7 results (0.020 seconds)

CVSS: 7.8EPSS: 0%CPEs: 4EXPL: 0

Nextcloud Talk Android allows users to place video and audio calls through Nextcloud on Android. Prior to version 17.0.0, an unprotected intend allowed malicious third party apps to trick the Talk Android app into writing files outside of its intended cache directory. Nextcloud Talk Android version 17.0.0 has a patch for this issue. No known workarounds are available. Nextcloud Talk Android permite a los usuarios realizar llamadas de vídeo y audio a través de Nextcloud en Android. • https://github.com/nextcloud/security-advisories/security/advisories/GHSA-36f7-93f3-mcfj https://github.com/nextcloud/talk-android/pull/3064 https://hackerone.com/reports/1997029 • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •

CVSS: 3.5EPSS: 0%CPEs: 2EXPL: 0

Nextcloud talk is a video & audio conferencing app for Nextcloud. In affected versions the talk app does not properly filter access to a conversations member list. As a result an attacker could use this vulnerability to gain information about the members of a Talk conversation, even if they themselves are not members. It is recommended that the Nextcloud Talk is upgraded to 14.0.9 or 15.0.4. There are no known workarounds for this vulnerability. • https://github.com/nextcloud/security-advisories/security/advisories/GHSA-3m6r-479j-4chf https://github.com/nextcloud/spreed/pull/8651 • CWE-284: Improper Access Control •

CVSS: 2.1EPSS: 0%CPEs: 1EXPL: 1

Talk-Android enables users to have video & audio calls through Nextcloud on Android. Due to passcode bypass, an attacker is able to access the user's Nextcloud files and view conversations. To exploit this the attacker needs to have physical access to the target's device. There are currently no known workarounds available. It is recommended that the Nextcloud Talk Android app is upgraded to 15.0.2. • https://github.com/nextcloud/security-advisories/security/advisories/GHSA-wvr4-gc4c-6vmx https://github.com/nextcloud/talk-android/pull/2598 https://hackerone.com/reports/1784645 • CWE-284: Improper Access Control •

CVSS: 5.5EPSS: 0%CPEs: 1EXPL: 0

Nextcould talk android is the android OS implementation of the nextcloud talk chat system. In affected versions the receiver is not protected by broadcastPermission allowing malicious apps to monitor communication. It is recommended that the Nextcloud Talk Android is upgraded to 14.1.0. There are no known workarounds for this issue. Nextcould talk android es la implementación del sistema operativo Android del sistema de chat nextcloud talk. • https://github.com/nextcloud/security-advisories/security/advisories/GHSA-564v-3rfc-352m https://github.com/nextcloud/talk-android/pull/2148 https://hackerone.com/reports/1596459 • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor CWE-732: Incorrect Permission Assignment for Critical Resource •

CVSS: 5.3EPSS: 0%CPEs: 2EXPL: 0

Nextcloud Talk is an open source chat, video & audio calls client for the Nextcloud platform. In affected versions an attacker could see the last video frame of any participant who has video disabled but a camera selected. It is recommended that the Nextcloud Talk app is upgraded to 13.0.8 or 14.0.4. Users unable to upgrade should select "None" as camera before joining the call. Nextcloud Talk es un cliente de código abierto de chat, vídeo y llamadas de audio para la plataforma Nextcloud. • https://github.com/nextcloud/security-advisories/security/advisories/GHSA-wq3g-2x46-q2gv https://github.com/nextcloud/spreed/pull/7673 • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •