Nextcloud 3.19.1 Release Candidate 1 for Android

CPE Details

Nextcloud 3.19.1 Release Candidate 1 for Android
3.19.1
2022-05-04
11h38 +00:00
2022-05-04
23h11 +00:00
Alerte pour un CPE
Stay informed of any changes for a specific CPE.
Notifications manage

CPE Name: cpe:2.3:a:nextcloud:nextcloud:3.19.1:rc1:*:*:*:android:*:*

Informations

Vendor

nextcloud

Product

nextcloud

Version

3.19.1

Update

rc1

Target Software

android

Related CVE

Open and find in CVE List

CVE ID Published Description Score Severity
CVE-2023-28646 2023-03-30 18h16 +00:00 Nextcloud android is an android app for interfacing with the nextcloud home server ecosystem. In versions from 3.7.0 and before 3.24.1 an attacker that has access to the unlocked physical device can bypass the Nextcloud Android Pin/passcode protection via a thirdparty app. This allows to see meta information like sharer, sharees and activity of files. It is recommended that the Nextcloud Android app is upgraded to 3.24.1. There are no known workarounds for this vulnerability.
4.4
Medium
CVE-2022-39210 2022-09-16 21h10 +00:00 Nextcloud android is the official Android client for the Nextcloud home server platform. Internal paths to the Nextcloud Android app files are not properly protected. As a result access to internal files of the from within the Nextcloud Android app is possible. This may lead to a leak of sensitive information in some cases. It is recommended that the Nextcloud Android app is upgraded to 3.21.0. There are no known workarounds for this issue.
5.5
Medium
CVE-2017-0888 2017-04-05 18h00 +00:00 Nextcloud Server before 9.0.55 and 10.0.2 suffers from a Content-Spoofing vulnerability in the "files" app. The top navigation bar displayed in the files list contained partially user-controllable input leading to a potential misrepresentation of information.
4.3
Medium
CVE-2016-9460 2017-03-28 00h46 +00:00 Nextcloud Server before 9.0.52 & ownCloud Server before 9.0.4 are vulnerable to a content-spoofing attack in the files app. The location bar in the files app was not verifying the passed parameters. An attacker could craft an invalid link to a fake directory structure and use this to display an attacker-controlled error message to the user.
5.3
Medium