Show filters
29 Total Results
Displaying 11-20 of 29
Sort by:
Attacker Value
Unknown

CVE-2021-23020

Disclosure Date: June 01, 2021 (last updated February 22, 2025)
The NAAS 3.x before 3.10.0 API keys were generated using an insecure pseudo-random string and hashing algorithm which could lead to predictable keys.
Attacker Value
Unknown

CVE-2021-23019

Disclosure Date: June 01, 2021 (last updated February 22, 2025)
The NGINX Controller 2.0.0 thru 2.9.0 and 3.x before 3.15.0 Administrator password may be exposed in the systemd.txt file that is included in the NGINX support package.
Attacker Value
Unknown

CVE-2021-23018

Disclosure Date: June 01, 2021 (last updated February 22, 2025)
Intra-cluster communication does not use TLS. The services within the NGINX Controller 3.x before 3.4.0 namespace are using cleartext protocols inside the cluster.
Attacker Value
Unknown

CVE-2020-27730

Disclosure Date: December 11, 2020 (last updated February 22, 2025)
In versions 3.0.0-3.9.0, 2.0.0-2.9.0, and 1.0.1, the NGINX Controller Agent does not use absolute paths when calling system utilities.
Attacker Value
Unknown

CVE-2020-5911

Disclosure Date: July 02, 2020 (last updated November 28, 2024)
In versions 3.0.0-3.5.0, 2.0.0-2.9.0, and 1.0.1, the NGINX Controller installer starts the download of Kubernetes packages from an HTTP URL On Debian/Ubuntu system.
Attacker Value
Unknown

CVE-2020-5909

Disclosure Date: July 02, 2020 (last updated February 21, 2025)
In versions 3.0.0-3.5.0, 2.0.0-2.9.0, and 1.0.1, when users run the command displayed in NGINX Controller user interface (UI) to fetch the agent installer, the server TLS certificate is not verified.
Attacker Value
Unknown

CVE-2020-5910

Disclosure Date: July 02, 2020 (last updated February 21, 2025)
In versions 3.0.0-3.5.0, 2.0.0-2.9.0, and 1.0.1, the Neural Autonomic Transport System (NATS) messaging services in use by the NGINX Controller do not require any form of authentication, so any successful connection would be authorized.
Attacker Value
Unknown

CVE-2020-5899

Disclosure Date: July 01, 2020 (last updated February 21, 2025)
In NGINX Controller 3.0.0-3.4.0, recovery code required to change a user's password is transmitted and stored in the database in plain text, which allows an attacker who can intercept the database connection or have read access to the database, to request a password reset using the email address of another registered user then retrieve the recovery code.
Attacker Value
Unknown

CVE-2020-5901

Disclosure Date: July 01, 2020 (last updated February 21, 2025)
In NGINX Controller 3.3.0-3.4.0, undisclosed API endpoints may allow for a reflected Cross Site Scripting (XSS) attack. If the victim user is logged in as admin this could result in a complete compromise of the system.
Attacker Value
Unknown

CVE-2020-5900

Disclosure Date: July 01, 2020 (last updated February 21, 2025)
In versions 3.0.0-3.4.0, 2.0.0-2.9.0, and 1.0.1, there is insufficient cross-site request forgery (CSRF) protections for the NGINX Controller user interface.