Page 3 of 22 results (0.004 seconds)

CVSS: 4.3EPSS: 0%CPEs: 1EXPL: 1

Nextcloud Android app is the Android client for Nextcloud. In versions prior to 3.16.1, a malicious app on the same device could have gotten access to the shared preferences of the Nextcloud Android application. This required user-interaction as a victim had to initiate the sharing flow and choose the malicious app. The shared preferences contain some limited private data such as push tokens and the account name. The vulnerability is patched in version 3.16.1. • https://github.com/nextcloud/android/pull/8433 https://github.com/nextcloud/security-advisories/security/advisories/GHSA-25m9-cf6c-qf2c https://hackerone.com/reports/1142918 • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •

CVSS: 6.5EPSS: 0%CPEs: 1EXPL: 1

Nextcloud Android App (com.nextcloud.client) before v3.16.0 is vulnerable to information disclosure due to searches for sharees being performed by default on the lookup server instead of only using the local Nextcloud server unless a global search has been explicitly chosen by the user. Nextcloud Android App (com.nextcloud.client) versiones anteriores a v3.16.0, es vulnerable a una divulgación de información debido a que las búsquedas de compartidos se llevó a cabo por defecto en el servidor de búsqueda en lugar de usar únicamente el servidor local de Nextcloud, a menos que una búsqueda global haya sido elegida explícitamente por el usuario • https://github.com/nextcloud/security-advisories/security/advisories/GHSA-22v9-q3r6-x7cj https://hackerone.com/reports/1167916 • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •

CVSS: 6.5EPSS: 0%CPEs: 1EXPL: 1

Nextcloud iOS before 3.4.2 suffers from an information disclosure vulnerability when searches for sharees utilize the lookup server by default instead of only on the local Nextcloud server unless a global search has been explicitly chosen by the user. Nextcloud iOS versiones anteriores a 3.4.2, sufre una vulnerabilidad de divulgación de información cuando las búsquedas de recursos compartidos utilizan el servidor de búsqueda por defecto en lugar de sólo el servidor local de Nextcloud, a menos que una búsqueda global haya sido elegida explícitamente por el usuario • https://github.com/nextcloud/security-advisories/security/advisories/GHSA-m7w4-cvjr-76mh https://hackerone.com/reports/1167919 • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •

CVSS: 4.7EPSS: 0%CPEs: 1EXPL: 1

Nextcloud Android is the Android client for the Nextcloud open source home cloud system. Due to a timeout issue the Android client may not properly clean all sensitive data on account removal. This could include sensitive key material such as the End-to-End encryption keys. It is recommended that the Nextcloud Android App is upgraded to 3.16.1 Nextcloud Android es el cliente Android para el sistema de nube doméstica de código abierto Nextcloud. Debido a un problema de tiempo de espera, el cliente de Android podría no limpiar apropiadamente todos los datos confidenciales al eliminar la cuenta. • https://github.com/nextcloud/android/commit/355f3c745b464b741b20a3b96597303490c26333 https://github.com/nextcloud/security-advisories/security/advisories/GHSA-g5gf-rmhm-wpxw https://hackerone.com/reports/1189168 • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor CWE-212: Improper Removal of Sensitive Information Before Storage or Transfer •

CVSS: 2.4EPSS: 0%CPEs: 1EXPL: 1

Not strictly enough sanitization in the Nextcloud Android app 3.6.0 allowed an attacker to get content information from protected tables when using custom queries. Una falta de saneamiento estrictamente suficiente en la aplicación Android Nextcloud versión 3.6.0, permitió a un atacante obtener información de contenido de tablas protegidas cuando se usan consultas personalizadas. • https://hackerone.com/reports/518669 https://nextcloud.com/security/advisory/?id=NC-SA-2019-011 • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •