Page 3 of 19 results (0.024 seconds)

CVSS: 8.1EPSS: 0%CPEs: 1EXPL: 0

Nextcloud Talk is a fully on-premises audio/video and chat communication service. In versions prior to 11.2.2, if a user was able to reuse an earlier used username, they could get access to any chat message sent to the previous user with this username. The issue was patched in versions 11.2.2 and 11.3.0. As a workaround, don't allow users to choose usernames themselves. This is the default behaviour of Nextcloud, but some user providers may allow doing so. • https://github.com/nextcloud/security-advisories/security/advisories/GHSA-xv6f-344w-895c https://github.com/nextcloud/spreed/pull/5633 https://github.com/nextcloud/spreed/releases/tag/v11.2.2 https://github.com/nextcloud/spreed/releases/tag/v11.3.0 https://hackerone.com/reports/1200700 • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor CWE-708: Incorrect Ownership Assignment •

CVSS: 6.5EPSS: 0%CPEs: 3EXPL: 0

Nextcloud Talk is a fully on-premises audio/video and chat communication service. Password protected shared chats in Talk before version 9.0.10, 10.0.8 and 11.2.2 did not rotate the session cookie after a successful authentication event. It is recommended that the Nextcloud Talk App is upgraded to 9.0.10, 10.0.8 or 11.2.2. No workarounds for this vulnerability are known to exist. Nextcloud Talk es un servicio de comunicación de audio/vídeo y chat totalmente local. • https://github.com/nextcloud/security-advisories/security/advisories/GHSA-p6h7-84v4-827r https://hackerone.com/reports/1181962 • CWE-384: Session Fixation •

CVSS: 9.9EPSS: 0%CPEs: 3EXPL: 1

A too lax check in Nextcloud Talk 6.0.4, 7.0.2 and 8.0.7 allowed a code injection when a not correctly sanitized talk command was added by an administrator. Una comprobación demasiado laxa en Nextcloud Talk versiones 6.0.4, 7.0.2 y 8.0.7, permitió una inyección de código cuando un comando de talk no saneado correctamente fue agregado por parte de un administrador • https://hackerone.com/reports/851807 https://nextcloud.com/security/advisory/?id=NC-SA-2020-021 • CWE-94: Improper Control of Generation of Code ('Code Injection') •

CVSS: 4.8EPSS: 0%CPEs: 3EXPL: 0

Improper neutralization of file names, conversation names and board names in Nextcloud Server 16.0.3, Nextcloud Talk 6.0.3 and Nextcloud Deck 0.6.5 causes an XSS when linking them with each others in a project. Una neutralización inapropiada de los nombres de archivo, nombres de conversación y nombres de tarjeta en Nextcloud Server versión 16.0.3, Nextcloud Talk versión 6.0.3 y Nextcloud Deck versión 0.6.5, causa una vulnerabilidad de tipo XSS cuando se vinculan entre sí en un proyecto. • https://hackerone.com/reports/662204 https://nextcloud.com/security/advisory/?id=NC-SA-2020-008 https://nextcloud.com/security/advisory/?id=NC-SA-2020-009 https://nextcloud.com/security/advisory/?id=NC-SA-2020-010 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 4.0EPSS: 0%CPEs: 1EXPL: 0

Improper access control in Nextcloud Talk 6.0.3 leaks the existance and the name of private conversations when linked them to another shared item via the projects feature. Un control de acceso inapropiado en Nextcloud Talk versión 6.0.3, filtra la existencia y el nombre de las conversaciones privadas cuando son vinculadas a otro elemento compartido por medio de la funcionalidad projects. • https://hackerone.com/reports/662218 https://nextcloud.com/security/advisory/?id=NC-SA-2020-011 • CWE-287: Improper Authentication •