Show filters
42 Total Results
Displaying 11-20 of 42
Sort by:
Attacker Value
Unknown
CVE-2021-37630
Disclosure Date: September 07, 2021 (last updated February 23, 2025)
Nextcloud Circles is an open source social network built for the nextcloud ecosystem. In affected versions the Nextcloud Circles application allowed any user to join any "Secret Circle" without approval by the Circle owner leaking private information. It is recommended that Nextcloud Circles is upgraded to 0.19.15, 0.20.11 or 0.21.4. There are no workarounds for this issue.
0
Attacker Value
Unknown
CVE-2021-32782
Disclosure Date: September 07, 2021 (last updated February 23, 2025)
Nextcloud Circles is an open source social network built for the nextcloud ecosystem. In affected versions the Nextcloud Circles application is vulnerable to a stored Cross-Site Scripting (XSS) vulnerability. Due the strict Content-Security-Policy shipped with Nextcloud, this issue is not exploitable on modern browsers supporting Content-Security-Policy. It is recommended that the Nextcloud Circles application is upgraded to 0.21.3, 0.20.10 or 0.19.14 to resolve this issue. As a workaround users may use a browser that has support for Content-Security-Policy. A notable exemption is Internet Explorer which does not support CSP properly.
0
Attacker Value
Unknown
CVE-2019-15610
Disclosure Date: February 04, 2020 (last updated February 21, 2025)
Improper authorization in the Circles app 0.17.7 causes retaining access when an email address was removed from a circle.
0
Attacker Value
Unknown
CVE-2018-19830
Disclosure Date: December 31, 2019 (last updated November 08, 2023)
The UBSexToken() function of a smart contract implementation for Business Alliance Financial Circle (BAFC), an tradable Ethereum ERC20 token, allows attackers to change the owner of the contract, because the function is public (by default) and does not check the caller's identity.
0
Attacker Value
Unknown
CVE-2017-12095
Disclosure Date: April 05, 2018 (last updated November 26, 2024)
An exploitable vulnerability exists in the WiFi Access Point feature of Circle with Disney running firmware 2.0.1. A series of WiFi packets can force Circle to setup an Access Point with default credentials. An attacker needs to send a series of spoofed "de-auth" packets to trigger this vulnerability.
0
Attacker Value
Unknown
CVE-2017-12094
Disclosure Date: November 07, 2017 (last updated November 26, 2024)
An exploitable vulnerability exists in the WiFi Channel parsing of Circle with Disney running firmware 2.0.1. A specially crafted SSID can cause the device to execute arbitrary sed commands. An attacker needs to setup an access point reachable by the device to trigger this vulnerability.
0
Attacker Value
Unknown
CVE-2017-2890
Disclosure Date: November 07, 2017 (last updated November 26, 2024)
An exploitable vulnerability exists in the /api/CONFIG/restore functionality of Circle with Disney running firmware 2.0.1. Specially crafted network packets can cause an OS command injection. An attacker can send an HTTP request trigger this vulnerability.
0
Attacker Value
Unknown
CVE-2017-2913
Disclosure Date: November 07, 2017 (last updated November 26, 2024)
An exploitable vulnerability exists in the filtering functionality of Circle with Disney. SSL certificates for specific domain names can cause the Bluecoat library to accept a different certificate than intended. An attacker can host an HTTPS server with this certificate to trigger this vulnerability.
0
Attacker Value
Unknown
CVE-2017-2884
Disclosure Date: November 07, 2017 (last updated November 26, 2024)
An exploitable vulnerability exists in the user photo update functionality of Circle with Disney running firmware 2.0.1. A repeated set of specially crafted API calls can cause the device to corrupt essential memory, resulting in a bricked device. An attacker needs network connectivity to the device to trigger this vulnerability.
0
Attacker Value
Unknown
CVE-2017-2914
Disclosure Date: November 07, 2017 (last updated November 26, 2024)
An exploitable authentication bypass vulnerability exists in the API daemon of Circle with Disney running firmware 2.0.1. A specially crafted token can bypass the authentication routine of the Apid binary, causing the device to grant unintended administrative access. An attacker needs network connectivity to the device to trigger this vulnerability.
0