Nextcloud 2.25.5 for iPhone OS

CPE Details

Nextcloud 2.25.5 for iPhone OS
2.25.5
2020-02-10
16h10 +00:00
2020-02-10
16h10 +00:00
Alerte pour un CPE
Restez informé de toutes modifications pour un CPE spécifique.
Gestion des notifications

CPE Name: cpe:2.3:a:nextcloud:nextcloud:2.25.5:*:*:*:*:iphone_os:*:*

Informations

Vendor

nextcloud

Product

nextcloud

Version

2.25.5

Target Software

iphone_os

Related CVE

Open and find in CVE List

CVE ID Publié Description Score Gravité
CVE-2023-49790 2023-12-22 16h19 +00:00 The Nextcloud iOS Files app allows users of iOS to interact with Nextcloud, a self-hosted productivity platform. Prior to version 4.9.2, the application can be used without providing the 4 digit PIN code. Nextcloud iOS Files app should be upgraded to 4.9.2 to receive the patch. No known workarounds are available.
4.3
Moyen
CVE-2023-28647 2023-03-30 18h12 +00:00 Nextcloud iOS is an ios application used to interface with the nextcloud home cloud ecosystem. In versions prior to 4.7.0 when an attacker has physical access to an unlocked device, they may enable the integration into the iOS Files app and bypass the Nextcloud pin/password protection and gain access to a users files. It is recommended that the Nextcloud iOS app is upgraded to 4.7.0. There are no known workarounds for this vulnerability.
6.8
Moyen
CVE-2021-22912 2021-06-11 13h49 +00:00 Nextcloud iOS before 3.4.2 suffers from an information disclosure vulnerability when searches for sharees utilize the lookup server by default instead of only on the local Nextcloud server unless a global search has been explicitly chosen by the user.
6.5
Moyen
CVE-2017-0888 2017-04-05 18h00 +00:00 Nextcloud Server before 9.0.55 and 10.0.2 suffers from a Content-Spoofing vulnerability in the "files" app. The top navigation bar displayed in the files list contained partially user-controllable input leading to a potential misrepresentation of information.
4.3
Moyen
CVE-2016-9460 2017-03-28 00h46 +00:00 Nextcloud Server before 9.0.52 & ownCloud Server before 9.0.4 are vulnerable to a content-spoofing attack in the files app. The location bar in the files app was not verifying the passed parameters. An attacker could craft an invalid link to a fake directory structure and use this to display an attacker-controlled error message to the user.
5.3
Moyen