Nextcloud Server — набор клиент-серверных программ для создания и использования хранилища данных.
Релизный цикл, информация об уязвимостях
График релизов
Количество 429
GHSA-m9wc-h684-m6rq
A wrong check in Nextcloud Server 19 and prior allowed to perform a denial of service attack when resetting the password for a user.
GHSA-wh9j-q6hg-x337
Insufficient protection of the server-side encryption keys in Nextcloud Server 19.0.1 allowed an attacker to replace the public key to decrypt them later on.
GHSA-548f-j4fj-64c5
Insufficient protection of the server-side encryption keys in Nextcloud Server 19.0.1 allowed an attacker to replace the encryption keys.
GHSA-92hg-jjmr-6gv2
A wrong generation of the passphrase for the encrypted block in Nextcloud Server 19.0.1 allowed an attacker to overwrite blocks in a file.
GHSA-2q3r-568x-rqmv
A cryptographic issue in Nextcloud Server 19.0.1 allowed an attacker to downgrade the encryption scheme and break the integrity of encrypted files.
GHSA-v9r7-gccq-cp4v
A too small set of random characters being used for encryption in Nextcloud Server 18.0.4 allowed decryption in shorter time than intended.
GHSA-mwjc-vmmg-j6vm
A wrong configuration in Nextcloud Server 19.0.1 incorrectly made the user feel the passwordless WebAuthn is also a two factor verification by asking for the PIN of the passwordless WebAuthn but not verifying it.
GHSA-jg28-fqcj-8vhj
A logic error in Nextcloud Server 19.0.0 caused a plaintext storage of the share password when it was given on the initial create API call.
GHSA-wp2j-2549-fwhp
A logic error in Nextcloud Server 19.0.0 caused a privilege escalation allowing malicious users to reshare with higher permissions than they got assigned themselves.
GHSA-r63f-25g5-v4wf
An Insecure direct object reference vulnerability in Nextcloud Server 18.0.2 allowed an attacker to remote wipe devices of other users when sending a malicious request directly to the endpoint.
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано 1 | |
|---|---|---|---|---|
GHSA-m9wc-h684-m6rq A wrong check in Nextcloud Server 19 and prior allowed to perform a denial of service attack when resetting the password for a user. | 1% Низкий | больше 3 лет назад | ||
GHSA-wh9j-q6hg-x337 Insufficient protection of the server-side encryption keys in Nextcloud Server 19.0.1 allowed an attacker to replace the public key to decrypt them later on. | CVSS3: 4.4 | 0% Низкий | больше 3 лет назад | |
GHSA-548f-j4fj-64c5 Insufficient protection of the server-side encryption keys in Nextcloud Server 19.0.1 allowed an attacker to replace the encryption keys. | CVSS3: 8.1 | 0% Низкий | больше 3 лет назад | |
GHSA-92hg-jjmr-6gv2 A wrong generation of the passphrase for the encrypted block in Nextcloud Server 19.0.1 allowed an attacker to overwrite blocks in a file. | 0% Низкий | больше 3 лет назад | ||
GHSA-2q3r-568x-rqmv A cryptographic issue in Nextcloud Server 19.0.1 allowed an attacker to downgrade the encryption scheme and break the integrity of encrypted files. | CVSS3: 4.1 | 0% Низкий | больше 3 лет назад | |
GHSA-v9r7-gccq-cp4v A too small set of random characters being used for encryption in Nextcloud Server 18.0.4 allowed decryption in shorter time than intended. | CVSS3: 2.2 | 0% Низкий | больше 3 лет назад | |
GHSA-mwjc-vmmg-j6vm A wrong configuration in Nextcloud Server 19.0.1 incorrectly made the user feel the passwordless WebAuthn is also a two factor verification by asking for the PIN of the passwordless WebAuthn but not verifying it. | CVSS3: 6.8 | 0% Низкий | больше 3 лет назад | |
GHSA-jg28-fqcj-8vhj A logic error in Nextcloud Server 19.0.0 caused a plaintext storage of the share password when it was given on the initial create API call. | CVSS3: 7.5 | 0% Низкий | больше 3 лет назад | |
GHSA-wp2j-2549-fwhp A logic error in Nextcloud Server 19.0.0 caused a privilege escalation allowing malicious users to reshare with higher permissions than they got assigned themselves. | 0% Низкий | больше 3 лет назад | ||
GHSA-r63f-25g5-v4wf An Insecure direct object reference vulnerability in Nextcloud Server 18.0.2 allowed an attacker to remote wipe devices of other users when sending a malicious request directly to the endpoint. | 1% Низкий | больше 3 лет назад |
Уязвимостей на страницу