Debian Nats-Server vulnerabilities

24 known vulnerabilities affecting debian/nats-server.

Total CVEs
24
CISA KEV
0
Public exploits
0
Exploited in wild
0
Severity breakdown
CRITICAL1HIGH7MEDIUM9LOW7

Vulnerabilities

Page 2 of 2
CVE-2022-24450LOWCVSS 8.82022
CVE-2022-24450 [HIGH] CVE-2022-24450: nats-server - NATS nats-server before 2.7.2 has Incorrect Access Control. Any authenticated us... NATS nats-server before 2.7.2 has Incorrect Access Control. Any authenticated user can obtain the privileges of the System account by misusing the "dynamically provisioned sandbox accounts" feature. Scope: local bookworm: resolved forky: resolved sid: resolved trixie: resolved
debian
CVE-2021-3127HIGHCVSS 7.5fixed in golang-github-nats-io-jwt 2.2.0-1 (bookworm)2021
CVE-2021-3127 [HIGH] CVE-2021-3127: golang-github-nats-io-jwt - NATS Server 2.x before 2.2.0 and JWT library before 2.0.1 have Incorrect Access ... NATS Server 2.x before 2.2.0 and JWT library before 2.0.1 have Incorrect Access Control because Import Token bindings are mishandled. Scope: local bookworm: resolved (fixed in 2.2.0-1) forky: resolved (fixed in 2.2.0-1) sid: resolved (fixed in 2.2.0-1) trixie: resolved (fixed in 2.2.0-1)
debian
CVE-2020-28466LOWCVSS 7.52020
CVE-2020-28466 [HIGH] CVE-2020-28466: nats-server - This affects all versions of package github.com/nats-io/nats-server/server. Untr... This affects all versions of package github.com/nats-io/nats-server/server. Untrusted accounts are able to crash the server using configs that represent a service export/import cycles. Disclaimer from the maintainers: Running a NATS service which is exposed to untrusted users presents a heightened risk. Any remote execution flaw or equivalent seriousness, or den
debian
CVE-2019-13126LOWCVSS 7.52019
CVE-2019-13126 [HIGH] CVE-2019-13126: nats-server - An integer overflow in NATS Server before 2.0.2 allows a remote attacker to cras... An integer overflow in NATS Server before 2.0.2 allows a remote attacker to crash the server by sending a crafted request. If authentication is enabled, then the remote attacker must have first authenticated. Scope: local bookworm: resolved forky: resolved sid: resolved trixie: resolved
debian