Page 20 of 110 results (0.006 seconds)

CVSS: 4.3EPSS: 0%CPEs: 2EXPL: 0

Nextcloud Server before 9.0.55 and 10.0.2 suffers from a Content-Spoofing vulnerability in the "files" app. The top navigation bar displayed in the files list contained partially user-controllable input leading to a potential misrepresentation of information. Nextcloud Server en versiones anteriores a 9.0.55 y 10.0.2 sufre una vulnerabilidad de Content-Spoofing en la aplicación "files". La barra de navegación superior mostrada en la lista de archivos contenía entradas parcialmente controlables por el usuario que conducían a una posible representación errónea de la información. • http://www.securityfocus.com/bid/97491 https://hackerone.com/reports/179073 https://nextcloud.com/security/advisory/?id=nc-sa-2017-006 • CWE-20: Improper Input Validation CWE-451: User Interface (UI) Misrepresentation of Critical Information •

CVSS: 4.3EPSS: 0%CPEs: 2EXPL: 0

Nextcloud Server before 9.0.55 and 10.0.2 suffers from a creation of folders in read-only folders despite lacking permissions issue. Due to a logical error in the file caching layer an authenticated adversary is able to create empty folders inside a shared folder. Note that this only affects folders and files that the adversary has at least read-only permissions for. Nextcloud Server en versiones anteriores a 9.0.55 y 10.0.2 sufre de una creación de carpetas en carpetas de sólo lectura a pesar del problema de permisos que faltan. Debido a un error lógico en la capa de caché de archivos, un adversario autenticado puede crear carpetas vacías dentro de una carpeta compartida. • https://hackerone.com/reports/169680 https://nextcloud.com/security/advisory/?id=nc-sa-2017-002 • CWE-275: Permission Issues CWE-732: Incorrect Permission Assignment for Critical Resource •

CVSS: 4.3EPSS: 0%CPEs: 2EXPL: 0

Nextcloud Server before 9.0.55 and 10.0.2 suffers from a bypass in the quota limitation. Due to not properly sanitizing values provided by the `OC-Total-Length` HTTP header an authenticated adversary may be able to exceed their configured user quota. Thus using more space than allowed by the administrator. Nextcloud Server en versiones anteriores a 9.0.55 y 10.0.2 Sufre una evasión en la limitación de cuota. Debido a que no se desinfectan correctamente los valores proporcionados por la cabecera "OC-Total-Length" HTTP, un adversario autenticado puede superar su cuota de usuario configurada. • https://hackerone.com/reports/173622 https://nextcloud.com/security/advisory/?id=nc-sa-2017-005 • CWE-20: Improper Input Validation CWE-807: Reliance on Untrusted Inputs in a Security Decision •

CVSS: 6.4EPSS: 0%CPEs: 2EXPL: 0

Nextcloud Server before 9.0.55 and 10.0.2 suffers from a permission increase on re-sharing via OCS API issue. A permission related issue within the OCS sharing API allowed an authenticated adversary to reshare shared files with an increasing permission set. This may allow an attacker to edit files in a share despite having only a 'read' permission set. Note that this only affects folders and files that the adversary has at least read-only permissions for. Nextcloud Server en versiones anteriores a 9.0.55 y 10.0.2 sufre un aumento de permiso al volver a compartir a través del problema de la API de OCS compartiendo API permitió a un adversario autenticado compartir archivos compartidos con un conjunto de permisos creciente. • https://hackerone.com/reports/169680 https://nextcloud.com/security/advisory/?id=nc-sa-2017-001 • CWE-275: Permission Issues CWE-732: Incorrect Permission Assignment for Critical Resource •

CVSS: 4.3EPSS: 0%CPEs: 2EXPL: 0

Nextcloud Server before 9.0.55 and 10.0.2 suffers from a error message disclosing existence of file in write-only share. Due to an error in the application logic an adversary with access to a write-only share may enumerate the names of existing files and subfolders by comparing the exception messages. Nextcloud Server en versiones anteriores a 9.0.55 y 10.0.2 sufre de un mensaje de error que revela la existencia de archivo en el recurso de sólo escritura. Debido a un error en la lógica de la aplicación, un adversario con acceso a un recurso compartido de sólo escritura puede enumerar los nombres de los archivos y subcarpetas existentes comparando los mensajes de excepción. • https://hackerone.com/reports/174524 https://nextcloud.com/security/advisory/?id=nc-sa-2017-003 • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor CWE-209: Generation of Error Message Containing Sensitive Information •