Page 10 of 116 results (0.012 seconds)

CVSS: 3.5EPSS: 0%CPEs: 3EXPL: 0

Nextcloud Server is a Nextcloud package that handles data storage. In versions prior to 19.0.11, 20.0.10, and 21.0.2, an attacker is able to convert a Files Drop link to a federated share. This causes an issue on the UI side of the sharing user. When the sharing user opens the sharing panel and tries to remove the "Create" privileges of this unexpected share, Nextcloud server would silently grant the share read privileges. The vulnerability is patched in versions 19.0.11, 20.0.10 and 21.0.2. • https://github.com/nextcloud/security-advisories/security/advisories/GHSA-grph-cm44-p3jv https://hackerone.com/reports/1167929 https://security.gentoo.org/glsa/202208-17 • CWE-241: Improper Handling of Unexpected Data Type •

CVSS: 9.1EPSS: 0%CPEs: 3EXPL: 0

Nextcloud Server is a Nextcloud package that handles data storage. In versions prior to 19.0.11, 20.0.10, and 21.0.2, an attacker is able to receive write/read privileges on any Federated File Share. Since public links can be added as federated file share, this can also be exploited on any public link. Users can upgrade to patched versions (19.0.11, 20.0.10 or 21.0.2) or, as a workaround, disable federated file sharing. Nextcloud Server es un paquete de Nextcloud que maneja el almacenamiento de datos. • https://github.com/nextcloud/security-advisories/security/advisories/GHSA-jf9h-v24c-22g5 https://hackerone.com/reports/1170024 https://security.gentoo.org/glsa/202208-17 • CWE-639: Authorization Bypass Through User-Controlled Key •

CVSS: 4.0EPSS: 0%CPEs: 3EXPL: 0

Nextcloud Server is a Nextcloud package that handles data storage. Nextcloud Server versions prior to 19.0.11, 20.0.10, or 21.0.2 send user IDs to the lookup server even if the user has no fields set to published. The vulnerability is patched in versions 19.0.11, 20.0.10, and 21.0.2; no workarounds outside the updates are known to exist. Nextcloud Server es un paquete de Nextcloud que maneja el almacenamiento de datos. Nextcloud Server versiones anteriores 19.0.11, 20.0.10 o 21.0.2, envían los ID de usuario al servidor de búsqueda incluso si el usuario no presenta ningún campo ajustado para ser publicado. • https://github.com/nextcloud/security-advisories/security/advisories/GHSA-396j-vqpr-qg45 https://hackerone.com/reports/1173436 https://security.gentoo.org/glsa/202208-17 • CWE-201: Insertion of Sensitive Information Into Sent Data •

CVSS: 6.7EPSS: 0%CPEs: 2EXPL: 2

Nextcloud Server prior to 20.0.0 stores passwords in a recoverable format even when external storage is not configured. Nextcloud Server versiones anteriores a 20.0.0, almacena las contraseñas en un formato recuperable inclusive cuando el almacenamiento externo no está configurado • https://github.com/nextcloud/server/issues/17439 https://github.com/nextcloud/server/pull/21037 https://hackerone.com/reports/867164 https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/L6BO6P6MP2MOWA6PZRXX32PLWPXN5O4S https://nextcloud.com/security/advisory/?id=NC-SA-2021-006 • CWE-257: Storing Passwords in a Recoverable Format CWE-521: Weak Password Requirements •

CVSS: 4.8EPSS: 0%CPEs: 2EXPL: 1

Nextcloud Server prior to 20.0.6 is vulnerable to reflected cross-site scripting (XSS) due to lack of sanitization in `OC.Notification.show`. Nextcloud Server versiones anteriores a 20.0.6, es vulnerable a un ataque de tipo cross-site scripting (XSS) reflejado debido a una falta de saneamiento en "OC.Notification.show" • https://github.com/nextcloud/server/pull/25234 https://hackerone.com/reports/896522 https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/L6BO6P6MP2MOWA6PZRXX32PLWPXN5O4S https://nextcloud.com/security/advisory/?id=NC-SA-2021-005 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •