Added |
CVSS V3.1 |
|
NIST AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N
|
Added |
CVSS V2 |
|
NIST (AV:N/AC:M/Au:S/C:N/I:P/A:N)
|
Added |
CPE Configuration |
|
OR
*cpe:2.3:a:nextcloud:nextcloud_server:*:*:*:*:enterprise:*:*:* versions up to (excluding) 19.0.13.7
*cpe:2.3:a:nextcloud:nextcloud_server:*:*:*:*:enterprise:*:*:* versions from (including) 20.0.0 up to (excluding) 20.0.14.6
*cpe:2.3:a:nextcloud:nextcloud_server:*:*:*:*:enterprise:*:*:* versions from (including) 21.0.0 up to (excluding) 21.0.9.5
*cpe:2.3:a:nextcloud:nextcloud_server:*:*:*:*:*:*:*:* versions up to (excluding) 22.2.8
*cpe:2.3:a:nextcloud:nextcloud_server:*:*:*:*:*:*:*:* versions from (including) 23.0.0 up to (excluding) 23.0.5
*cpe:2.3:a:nextcloud:nextcloud_server:24.0.0:-:*:*:*:*:*:*
*cpe:2.3:a:nextcloud:nextcloud_server:24.0.0:beta1:*:*:*:*:*:*
*cpe:2.3:a:nextcloud:nextcloud_server:24.0.0:beta2:*:*:*:*:*:*
*cpe:2.3:a:nextcloud:nextcloud_server:24.0.0:beta3:*:*:*:*:*:*
*cpe:2.3:a:nextcloud:nextcloud_server:24.0.0:rc1:*:*:*:*:*:*
*cpe:2.3:a:nextcloud:nextcloud_server:24.0.0:rc2:*:*:*:*:*:*
*cpe:2.3:a:nextcloud:nextcloud_server:24.0.0:rc3:*:*:*:*:*:*
|
Changed |
Reference Type |
https://github.com/nextcloud/security-advisories/security/advisories/GHSA-264h-3v4w-6xh2 No Types Assigned
|
https://github.com/nextcloud/security-advisories/security/advisories/GHSA-264h-3v4w-6xh2 Exploit, Third Party Advisory
|
Changed |
Reference Type |
https://github.com/nextcloud/server/pull/32428 No Types Assigned
|
https://github.com/nextcloud/server/pull/32428 Issue Tracking, Patch, Third Party Advisory
|
Changed |
Reference Type |
https://hackerone.com/reports/1516377 No Types Assigned
|
https://hackerone.com/reports/1516377 Exploit, Issue Tracking, Patch, Third Party Advisory
|
Added |
CVSS V2 Metadata |
|
Victim must voluntarily interact with attack mechanism
|