Vulnerabilities (CVE)

Filtered by vendor Nextcloud Subscribe
Filtered by product Calendar
Total 5 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2023-48308 1 Nextcloud 1 Calendar 2024-01-09 N/A 6.5 MEDIUM
Nextcloud/Cloud is a calendar app for Nextcloud. An attacker can gain access to stacktrace and internal paths of the server when generating an exception while editing a calendar appointment. It is recommended that the Nextcloud Calendar app is upgraded to 4.5.3
CVE-2023-45150 1 Nextcloud 1 Calendar 2023-12-10 N/A 4.3 MEDIUM
Nextcloud calendar is a calendar app for the Nextcloud server platform. Due to missing precondition checks the server was trying to validate strings of any length as email addresses even when megabytes of data were provided, eventually making the server busy and unresponsive. It is recommended that the Nextcloud Calendar app is upgraded to 4.4.4. The only workaround for users unable to upgrade is to disable the calendar app.
CVE-2023-33183 1 Nextcloud 1 Calendar 2023-12-10 N/A 4.3 MEDIUM
Calendar app for Nextcloud easily sync events from various devices with your Nextcloud. Some internal paths of the website are disclosed when the SMTP server is unavailable. It is recommended that the Calendar app is updated to 3.5.5 or 4.2.3
CVE-2022-24838 1 Nextcloud 1 Calendar 2023-12-10 7.5 HIGH 9.8 CRITICAL
Nextcloud Calendar is a calendar application for the nextcloud framework. SMTP Command Injection in Appointment Emails via Newlines: as newlines and special characters are not sanitized in the email value in the JSON request, a malicious attacker can inject newlines to break out of the `RCPT TO:<BOOKING USER'S EMAIL> ` SMTP command and begin injecting arbitrary SMTP commands. It is recommended that Calendar is upgraded to 3.2.2. There are no workaround available.
CVE-2018-3763 1 Nextcloud 1 Calendar 2023-12-10 3.5 LOW 4.8 MEDIUM
In Nextcloud Calendar before 1.5.8 and 1.6.1, a missing sanitization of search results for an autocomplete field could lead to a stored XSS requiring user-interaction. The missing sanitization only affected group names, hence malicious search results could only be crafted by privileged users like admins or group admins.