CVE-2021-32727

CVSS v3 Score
7.5
High
CVSS v2 Score
5.0
Medium

Vulnerability Description

Nextcloud Android Client is the Android client for Nextcloud. Clients using the Nextcloud end-to-end encryption feature download the public and private key via an API endpoint. In versions prior to 3.16.1, the Nextcloud Android client skipped a step that involved the client checking if a private key belonged to a previously downloaded public certificate. If the Nextcloud instance served a malicious public key, the data would be encrypted for this key and thus could be accessible to a malicious actor. The vulnerability is patched in version 3.16.1. As a workaround, do not add additional end-to-end encrypted devices to a user account.

CVSS:7.5(High)

Opera before 10.00 does not check all intermediate X.509 certificates for revocation, which makes it easier for remote SSL servers to bypass validation of the certificate chain via a revoked certifica...

CVSS:7.5(High)

The jruby-openssl gem before 0.6 for JRuby mishandles SSL certificate validation.

CVSS:7.5(High)

vdsm: certificate generation upon node creation allowing vdsm to start and serve requests from anyone who has a matching key (and certificate)

CVSS:7.5(High)

nuSOAP before 0.7.3-5 does not properly check the hostname of a cert.

CVSS:7.5(High)

An import error was introduced in Cumin in the code refactoring in r5310. Server certificate validation is always disabled when connecting to Aviary servers, even if the installed packages on a system...

CVSS:7.5(High)

Pulp before 2.3.0 uses the same the same certificate authority key and certificate for all installations.