilities
GO-2022-0540 : Mattermost users could access some sensitive information via API call in github.com/mattermost/mattermost-server
GO-2022-0576 : Insecure plugin handling in Mattermost in github.com/mattermost/mattermost-server
GO-2022-0595 : Resource exhaustion in Mattermost in github.com/mattermost/mattermost-server
GO-2022-0599 : Improper Control of a Resource Through its Lifetime in Mattermost in github.com/mattermost/mattermost-server
GO-2022-0604 : Cross-site Scripting in Mattermost in github.com/mattermost/mattermost-server
GO-2022-0616 : Improper Privilege Management in Mattermost in github.com/mattermost/mattermost-server
GO-2023-1939 : Mattermost Server Sensitive Data Exposure in github.com/mattermost/mattermost
GO-2024-2444 : Mattermost allows demoted guests to change group names in github.com/mattermost/mattermost-server
GO-2024-2446 : Mattermost Cross-site Scripting vulnerability in github.com/mattermost/mattermost-server
GO-2024-2448 : Mattermost notified all users in the channel when using WebSockets to respond individually in github.com/mattermost/mattermost-server
GO-2024-2450 : Mattermost viewing archived public channels permissions vulnerability in github.com/mattermost/mattermost-server
GO-2024-2707 : Mattermost Server Improper Access Control in github.com/mattermost/mattermost-server
GO-2024-3164 : Mattermost fails to strip `embeds` from `metadata` when broadcasting `posted` events in github.com/mattermost/mattermost-server
GO-2024-3227 : Mattermost incorrectly issues two sessions when using desktop SSO in github.com/mattermost/mattermost-server
GO-2024-3232 : Mattermost Server allows user to get private channel names in github.com/mattermost/mattermost-server
GO-2024-3233 : Mattermost Server Path Traversal vulnerability that leads to Cross-Site Request Forgery in github.com/mattermost/mattermost-server
GO-2024-3234 : Mattermost Server vulnerable to application crash from attacker-generated large response in github.com/mattermost/mattermost-server
GO-2024-3235 : Mattermost server allows authenticated user to delete arbitrary post in github.com/mattermost/mattermost-server
The highest tagged major version is
v6 .
Discover Packages
github.com/mattermost/mattermost-server
Godeps
_workspace
src
golang.org
x
crypto
blowfish
package
Version:
v2.0.0+incompatible
Opens a new window with list of versions in this module.
Published: Feb 13, 2016
License: AGPL-3.0, Apache-2.0
Opens a new window with license information.
Imports: 1
Opens a new window with list of imports.
Imported by: 0
Opens a new window with list of known importers.
Documentation
Documentation
¶
Package blowfish implements Bruce Schneier's Blowfish encryption algorithm.
The Blowfish block size in bytes.
ExpandKey performs a key expansion on the given *Cipher. Specifically, it
performs the Blowfish algorithm's key schedule which sets up the *Cipher's
pi and substitution tables for calls to Encrypt. This is used, primarily,
by the bcrypt package to reuse the Blowfish key schedule during its
set up. It's unlikely that you need to use this directly.
A Cipher is an instance of Blowfish encryption using a particular key.
NewCipher creates and returns a Cipher.
The key argument should be the Blowfish key, from 1 to 56 bytes.
NewSaltedCipher creates a returns a Cipher that folds a salt into its key
schedule. For most purposes, NewCipher, instead of NewSaltedCipher, is
sufficient and desirable. For bcrypt compatiblity, the key can be over 56
bytes.
BlockSize returns the Blowfish block size, 8 bytes.
It is necessary to satisfy the Block interface in the
package "crypto/cipher".
Decrypt decrypts the 8-byte buffer src using the key k
and stores the result in dst.
Encrypt encrypts the 8-byte buffer src using the key k
and stores the result in dst.
Note that for amounts of data larger than a block,
it is not safe to just call Encrypt on successive blocks;
instead, use an encryption mode like CBC (see crypto/cipher/cbc.go).
Source Files
¶
Click to show internal directories.
Click to hide internal directories.