Note:
This project will be discontinued after December 13, 2021. [more]
Product:
Nginx_api_connectivity_manager
(F5)Repositories |
Unknown: This might be proprietary software. |
#Vulnerabilities | 3 |
Date | Id | Summary | Products | Score | Patch | Annotated |
---|---|---|---|---|---|---|
2023-05-03 | CVE-2023-28656 | NGINX Management Suite may allow an authenticated attacker to gain access to configuration objects outside of their assigned environment. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated. | Nginx_api_connectivity_manager, Nginx_instance_manager, Nginx_security_monitoring | N/A | ||
2023-05-03 | CVE-2023-28724 | NGINX Management Suite default file permissions are set such that an authenticated attacker may be able to modify sensitive files on NGINX Instance Manager and NGINX API Connectivity Manager. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated. | Nginx_api_connectivity_manager, Nginx_instance_manager, Nginx_security_monitoring | N/A | ||
2024-11-06 | CVE-2024-10318 | A session fixation issue was discovered in the NGINX OpenID Connect reference implementation, where a nonce was not checked at login time. This flaw allows an attacker to fix a victim's session to an attacker-controlled account. As a result, although the attacker cannot log in as the victim, they can force the session to associate it with the attacker-controlled account, leading to potential misuse of the victim's session. | Nginx_api_connectivity_manager, Nginx_ingress_controller, Nginx_instance_manager, Nginx_openid_connect | 5.4 |