Page 4 of 59 results (0.011 seconds)

CVSS: 6.5EPSS: 0%CPEs: 3EXPL: 0

Nextcloud server is an open source personal cloud solution. In affected versions an attacker could brute force to find if federated sharing is being used and potentially try to brute force access tokens for federated shares (`a-zA-Z0-9` ^ 15). It is recommended that the Nextcloud Server is upgraded to 22.2.9, 23.0.6 or 24.0.2. Users unable to upgrade may disable federated sharing via the Admin Sharing settings in `index.php/settings/admin/sharing`. El servidor Nextcloud es una solución de nube personal de código abierto. • https://github.com/nextcloud/security-advisories/security/advisories/GHSA-2vwh-5v93-3vcq https://github.com/nextcloud/server/pull/32843/commits/6eb692da7fe73c899cb6a8d2aa045eddb1f14018 • CWE-307: Improper Restriction of Excessive Authentication Attempts CWE-770: Allocation of Resources Without Limits or Throttling •

CVSS: 5.4EPSS: 0%CPEs: 12EXPL: 2

Nextcloud server is an open source personal cloud server. Affected versions were found to be vulnerable to SMTP command injection. The impact varies based on which commands are supported by the backend SMTP server. However, the main risk here is that the attacker can then hijack an already-authenticated SMTP session and run arbitrary SMTP commands as the email user, such as sending emails to other users, changing the FROM user, and so on. As before, this depends on the configuration of the server itself, but newlines should be sanitized to mitigate such arbitrary SMTP command injection. • https://github.com/nextcloud/security-advisories/security/advisories/GHSA-264h-3v4w-6xh2 https://github.com/nextcloud/server/pull/32428 https://hackerone.com/reports/1516377 • CWE-74: Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection') CWE-93: Improper Neutralization of CRLF Sequences ('CRLF Injection') •

CVSS: 4.3EPSS: 0%CPEs: 2EXPL: 0

Nextcloud Server is the file server software for Nextcloud, a self-hosted productivity platform. Prior to versions 22.2.7 and 23.0.4, missing input-size validation of new session names allows users to create app passwords with long names. These long names are then loaded into memory on usage, resulting in impacted performance. Versions 22.2.7 and 23.0.4 contain a fix for this issue. There are currently no known workarounds available. • https://github.com/nextcloud/security-advisories/security/advisories/GHSA-7cwm-qph5-4h5w https://github.com/nextcloud/server/pull/31658 https://hackerone.com/reports/1153138 https://security.gentoo.org/glsa/202208-17 • CWE-20: Improper Input Validation CWE-400: Uncontrolled Resource Consumption •

CVSS: 4.3EPSS: 0%CPEs: 2EXPL: 0

Nextcloud Server is the file server software for Nextcloud, a self-hosted productivity platform. Prior to versions 22.2.6 and 23.0.3, a user can create a link that is not password protected even if the administrator requires links to be password protected. Versions 22.2.6 and 23.0.3 contain a patch for this issue. There are currently no known workarounds. Nextcloud Server es el software de servidor de archivos de Nextcloud, una plataforma de productividad auto alojada. • https://github.com/nextcloud/circles/pull/866 https://github.com/nextcloud/circles/pull/926 https://github.com/nextcloud/security-advisories/security/advisories/GHSA-pwjv-h37v-c4fx https://hackerone.com/reports/1406926 • CWE-671: Lack of Administrator Control over Security •

CVSS: 4.3EPSS: 0%CPEs: 3EXPL: 1

Nextcloud Server is the file server software for Nextcloud, a self-hosted productivity platform. Prior to versions 21.0.8, 22.2.4, and 23.0.1, it is possible to trick administrators into enabling "recommended" apps for the Nextcloud server that they do not need, thus expanding their attack surface unnecessarily. This issue is fixed in versions 21.0.8 , 22.2.4, and 23.0.1. Nextcloud Server es el software de servidor de archivos de Nextcloud, una plataforma de productividad autoalojada. En versiones anteriores a 21.0.8, 22.2.4 y 23.0.1, es posible engañar a los administradores para que habiliten aplicaciones "recommended" para el servidor Nextcloud que no necesitan, ampliando así su superficie de ataque innecesariamente. • https://github.com/nextcloud/security-advisories/security/advisories/GHSA-5vw6-6prg-gvw6 https://github.com/nextcloud/server/pull/30615 https://hackerone.com/reports/1403614 https://security.gentoo.org/glsa/202208-17 • CWE-345: Insufficient Verification of Data Authenticity •