Page 15 of 167 results (0.003 seconds)

CVSS: 2.6EPSS: 0%CPEs: 1EXPL: 0

ownCloud Desktop Client before 1.8.2 does not call QNetworkReply::ignoreSslErrors with the list of errors to be ignored, which allows man-in-the-middle attackers to bypass the user's certificate distrust decision and obtain sensitive information by leveraging a self-signed certificate and a connection to a server using its own self-signed certificate. ownCloud Desktop Client en versiones anteriores a 1.8.2 no llama a QNetworkReply::ignoreSslErrors con la lista de errores a ignorar, lo que permite a atacantes man-in-the-middle eludir la decisión de no confiar en el certificado de usuario y obtener información sensible aprovechando un certificado autofirmado y una conexión a un servidor usando su propio certificado autofirmado. • http://www.debian.org/security/2015/dsa-3363 http://www.securityfocus.com/bid/75354 https://github.com/owncloud/client/issues/3283 https://owncloud.org/security/advisory/?id=oc-sa-2015-009 •

CVSS: 4.3EPSS: 0%CPEs: 3EXPL: 0

Multiple cross-site scripting (XSS) vulnerabilities in WebODF before 0.5.5, as used in ownCloud, allow remote attackers to inject arbitrary web script or HTML via a (1) style or (2) font name or (3) javascript or (4) data URI. Múltiples vulnerabilidades de XSS en WebODF anterior a 0.5.5, utilizado en ownCloud, permiten a atacantes remotos inyectar secuencias de comandos web arbitrarios o HTML a través de una URI (1) de estilos o (2) de nombres de fuentes o (3) de javascript o (4) de datos. • http://www.debian.org/security/2015/dsa-3244 http://www.securityfocus.com/bid/74445 https://github.com/kogmbh/WebODF/blob/master/ChangeLog.md https://github.com/kogmbh/WebODF/pull/849 https://github.com/kogmbh/WebODF/pull/850/files https://owncloud.org/security/advisory/?id=oc-sa-2015-002 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 3.5EPSS: 0%CPEs: 4EXPL: 0

Multiple cross-site scripting (XSS) vulnerabilities in the contacts application in ownCloud Server Community Edition before 5.0.19, 6.x before 6.0.7, and 7.x before 7.0.5 allow remote authenticated users to inject arbitrary web script or HTML via a crafted contact. Múltiples vulnerabilidades de XSS en la aplicación de contactos en ownCloud Server Community Edition anterior a 5.0.19, 6.x anterior a 6.0.7, y 7.x anterior a 7.0.5 permiten a usuarios remotos autenticados inyectar secuencias de comandos web arbitrarios o HTML a través de un contacto manipulado. • http://www.debian.org/security/2015/dsa-3244 http://www.securityfocus.com/bid/74445 https://owncloud.org/security/advisory/?id=oc-sa-2015-001 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 6.0EPSS: 0%CPEs: 3EXPL: 0

ownCloud Server before 5.0.19, 6.x before 6.0.7, and 7.x before 7.0.5 allows remote authenticated users to bypass the file blacklist and upload arbitrary files via a file path with UTF-8 encoding, as demonstrated by uploading a .htaccess file. ownCloud Server anterior a 5.0.19, 6.x anterior a 6.0.7, y 7.x anterior a 7.0.5 permite a usuarios remotos autenticados evadir la lista negra de ficheros y subir ficheros arbitrarios a través de una ruta de ficheros con la codificación UTF-8, tal y como fue demostrado mediante la subida de un fichero .htaccess. • http://www.debian.org/security/2015/dsa-3244 http://www.securityfocus.com/bid/74451 https://owncloud.org/security/advisory/?id=oc-sa-2015-003 https://owncloud.org/security/advisory/?id=oc-sa-2015-004 • CWE-74: Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection') •

CVSS: 4.3EPSS: 0%CPEs: 1EXPL: 0

The SFTP external storage driver (files_external) in ownCloud Server before 6.0.5 validates the RSA Host key after login, which allows remote attackers to obtain sensitive information by sniffing the network. El controlador del almacenaje externo de SFTP (files_external) en ownCloud Server anterior a 6.0.5 valida la clave del anfitrión RSA después del inicio de sesión, lo que permite a atacantes remotos obtener información sensible mediante la captura de trafico de la red. • https://owncloud.org/security/advisory/?id=oc-sa-2014-019 • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •