Nextcloud 3.19.1 Release Candidate 1 for Android

CPE Details

Nextcloud 3.19.1 Release Candidate 1 for Android
3.19.1
2022-05-04
11h38 +00:00
2022-05-04
23h11 +00:00
Alerte pour un CPE
Restez informé de toutes modifications pour un CPE spécifique.
Gestion des notifications

CPE Name: cpe:2.3:a:nextcloud:nextcloud:3.19.1:rc1:*:*:*:android:*:*

Informations

Vendor

nextcloud

Product

nextcloud

Version

3.19.1

Update

rc1

Target Software

android

Related CVE

Open and find in CVE List

CVE ID Publié Description Score Gravité
CVE-2023-28646 2023-03-30 18h16 +00:00 Nextcloud android is an android app for interfacing with the nextcloud home server ecosystem. In versions from 3.7.0 and before 3.24.1 an attacker that has access to the unlocked physical device can bypass the Nextcloud Android Pin/passcode protection via a thirdparty app. This allows to see meta information like sharer, sharees and activity of files. It is recommended that the Nextcloud Android app is upgraded to 3.24.1. There are no known workarounds for this vulnerability.
4.4
Moyen
CVE-2022-39210 2022-09-16 21h10 +00:00 Nextcloud android is the official Android client for the Nextcloud home server platform. Internal paths to the Nextcloud Android app files are not properly protected. As a result access to internal files of the from within the Nextcloud Android app is possible. This may lead to a leak of sensitive information in some cases. It is recommended that the Nextcloud Android app is upgraded to 3.21.0. There are no known workarounds for this issue.
5.5
Moyen
CVE-2017-0888 2017-04-05 18h00 +00:00 Nextcloud Server before 9.0.55 and 10.0.2 suffers from a Content-Spoofing vulnerability in the "files" app. The top navigation bar displayed in the files list contained partially user-controllable input leading to a potential misrepresentation of information.
4.3
Moyen
CVE-2016-9460 2017-03-28 00h46 +00:00 Nextcloud Server before 9.0.52 & ownCloud Server before 9.0.4 are vulnerable to a content-spoofing attack in the files app. The location bar in the files app was not verifying the passed parameters. An attacker could craft an invalid link to a fake directory structure and use this to display an attacker-controlled error message to the user.
5.3
Moyen