Show filters
59 Total Results
Displaying 21-30 of 59
Sort by:
Attacker Value
Unknown

CVE-2020-10688

Disclosure Date: May 27, 2021 (last updated February 22, 2025)
A cross-site scripting (XSS) flaw was found in RESTEasy in versions before 3.11.1.Final and before 4.5.3.Final, where it did not properly handle URL encoding when the RESTEASY003870 exception occurs. An attacker could use this flaw to launch a reflected XSS attack.
Attacker Value
Unknown

CVE-2019-25014

Disclosure Date: January 29, 2021 (last updated February 22, 2025)
A NULL pointer dereference was found in pkg/proxy/envoy/v2/debug.go getResourceVersion in Istio pilot before 1.5.0-alpha.0. If a particular HTTP GET request is made to the pilot API endpoint, it is possible to cause the Go runtime to panic (resulting in a denial of service to the istio-pilot application).
Attacker Value
Unknown

CVE-2020-10758

Disclosure Date: September 16, 2020 (last updated February 22, 2025)
A vulnerability was found in Keycloak before 11.0.1 where DoS attack is possible by sending twenty requests simultaneously to the specified keycloak server, all with a Content-Length header value that exceeds the actual byte count of the request body.
Attacker Value
Unknown

CVE-2020-10719

Disclosure Date: May 26, 2020 (last updated February 21, 2025)
A flaw was found in Undertow in versions before 2.1.1.Final, regarding the processing of invalid HTTP requests with large chunk sizes. This flaw allows an attacker to take advantage of HTTP request smuggling.
Attacker Value
Unknown

CVE-2020-1762

Disclosure Date: April 27, 2020 (last updated February 21, 2025)
An insufficient JWT validation vulnerability was found in Kiali versions 0.4.0 to 1.15.0 and was fixed in Kiali version 1.15.1, wherein a remote attacker could abuse this flaw by stealing a valid JWT cookie and using that to spoof a user session, possibly gaining privileges to view and alter the Istio configuration.
Attacker Value
Unknown

CVE-2020-1712

Disclosure Date: March 31, 2020 (last updated February 21, 2025)
A heap use-after-free vulnerability was found in systemd before version v245-rc1, where asynchronous Polkit queries are performed while handling dbus messages. A local unprivileged attacker can abuse this flaw to crash systemd services or potentially execute code and elevate their privileges, by sending specially crafted dbus messages.
Attacker Value
Unknown

CVE-2020-1764

Disclosure Date: March 26, 2020 (last updated February 21, 2025)
A hard-coded cryptographic key vulnerability in the default configuration file was found in Kiali, all versions prior to 1.15.1. A remote attacker could abuse this flaw by creating their own JWT signed tokens and bypass Kiali authentication mechanisms, possibly gaining privileges to view and alter the Istio configuration.
Attacker Value
Unknown

CVE-2020-8661

Disclosure Date: March 04, 2020 (last updated February 21, 2025)
CNCF Envoy through 1.13.0 may consume excessive amounts of memory when responding internally to pipelined requests.
Attacker Value
Unknown

CVE-2020-8659

Disclosure Date: March 04, 2020 (last updated February 21, 2025)
CNCF Envoy through 1.13.0 may consume excessive amounts of memory when proxying HTTP/1.1 requests or responses with many small (i.e. 1 byte) chunks.
Attacker Value
Unknown

CVE-2020-8595

Disclosure Date: February 12, 2020 (last updated February 21, 2025)
Istio versions 1.2.10 (End of Life) and prior, 1.3 through 1.3.7, and 1.4 through 1.4.3 allows authentication bypass. The Authentication Policy exact-path matching logic can allow unauthorized access to HTTP paths even if they are configured to be only accessed after presenting a valid JWT token. For example, an attacker can add a ? or # character to a URI that would otherwise satisfy an exact-path match.