Page 2 of 19 results (0.010 seconds)

CVSS: 4.3EPSS: 0%CPEs: 6EXPL: 2

Nextcloud Talk is a video and audio conferencing app for Nextcloud. In versions prior to 13.0.5 and 14.0.0, a call moderator can indirectly enable user webcams by granting permissions, if they were enabled before removing the permissions. A patch is available in versions 13.0.5 and 14.0.0. There are currently no known workarounds. Nextcloud Talk es una aplicación de videoconferencia y audioconferencia para Nextcloud. • https://github.com/nextcloud/security-advisories/security/advisories/GHSA-vxpr-hcqq-7fw7 https://github.com/nextcloud/spreed/issues/7048 https://github.com/nextcloud/spreed/pull/7034 https://github.com/nextcloud/spreed/pull/7092 • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor CWE-276: Incorrect Default Permissions CWE-359: Exposure of Private Personal Information to an Unauthorized Actor •

CVSS: 6.1EPSS: 0%CPEs: 6EXPL: 1

Nextcloud Talk is a video and audio conferencing app for Nextcloud, a self-hosted productivity platform. Prior to versions 11.3.4, 12.2.2, and 13.0.0, when sharing a Deck card in conversation, the metaData can be manipulated so users can be tricked into opening arbitrary URLs. This issue is fixed in versions 11.3.4, 12.2.2, and 13.0.0. There are currently no known workarounds. Nextcloud Talk es una aplicación de videoconferencia y audioconferencia para Nextcloud, una plataforma de productividad autoalojada. • https://github.com/nextcloud/security-advisories/security/advisories/GHSA-j45w-7mpq-264c https://github.com/nextcloud/spreed/pull/6410 https://hackerone.com/reports/1358977 • CWE-601: URL Redirection to Untrusted Site ('Open Redirect') •

CVSS: 2.4EPSS: 0%CPEs: 1EXPL: 0

Nextcloud talk is a self hosting messaging service. In versions prior to 12.3.0 the Nextcloud Android Talk application did not properly detect the lockscreen state when a call was incoming. If an attacker got physical access to the locked phone, and the victim received a phone call the attacker could gain access to the chat messages and files of the user. It is recommended that the Nextcloud Android Talk App is upgraded to 12.3.0. There are no known workarounds. • https://github.com/nextcloud/security-advisories/security/advisories/GHSA-497c-c8hx-6qcf https://github.com/nextcloud/talk-android/pull/1585 • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor CWE-287: Improper Authentication •

CVSS: 6.1EPSS: 0%CPEs: 1EXPL: 1

Nextcloud talk is a self hosting messaging service. In versions prior 12.1.2 an attacker is able to control the link of a geolocation preview in the Nextcloud Talk application due to a lack of validation on the link. This could result in an open-redirect, but required user interaction. This only affected users of the Android Talk client. It is recommended that the Nextcloud Talk App is upgraded to 12.1.2. • https://github.com/nextcloud/security-advisories/security/advisories/GHSA-4fxr-mrw2-cq92 https://github.com/nextcloud/spreed/pull/6239 https://hackerone.com/reports/1337178 • CWE-601: URL Redirection to Untrusted Site ('Open Redirect') •

CVSS: 6.4EPSS: 0%CPEs: 3EXPL: 0

Nextcloud is an open-source, self-hosted productivity platform. The Nextcloud Talk application was vulnerable to a stored Cross-Site Scripting (XSS) vulnerability. For exploitation, a user would need to right-click on a malicious file and open the file in a new tab. Due the strict Content-Security-Policy shipped with Nextcloud, this issue is not exploitable on modern browsers supporting Content-Security-Policy. It is recommended that the Nextcloud Talk application is upgraded to patched versions 10.0.7, 10.1.4, 11.1.2, 11.2.0 or 12.0.0. • https://github.com/nextcloud/security-advisories/security/advisories/GHSA-xhxq-f4vg-jw5g https://github.com/nextcloud/spreed/pull/542 https://hackerone.com/reports/1135481 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') CWE-434: Unrestricted Upload of File with Dangerous Type •