{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-25T10:19:01.160","vulnerabilities":[{"cve":{"id":"CVE-2016-9468","sourceIdentifier":"support@hackerone.com","published":"2017-03-28T02:59:01.200","lastModified":"2025-04-20T01:37:25.860","vulnStatus":"Deferred","cveTags":[],"descriptions":[{"lang":"en","value":"Nextcloud Server before 9.0.54 and 10.0.1 & ownCloud Server before 9.0.6 and 9.1.2 suffer from content spoofing in the dav app. The exception message displayed on the DAV endpoints contained partially user-controllable input leading to a potential misrepresentation of information."},{"lang":"es","value":"Nextcloud Server en versiones anteriores a 9.0.54 and 10.0.1 y ownCloud Server en versiones anteriores a 9.0.6 y 9.1.2 sufren de contenido de suplantación en la aplicación dav. El mensaje de excepción que se muestra en los puntos finales DAV contenía una entrada parcialmente controlable por el usuario que conducía a una posible representación errónea de la información."}],"metrics":{"cvssMetricV30":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.0","vectorString":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N","baseScore":5.3,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"LOW","availabilityImpact":"NONE"},"exploitabilityScore":3.9,"impactScore":1.4}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:N/I:P/A:N","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"PARTIAL","availabilityImpact":"NONE"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"support@hackerone.com","type":"Secondary","description":[{"lang":"en","value":"CWE-451"}]},{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-284"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:nextcloud:nextcloud_server:*:*:*:*:*:*:*:*","versionEndExcluding":"9.0.54","matchCriteriaId":"D6E3F368-B854-430E-AB8F-496675C4E210"},{"vulnerable":true,"criteria":"cpe:2.3:a:nextcloud:nextcloud_server:*:*:*:*:*:*:*:*","versionStartIncluding":"10.0.0","versionEndIncluding":"10.0.1","matchCriteriaId":"C5FD87EC-3ADE-457D-8397-6CD89D300ADF"},{"vulnerable":true,"criteria":"cpe:2.3:a:owncloud:owncloud:*:*:*:*:*:*:*:*","versionStartIncluding":"9.0.0","versionEndExcluding":"9.0.6","matchCriteriaId":"CA8CCC5C-D019-4A80-BD8D-3914BFFC60C0"},{"vulnerable":true,"criteria":"cpe:2.3:a:owncloud:owncloud:*:*:*:*:*:*:*:*","versionStartIncluding":"9.1.0","versionEndExcluding":"9.1.2","matchCriteriaId":"8E9501A9-E507-4A81-954B-D6D3223EE2F8"}]}]}],"references":[{"url":"https://github.com/nextcloud/server/commit/7350e13113c8ed484727a5c25331ec11d4d59f5f","source":"support@hackerone.com","tags":["Issue Tracking","Patch","Third Party Advisory"]},{"url":"https://github.com/nextcloud/server/commit/a4cfb3ddc1f4cdb585e05c0e9b2f8e52a0e2ee3e","source":"support@hackerone.com","tags":["Issue Tracking","Patch","Third Party Advisory"]},{"url":"https://github.com/owncloud/core/commit/96b8afe48570bc70088ccd8f897e9d71997d336e","source":"support@hackerone.com","tags":["Issue Tracking","Patch","Third Party Advisory"]},{"url":"https://github.com/owncloud/core/commit/bcc6c39ad8c22a00323a114e9c1a0a834983fb35","source":"support@hackerone.com","tags":["Issue Tracking","Patch","Third Party Advisory"]},{"url":"https://hackerone.com/reports/149798","source":"support@hackerone.com","tags":["Exploit","Third Party Advisory"]},{"url":"https://nextcloud.com/security/advisory/?id=nc-sa-2016-011","source":"support@hackerone.com","tags":["Patch","Vendor Advisory"]},{"url":"https://owncloud.org/security/advisory/?id=oc-sa-2016-021","source":"support@hackerone.com","tags":["Patch","Vendor Advisory"]},{"url":"https://github.com/nextcloud/server/commit/7350e13113c8ed484727a5c25331ec11d4d59f5f","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Issue Tracking","Patch","Third Party Advisory"]},{"url":"https://github.com/nextcloud/server/commit/a4cfb3ddc1f4cdb585e05c0e9b2f8e52a0e2ee3e","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Issue Tracking","Patch","Third Party Advisory"]},{"url":"https://github.com/owncloud/core/commit/96b8afe48570bc70088ccd8f897e9d71997d336e","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Issue Tracking","Patch","Third Party Advisory"]},{"url":"https://github.com/owncloud/core/commit/bcc6c39ad8c22a00323a114e9c1a0a834983fb35","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Issue Tracking","Patch","Third Party Advisory"]},{"url":"https://hackerone.com/reports/149798","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit","Third Party Advisory"]},{"url":"https://nextcloud.com/security/advisory/?id=nc-sa-2016-011","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"]},{"url":"https://owncloud.org/security/advisory/?id=oc-sa-2016-021","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"]}]}}]}