This CPE summary could be partial or incomplete. Please contact us for a detailed listing.

Summary

Detail
Vendor Nginx First view 2009-09-15
Product Nginx Last view 2020-01-09
Version Type
Update  
Edition  
Language  
Sofware Edition  
Target Software  
Target Hardware  
Other  

Activity : Overall

COMMON PLATFORM ENUMERATION: Repartition per Version

CPE Name Affected CVE
cpe:2.3:a:nginx:nginx:0.8.7:*:*:*:*:*:*:* 18
cpe:2.3:a:nginx:nginx:0.8.5:*:*:*:*:*:*:* 18
cpe:2.3:a:nginx:nginx:0.8.8:*:*:*:*:*:*:* 18
cpe:2.3:a:nginx:nginx:0.8.6:*:*:*:*:*:*:* 18
cpe:2.3:a:nginx:nginx:0.8.9:*:*:*:*:*:*:* 18
cpe:2.3:a:nginx:nginx:0.7.52:*:*:*:*:*:*:* 17
cpe:2.3:a:nginx:nginx:0.7.35:*:*:*:*:*:*:* 17
cpe:2.3:a:nginx:nginx:0.8.2:*:*:*:*:*:*:* 17
cpe:2.3:a:nginx:nginx:0.8.4:*:*:*:*:*:*:* 17
cpe:2.3:a:nginx:nginx:0.7.23:*:*:*:*:*:*:* 17
cpe:2.3:a:nginx:nginx:0.7.4:*:*:*:*:*:*:* 17
cpe:2.3:a:nginx:nginx:0.7.28:*:*:*:*:*:*:* 17
cpe:2.3:a:nginx:nginx:0.7.5:*:*:*:*:*:*:* 17
cpe:2.3:a:nginx:nginx:0.7.56:*:*:*:*:*:*:* 17
cpe:2.3:a:nginx:nginx:0.7.41:*:*:*:*:*:*:* 17
cpe:2.3:a:nginx:nginx:0.7.26:*:*:*:*:*:*:* 17
cpe:2.3:a:nginx:nginx:0.7.36:*:*:*:*:*:*:* 17
cpe:2.3:a:nginx:nginx:0.8.11:*:*:*:*:*:*:* 17
cpe:2.3:a:nginx:nginx:0.7.46:*:*:*:*:*:*:* 17
cpe:2.3:a:nginx:nginx:0.7.59:*:*:*:*:*:*:* 17
cpe:2.3:a:nginx:nginx:0.7.24:*:*:*:*:*:*:* 17
cpe:2.3:a:nginx:nginx:0.7.18:*:*:*:*:*:*:* 17
cpe:2.3:a:nginx:nginx:0.7.13:*:*:*:*:*:*:* 17
cpe:2.3:a:nginx:nginx:0.7.17:*:*:*:*:*:*:* 17
cpe:2.3:a:nginx:nginx:0.7.43:*:*:*:*:*:*:* 17
cpe:2.3:a:nginx:nginx:0.7.44:*:*:*:*:*:*:* 17
cpe:2.3:a:nginx:nginx:0.7.57:*:*:*:*:*:*:* 17
cpe:2.3:a:nginx:nginx:0.7.15:*:*:*:*:*:*:* 17
cpe:2.3:a:nginx:nginx:0.7.0:*:*:*:*:*:*:* 17
cpe:2.3:a:nginx:nginx:0.7.51:*:*:*:*:*:*:* 17
cpe:2.3:a:nginx:nginx:0.7.58:*:*:*:*:*:*:* 17
cpe:2.3:a:nginx:nginx:0.7.27:*:*:*:*:*:*:* 17
cpe:2.3:a:nginx:nginx:0.7.30:*:*:*:*:*:*:* 17
cpe:2.3:a:nginx:nginx:0.7.34:*:*:*:*:*:*:* 17
cpe:2.3:a:nginx:nginx:0.7.33:*:*:*:*:*:*:* 17
cpe:2.3:a:nginx:nginx:0.7.8:*:*:*:*:*:*:* 17
cpe:2.3:a:nginx:nginx:0.7.47:*:*:*:*:*:*:* 17
cpe:2.3:a:nginx:nginx:0.7.53:*:*:*:*:*:*:* 17
cpe:2.3:a:nginx:nginx:0.7.7:*:*:*:*:*:*:* 17
cpe:2.3:a:nginx:nginx:0.7.40:*:*:*:*:*:*:* 17
cpe:2.3:a:nginx:nginx:0.7.19:*:*:*:*:*:*:* 17
cpe:2.3:a:nginx:nginx:0.8.0:*:*:*:*:*:*:* 17
cpe:2.3:a:nginx:nginx:0.7.6:*:*:*:*:*:*:* 17
cpe:2.3:a:nginx:nginx:0.7.48:*:*:*:*:*:*:* 17
cpe:2.3:a:nginx:nginx:0.7.54:*:*:*:*:*:*:* 17
cpe:2.3:a:nginx:nginx:0.7.29:*:*:*:*:*:*:* 17
cpe:2.3:a:nginx:nginx:0.7.11:*:*:*:*:*:*:* 17
cpe:2.3:a:nginx:nginx:0.8.12:*:*:*:*:*:*:* 17
cpe:2.3:a:nginx:nginx:0.8.1:*:*:*:*:*:*:* 17
cpe:2.3:a:nginx:nginx:0.7.32:*:*:*:*:*:*:* 17

