Vulnerabilities (CVE)

Filtered by vendor Nextcloud Subscribe
Filtered by product Nextcloud
Total 28 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2019-5452 1 Nextcloud 1 Nextcloud 2024-11-21 2.1 LOW 2.4 LOW
Bypass lock protection in the Nextcloud Android app prior to version 3.6.2 causes leaking of thumbnails when requesting the Android content provider although the lock protection was not solved.
CVE-2019-5450 1 Nextcloud 1 Nextcloud 2024-11-21 4.6 MEDIUM 6.8 MEDIUM
Improper sanitization of HTML in directory names in the Nextcloud Android app prior to version 3.7.0 allowed to style the directory name in the header bar when using basic HTML.
CVE-2019-15622 1 Nextcloud 1 Nextcloud 2024-11-21 2.1 LOW 2.4 LOW
Not strictly enough sanitization in the Nextcloud Android app 3.6.0 allowed an attacker to get content information from protected tables when using custom queries.
CVE-2019-15615 1 Nextcloud 1 Nextcloud 2024-11-21 3.6 LOW 6.1 MEDIUM
A wrong check for the system time in the Android App 3.9.0 causes a bypass of the lock protection when changing the time of the system to the past.
CVE-2019-15614 1 Nextcloud 1 Nextcloud 2024-11-21 3.5 LOW 5.4 MEDIUM
Missing sanitization in the iOS App 2.24.4 causes an XSS when opening malicious HTML files.
CVE-2019-15611 1 Nextcloud 1 Nextcloud 2024-11-21 4.0 MEDIUM 4.9 MEDIUM
Violation of Secure Design Principles in the iOS App 2.23.0 causes the app to leak its login and token to other Nextcloud services when search e.g. for federated users or registering for push notifications.
CVE-2017-0888 1 Nextcloud 2 Nextcloud, Nextcloud Server 2024-11-21 4.3 MEDIUM 4.3 MEDIUM
Nextcloud Server before 9.0.55 and 10.0.2 suffers from a Content-Spoofing vulnerability in the "files" app. The top navigation bar displayed in the files list contained partially user-controllable input leading to a potential misrepresentation of information.
CVE-2016-9460 2 Nextcloud, Owncloud 2 Nextcloud, Owncloud 2024-11-21 5.0 MEDIUM 5.3 MEDIUM
Nextcloud Server before 9.0.52 & ownCloud Server before 9.0.4 are vulnerable to a content-spoofing attack in the files app. The location bar in the files app was not verifying the passed parameters. An attacker could craft an invalid link to a fake directory structure and use this to display an attacker-controlled error message to the user.