Show filters
29 Total Results
Displaying 21-29 of 29
Sort by:
Attacker Value
Unknown

CVE-2020-5895

Disclosure Date: May 07, 2020 (last updated February 21, 2025)
On NGINX Controller versions 3.1.0-3.3.0, AVRD uses world-readable and world-writable permissions on its socket, which allows processes or users on the local system to write arbitrary data into the socket. A local system attacker can make AVRD segmentation fault (SIGSEGV) by writing malformed messages to the socket.
Attacker Value
Unknown

CVE-2020-5894

Disclosure Date: May 07, 2020 (last updated February 21, 2025)
On versions 3.0.0-3.3.0, the NGINX Controller webserver does not invalidate the server-side session token after users log out.
Attacker Value
Unknown

CVE-2020-5867

Disclosure Date: April 23, 2020 (last updated February 21, 2025)
In versions prior to 3.3.0, the NGINX Controller Agent installer script 'install.sh' uses HTTP instead of HTTPS to check and install packages
Attacker Value
Unknown

CVE-2020-5864

Disclosure Date: April 23, 2020 (last updated February 21, 2025)
In versions of NGINX Controller prior to 3.2.0, communication between NGINX Controller and NGINX Plus instances skip TLS verification by default.
Attacker Value
Unknown

CVE-2020-5866

Disclosure Date: April 23, 2020 (last updated February 21, 2025)
In versions of NGINX Controller prior to 3.3.0, the helper.sh script, which is used optionally in NGINX Controller to change settings, uses sensitive items as command-line arguments.
Attacker Value
Unknown

CVE-2020-5865

Disclosure Date: April 23, 2020 (last updated February 21, 2025)
In versions prior to 3.3.0, the NGINX Controller is configured to communicate with its Postgres database server over unencrypted channels, making the communicated data vulnerable to interception via man-in-the-middle (MiTM) attacks.
Attacker Value
Unknown

CVE-2020-7621

Disclosure Date: April 02, 2020 (last updated February 21, 2025)
strong-nginx-controller through 1.0.2 is vulnerable to Command Injection. It allows execution of arbitrary command as part of the '_nginxCmd()' function.
Attacker Value
Unknown

CVE-2020-5863

Disclosure Date: March 27, 2020 (last updated November 27, 2024)
In NGINX Controller versions prior to 3.2.0, an unauthenticated attacker with network access to the Controller API can create unprivileged user accounts. The user which is created is only able to upload a new license to the system but cannot view or modify any other components of the system.
Attacker Value
Unknown

CVE-2018-1002104

Disclosure Date: January 14, 2020 (last updated February 21, 2025)
Versions < 1.5 of the Kubernetes ingress default backend, which handles invalid ingress traffic, exposed prometheus metrics publicly.