owncloud vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the https://download.owncloud.org|owncloud package. This does not include vulnerabilities belonging to this package’s dependencies.

How to fix?

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

Fix for free
VulnerabilityVulnerable Version
  • M
Cross-site Request Forgery (CSRF)

[,4.0.12)
  • M
Information Exposure

[,5.0.6)
  • H
Remote Code Execution (RCE)

[,5.0.0)
  • M
Cross-site Scripting (XSS)

[,4.5.7)
  • M
Unauthorized File Access

[,6.0.8)[7.0.0,7.0.6)[8.0.0,8.0.4)
  • H
Command Injection

[,6.0.8)
  • H
Information Exposure

[,8.0.10)
  • L
Cross-site Scripting (XSS)

[,4.0.12)
  • L
Cross-site Scripting (XSS)

[,5.0.6)
  • M
Cross-site Request Forgery (CSRF)

[,5.0.15)[6.0.0,6.0.2)
  • M
Improper Authentication

[,10.4.0)
  • M
Improper Authentication

[,6.0.0)
  • M
Remote Code Execution (RCE)

[,4.0.13)
  • M
Information Exposure

[,6.0.5)
  • M
SQL Injection

[,5.0.6)
  • H
Directory Traversal

[,8.0.6)[8.1.0,8.1.1)
  • M
Cryptographic Issues

[,4.0.14)
  • M
Arbitrary Code Execution

[,4.0.12)
  • M
Information Exposure

[10.0.9,10.3.1)
  • M
Improper Authentication

[,6.0.2)
  • M
Arbitrary Code Execution

[,4.0.7)
  • M
Directory Traversal

[,4.0.15)
  • M
Insecure Encryption

[,2.15)
  • M
Information Exposure

[,6.0.0)
  • M
Cross-site Scripting (XSS)

[,4.0.11)[4.5.0,4.5.6)
  • M
Access Restriction Bypass

[,5.0.6)
  • M
Improper Input Validation

[4.0.0,4.0.14)[4.5.0,4.5.9)[5.0.0,5.0.4)
  • M
Session Fixation

[,10.8.0)
  • H
Arbitrary Code Execution

[,2.7)
  • L
Cross-site Scripting (XSS)

[,7.0.5)
  • H
Remote Code Execution (RCE)

[,5.0.15)
  • L
Arbitrary Code Execution

[,4.0.13)
  • M
Access Restriction Bypass

[,6.0.3)
  • H
Improper Authentication

[,4.0.7]
  • M
Access Restriction Bypass

[,5.0.6)
  • L
Cross-site Scripting (XSS)

[,4.0.15)
  • M
Resource Management Errors

[,8.1.11)
  • M
Access Restriction Bypass

[,5.0.13)
  • M
Information Exposure

[,6.0.6)[7.0.0,7.0.3)
  • M
Cross-site Request Forgery (CSRF)

[,4.0.7)
  • L
Cross-site Scripting (XSS)

[,4.5.8)
  • M
Access Restriction Bypass

[,7.0.0)
  • M
Cross-site Request Forgery (CSRF)

[,6.0.0)
  • M
SQL Injection

[,4.5.11)[5.0.0,5.0.6)
  • M
Remote Code Execution (RCE)

[,4.5.6)
  • M
Arbitrary Code Execution

[,4.0.12)
  • M
Insufficiently Protected Credentials

[,3.4.4)
  • L
Cross-site Scripting (XSS)

[,6.0.0)
  • M
Cross-site Request Forgery (CSRF)

[,4.0.0)
  • M
Arbitrary Code Execution

[,4.5.2)
  • M
Improper Access Control

[,9.0.4)
  • H
Denial of Service (DoS)

[,5.0.15)
  • M
Directory Traversal

[,5.0.17)
  • M
Arbitrary Code Execution

[,5.0.6)
  • M
Information Exposure

[,8.1.11)
  • L
Information Exposure

[,7.0.13)
  • M
Access Restriction Bypass

[,4.5.10)
  • M
Cross-site Scripting (XSS)

[,6.0.3)
  • L
Cross-site Scripting (XSS)

[,4.0.16)[5.0.0,5.0.7)
  • M
Cross-site Scripting (XSS)

[,4.5.2)
  • M
Improper Access Control

[9.0.0,9.0.6)[9.1.0,9.1.2)
  • H
Command Injection

[,8.1.3)
  • C
Privilege Escalation

[,10.8.0)
  • M
Cross-site Scripting (XSS)

[9.0.0,9.0.6)[9.1.0,9.1.2)
  • M
Cross-site Scripting (XSS)

[,8.2.11][9.0.0,9.0.10)(9.1.0,9.1.6)[10.0.0,10.0.2)
  • M
Cross-site Scripting (XSS)

[9.0.0,9.0.6)[9.1.0,9.1.2)
  • L
Information Exposure

[,8.1.11)
  • M
Cross-site Scripting (XSS)

[,4.0.3)
  • M
Access Restriction Bypass

[,5.0.16)
  • M
Cross-site Scripting (XSS)

