CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
AI Score
Confidence
Low
EPSS
Percentile
29.9%
A vulnerability in Nextcloud cloud storage creation and utilization software
Server is related to the ability to update any personal or global external storage, making it
inaccessible to everyone else. Exploitation of the vulnerability could allow an attacker, acting remotely, to bypass existing restriction policies.
remotely to bypass existing access restriction policies.
Vulnerability in Nextcloud cloud storage creation and utilization software
Server is related to copying HTML code without markup (Ctrl+Shift+V). Exploitation of the vulnerability could
allow an attacker acting remotely to perform cross-site scripting attacks (XSS)
Vulnerability in Nextcloud cloud storage creation and utilization software.
Server is related to insufficient validation of incoming requests. Exploitation of the vulnerability could allow
an attacker acting remotely to perform an SSRF attack
Nextcloud Server cloud storage creation and utilization software vulnerability is related to improper neutralization of incoming requests.
Server is related to improper input neutralization during web page creation. Exploitation
the vulnerability could allow a remote attacker to perform a cross-site scripting attack (XSS).
(XSS)
Vulnerability in cloud-based software for creating and using Nextcloud data storage
Server is related to administrator modification of external storage authentication data configured by a user.
user. Exploitation of the vulnerability could allow an attacker acting remotely to bypass the existing
existing access restriction policies
Vulnerability in cloud software for creating and utilizing Nextcloud storage
Server is related to the ability to enable and disable birthdays for any user on the same server.
on the same server. Exploitation of the vulnerability could allow an attacker, acting remotely, to gain
unauthorized access to protected information