Vulnerabilities (CVE)

Filtered by vendor Nextcloud Subscribe
Filtered by product Contacts
Total 6 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2023-33182 1 Nextcloud 1 Contacts 2024-11-21 N/A N/A
Contacts app for Nextcloud easily syncs contacts from various devices with your Nextcloud and allows editing. The unsanitized SVG is converted to a JavaScript blob (in memory data) that the Avatar can't render. Due to this constellation the missing sanitization does not seem to be exploitable. It is recommended that the Contacts app is upgraded to 5.0.3 or 4.2.4
CVE-2021-39221 1 Nextcloud 1 Contacts 2024-11-21 3.5 LOW 6.4 MEDIUM
Nextcloud is an open-source, self-hosted productivity platform. The Nextcloud Contacts application prior to version 4.0.3 was vulnerable to a stored Cross-Site Scripting (XSS) vulnerability. For exploitation, a user would need to right-click on a malicious file and open the file in a new tab. Due the strict Content-Security-Policy shipped with Nextcloud, this issue is not exploitable on modern browsers supporting Content-Security-Policy. It is recommended that the Nextcloud Contacts application is upgraded to 4.0.3. As a workaround, one may use a browser that has support for Content-Security-Policy.
CVE-2020-8281 1 Nextcloud 1 Contacts 2024-11-21 3.5 LOW 5.4 MEDIUM
A missing file type check in Nextcloud Contacts 3.3.0 allows a malicious user to upload malicious SVG files to perform cross-site scripting (XSS) attacks.
CVE-2020-8280 1 Nextcloud 1 Contacts 2024-11-21 3.5 LOW 5.4 MEDIUM
A missing file type check in Nextcloud Contacts 3.4.0 allows a malicious user to upload SVG files as PNG files to perform cross-site scripting (XSS) attacks.
CVE-2020-8181 1 Nextcloud 1 Contacts 2024-11-21 4.0 MEDIUM 4.3 MEDIUM
A missing file type check in Nextcloud Contacts 3.2.0 allowed a malicious user to upload any file as avatars.
CVE-2018-3764 1 Nextcloud 1 Contacts 2024-11-21 3.5 LOW 4.8 MEDIUM
In Nextcloud Contacts before 2.1.2, a missing sanitization of search results for an autocomplete field could lead to a stored XSS requiring user-interaction. The missing sanitization only affected group names, hence malicious search results could only be crafted by privileged users like admins or group admins.