[,4.0.2)
  • H
Improper Authentication

[8.2.0,8.2.9)[9.0.0,9.0.4)[9.1.0,9.1.2)
  • M
Improper Authentication

[,6.0.0)
  • M
Cross-site Scripting (XSS)

[,4.0.9)
  • M
Improper Input Validation

[,4.0.9)
  • M
Cross-site Request Forgery (CSRF)

[,6.0.3)
  • M
Access Restriction Bypass

[,6.0.1)
  • M
Cross-site Scripting (XSS)

[,5.0.4)
  • M
Insufficiently Protected Credentials

[,2.15)
  • M
Information Exposure

[,4.0.7)
  • M
Access Restriction Bypass

[,4.5.7)
  • M
Cross-site Request Forgery (CSRF)

[,10.6.0)
  • M
Cross-site Scripting (XSS)

[,4.0.0)
  • M
Cross-site Scripting (XSS)

[,2.11.2)[4.5.0,4.5.10)[5.0.0,5.0.5)
  • H
Server-side Request Forgery (SSRF)

[,10.4.0)
  • M
Arbitrary Code Injection

[5.0.0,5.0.19)[6.0.0,6.0.7)[7.0.0,7.0.5)
  • M
Cross-site Scripting (XSS)

[,4.0.5)
  • H
Resource Management Errors

[,6.0.8)
  • M
Cross-site Scripting (XSS)

[,9.0)
  • C
Improper Input Validation

[,10.6.0)
  • M
Cross-site Scripting (XSS)

[,4.0.8)
  • C
Improper Access Control

[,5.0.15)
  • L
Cross-site Scripting (XSS)

[,4.0.12)
  • H
Denial of Service (DoS)

[,5.0.15)
  • M
Arbitrary Code Execution

[,6.0.0)
  • H
Improper Input Validation

[,7.0.9)[8.0.0,8.0.7)[8.1.0,8.1.2)
  • M
Directory Traversal

[,5.0.6)
  • L
Cross-site Scripting (XSS)

[,4.5.12)
  • M
Cross-site Scripting (XSS)

[,4.0.10)[4.5.0,4.5.5)
  • M
Improper Input Validation

[,5.0.15)
  • M
Cross-site Scripting (XSS)

[,6.0.1)
  • M
Privilege Escalation

[,10.3.0)
  • M
Access Restriction Bypass

[,8.2.6)
  • M
Access Restriction Bypass

[,4.0.6)
  • M
Incorrect Authorization

[,10.8.0)
  • C
Directory Traversal

[,7.0.6)
  • M
Improper Input Validation

[,5.0.6)
  • M
Cross-site Request Forgery (CSRF)

[,4.0.12)
  • M
Access Restriction Bypass

[,5.0.16)
  • M
Cross-site Scripting (XSS)

[,4.0.0)
  • M
Information Exposure

[,4.0.12)
  • H
Denial of Service (DoS)

[,5.0.15)
  • M
Improper Access Control

[9.0.0,9.0.6)[9.1.0,9.1.2)
  • M
Improper Input Validation

[,4.0.8)
  • M
Cross-site Scripting (XSS)

[,5.0.1)
  • M
Cross-site Request Forgery (CSRF)

[,4.0.5)
  • H
Denial of Service (DoS)

[,5.0.15)
  • M
Cross-site Scripting (XSS)

[4.0.0,4.0.11)[4.5.0,4.5.6)
  • M
SQL Injection

[,5.0.1)
  • C
XML External Entity (XXE) Injection

[,5.0.15)[6.0.0,6.0.2)
  • M
Access Restriction Bypass

[,5.0.15)
  • M
Information Exposure

[,7.0.3)
  • M
Access Restriction Bypass

[,7.0.8)[8.0.0,8.0.6)[8.1.0,8.1.1)
  • M
Access Restriction Bypass

[,6.0.0)
  • M
Cross-site Request Forgery (CSRF)

[,4.5.7)
  • L
Cross-site Scripting (XSS)

[,4.0.15)
  • M
Cross-site Scripting (XSS)

[,9.0.4)
  • M
Information Exposure

[,10.8.0)
  • M
Cross-site Scripting (XSS)

[,7.0.13)
  • M
Cross-site Scripting (XSS)

[,10.5)
  • M
Access Restriction Bypass

[,4.0.10)[4.5.0,4.5.5)
  • M
Insufficiently Protected Credentials

[,4.0.9)
  • M
Information Exposure

[,8.0.9)
  • M
Cross-site Request Forgery (CSRF)

[,4.0.6)
  • M
Cross-site Scripting (XSS)

[,4.0.11)
  • M
Cross-site Scripting (XSS)

[,9.0.4)
  • M
CRLF Injection

[,4.0.8)
  • M
Cross-site Scripting (XSS)

[,5.0.16)
  • M
Incorrect Authorization

[0,)
  • M
Cross-site Scripting (XSS)

[,4.0.1)
  • M
Improper Input Validation

[,4.0.0)
  • M
Improper Access Control

[,9.0.4)
  • M
Cross-site Scripting (XSS)

[,6.0.2)
  • M
Access Restriction Bypass

[,4.5.11)
  • M
Improper Access Control

[,9.0.4)
  • H
Access Restriction Bypass

[,6.0.3)