CVE-2022-29946
- EPSS 0.11%
- Veröffentlicht 11.07.2024 21:15:10
- Zuletzt bearbeitet 21.11.2024 07:00:02
NATS.io NATS Server before 2.8.2 and Streaming Server before 0.24.6 could allow a remote attacker to bypass security restrictions, caused by the failure to enforce negative user permissions in one scenario. By using a queue subscription on the wildca...
CVE-2023-46129
- EPSS 0.12%
- Veröffentlicht 31.10.2023 00:15:09
- Zuletzt bearbeitet 21.11.2024 08:27:56
NATS.io is a high performance open source pub-sub distributed communication technology, built for the cloud, on-premise, IoT, and edge computing. The cryptographic key handling library, nkeys, recently gained support for encryption, not just for sign...
CVE-2022-26652
- EPSS 0.68%
- Veröffentlicht 10.03.2022 17:47:51
- Zuletzt bearbeitet 21.11.2024 06:54:15
NATS nats-server before 2.7.4 allows Directory Traversal (with write access) via an element in a ZIP archive for JetStream streams. nats-streaming-server before 0.24.3 is also affected.
- EPSS 0.53%
- Veröffentlicht 08.02.2022 02:15:06
- Zuletzt bearbeitet 21.11.2024 06:50:26
NATS nats-server before 2.7.2 has Incorrect Access Control. Any authenticated user can obtain the privileges of the System account by misusing the "dynamically provisioned sandbox accounts" feature.
CVE-2021-3127
- EPSS 0.29%
- Veröffentlicht 16.03.2021 20:15:13
- Zuletzt bearbeitet 21.11.2024 06:20:56
NATS Server 2.x before 2.2.0 and JWT library before 2.0.1 have Incorrect Access Control because Import Token bindings are mishandled.
CVE-2020-28466
- EPSS 8.43%
- Veröffentlicht 07.03.2021 10:15:12
- Zuletzt bearbeitet 21.11.2024 05:22:51
This affects all versions of package github.com/nats-io/nats-server/server. Untrusted accounts are able to crash the server using configs that represent a service export/import cycles. Disclaimer from the maintainers: Running a NATS service which is ...
CVE-2019-13126
- EPSS 0.68%
- Veröffentlicht 29.07.2019 17:15:11
- Zuletzt bearbeitet 21.11.2024 04:24:14
An integer overflow in NATS Server before 2.0.2 allows a remote attacker to crash the server by sending a crafted request. If authentication is enabled, then the remote attacker must have first authenticated.