Page 3 of 12 results (0.003 seconds)

CVSS: 8.1EPSS: 0%CPEs: 1EXPL: 0

Nextcloud Talk is a fully on-premises audio/video and chat communication service. In versions prior to 11.2.2, if a user was able to reuse an earlier used username, they could get access to any chat message sent to the previous user with this username. The issue was patched in versions 11.2.2 and 11.3.0. As a workaround, don't allow users to choose usernames themselves. This is the default behaviour of Nextcloud, but some user providers may allow doing so. • https://github.com/nextcloud/security-advisories/security/advisories/GHSA-xv6f-344w-895c https://github.com/nextcloud/spreed/pull/5633 https://github.com/nextcloud/spreed/releases/tag/v11.2.2 https://github.com/nextcloud/spreed/releases/tag/v11.3.0 https://hackerone.com/reports/1200700 • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor CWE-708: Incorrect Ownership Assignment •

CVSS: 6.5EPSS: 0%CPEs: 3EXPL: 0

Nextcloud Talk is a fully on-premises audio/video and chat communication service. Password protected shared chats in Talk before version 9.0.10, 10.0.8 and 11.2.2 did not rotate the session cookie after a successful authentication event. It is recommended that the Nextcloud Talk App is upgraded to 9.0.10, 10.0.8 or 11.2.2. No workarounds for this vulnerability are known to exist. Nextcloud Talk es un servicio de comunicación de audio/vídeo y chat totalmente local. • https://github.com/nextcloud/security-advisories/security/advisories/GHSA-p6h7-84v4-827r https://hackerone.com/reports/1181962 • CWE-384: Session Fixation •