Show filters
19 Total Results
Displaying 1-10 of 19
Sort by:
Attacker Value
Unknown
CVE-2020-21699
Disclosure Date: August 22, 2023 (last updated October 08, 2023)
The web server Tengine 2.2.2 developed in the Nginx version from 0.5.6 thru 1.13.2 is vulnerable to an integer overflow vulnerability in the nginx range filter module, resulting in the leakage of potentially sensitive information triggered by specially crafted requests.
0
Attacker Value
Unknown
CVE-2023-39106
Disclosure Date: August 21, 2023 (last updated October 08, 2023)
An issue in Nacos Group Nacos Spring Project v.1.1.1 and before allows a remote attacker to execute arbitrary code via the SnakeYamls Constructor() component.
0
Attacker Value
Unknown
CVE-2021-43116
Disclosure Date: July 05, 2022 (last updated October 07, 2023)
An Access Control vulnerability exists in Nacos 2.0.3 in the access prompt page; enter username and password, click on login to capture packets and then change the returned package, which lets a malicious user login.
0
Attacker Value
Unknown
CVE-2022-25845
Disclosure Date: June 10, 2022 (last updated October 07, 2023)
The package com.alibaba:fastjson before 1.2.83 are vulnerable to Deserialization of Untrusted Data by bypassing the default autoType shutdown restrictions, which is possible under certain conditions. Exploiting this vulnerability allows attacking remote servers. Workaround: If upgrading is not possible, you can enable [safeMode](https://github.com/alibaba/fastjson/wiki/fastjson_safemode).
0
Attacker Value
Unknown
CVE-2022-25842
Disclosure Date: May 01, 2022 (last updated October 07, 2023)
All versions of package com.alibaba.oneagent:one-java-agent-plugin are vulnerable to Arbitrary File Write via Archive Extraction (Zip Slip) using a specially crafted archive that holds directory traversal filenames (e.g. ../../evil.exe). The attacker can overwrite executable files and either invoke them remotely or wait for the system or user to call them, thus achieving remote command execution on the victim’s machine.
0
Attacker Value
Unknown
CVE-2021-44667
Disclosure Date: March 11, 2022 (last updated October 07, 2023)
A Cross Site Scripting (XSS) vulnerability exists in Nacos 2.0.3 in auth/users via the (1) pageSize and (2) pageNo parameters.
0
Attacker Value
Unknown
CVE-2021-33800
Disclosure Date: November 03, 2021 (last updated November 28, 2024)
In Druid 1.2.3, visiting the path with parameter in a certain function can lead to directory traversal.
0
Attacker Value
Unknown
CVE-2021-29442
Disclosure Date: April 27, 2021 (last updated November 28, 2024)
Nacos is a platform designed for dynamic service discovery and configuration and service management. In Nacos before version 1.4.1, the ConfigOpsController lets the user perform management operations like querying the database or even wiping it out. While the /data/remove endpoint is properly protected with the @Secured annotation, the /derby endpoint is not protected and can be openly accessed by unauthenticated users. These endpoints are only valid when using embedded storage (derby DB) so this issue should not affect those installations using external storage (e.g. mysql)
0
Attacker Value
Unknown
CVE-2021-29441
Disclosure Date: April 27, 2021 (last updated November 28, 2024)
Nacos is a platform designed for dynamic service discovery and configuration and service management. In Nacos before version 1.4.1, when configured to use authentication (-Dnacos.core.auth.enabled=true) Nacos uses the AuthFilter servlet filter to enforce authentication. This filter has a backdoor that enables Nacos servers to bypass this filter and therefore skip authentication checks. This mechanism relies on the user-agent HTTP header so it can be easily spoofed. This issue may allow any user to carry out any administrative tasks on the Nacos server.
0
Attacker Value
Unknown
CVE-2020-19676
Disclosure Date: September 30, 2020 (last updated November 28, 2024)
Nacos 1.1.4 is affected by: Incorrect Access Control. An environment can be set up locally to get the service details interface. Then other Nacos service names can be accessed through the service list interface. Service details can then be accessed when not logged in. (detail:https://github.com/alibaba/nacos/issues/2284)
0