Related : CVE

This CPE Product have more than 25 Relations. If you want to see a complete summary for this CPE, please contact us.
  Date Alert Description
5.3 2020-01-09 CVE-2019-20372

NGINX before 1.17.7, with certain error_page configurations, allows HTTP request smuggling, as demonstrated by the ability of an attacker to read unauthorized web pages in environments where NGINX is being fronted by a load balancer.

4.8 2019-11-19 CVE-2011-4968

nginx http proxy module does not verify peer identity of https origin server which could facilitate man-in-the-middle attack (MITM)

6.1 2018-11-07 CVE-2018-16845

nginx before versions 1.15.6, 1.14.1 has a vulnerability in the ngx_http_mp4_module, which might allow an attacker to cause infinite loop in a worker process, cause a worker process crash, or might result in worker process memory disclosure by using a specially crafted mp4 file. The issue only affects nginx if it is built with the ngx_http_mp4_module (the module is not built by default) and the .mp4. directive is used in the configuration file. Further, the attack is only possible if an attacker is able to trigger processing of a specially crafted mp4 file with the ngx_http_mp4_module.

7.5 2018-11-07 CVE-2018-16844

nginx before versions 1.15.6 and 1.14.1 has a vulnerability in the implementation of HTTP/2 that can allow for excessive CPU usage. This issue affects nginx compiled with the ngx_http_v2_module (not compiled by default) if the 'http2' option of the 'listen' directive is used in a configuration file.

7.5 2018-11-07 CVE-2018-16843

nginx before versions 1.15.6 and 1.14.1 has a vulnerability in the implementation of HTTP/2 that can allow for excessive memory consumption. This issue affects nginx compiled with the ngx_http_v2_module (not compiled by default) if the 'http2' option of the 'listen' directive is used in a configuration file.

7.5 2017-07-13 CVE-2017-7529

Nginx versions since 0.5.6 up to and including 1.13.2 are vulnerable to integer overflow vulnerability in nginx range filter module resulting into leak of potentially sensitive information triggered by specially crafted request.

7.8 2016-11-29 CVE-2016-1247

The nginx package before 1.6.2-5+deb8u3 on Debian jessie, the nginx packages before 1.4.6-1ubuntu3.6 on Ubuntu 14.04 LTS, before 1.10.0-0ubuntu0.16.04.3 on Ubuntu 16.04 LTS, and before 1.10.1-0ubuntu1.1 on Ubuntu 16.10, and the nginx ebuild before 1.10.2-r3 on Gentoo allow local users with access to the web server user account to gain root privileges via a symlink attack on the error log.

7.5 2016-06-07 CVE-2016-4450

os/unix/ngx_files.c in nginx before 1.10.1 and 1.11.x before 1.11.1 allows remote attackers to cause a denial of service (NULL pointer dereference and worker process crash) via a crafted request, involving writing a client request body to a temporary file.

5.3 2016-02-15 CVE-2016-0747

The resolver in nginx before 1.8.1 and 1.9.x before 1.9.10 does not properly limit CNAME resolution, which allows remote attackers to cause a denial of service (worker process resource consumption) via vectors related to arbitrary name resolution.

7.3 2016-02-15 CVE-2016-0746

Use-after-free vulnerability in the resolver in nginx 0.6.18 through 1.8.0 and 1.9.x before 1.9.10 allows remote attackers to cause a denial of service (worker process crash) or possibly have unspecified other impact via a crafted DNS response related to CNAME response processing.

5.3 2016-02-15 CVE-2016-0742

The resolver in nginx before 1.8.1 and 1.9.x before 1.9.10 allows remote attackers to cause a denial of service (invalid pointer dereference and worker process crash) via a crafted UDP DNS response.

4.3 2014-12-29 CVE-2014-3556

The STARTTLS implementation in mail/ngx_mail_smtp_handler.c in the SMTP proxy in nginx 1.5.x and 1.6.x before 1.6.1 and 1.7.x before 1.7.4 does not properly restrict I/O buffering, which allows man-in-the-middle attackers to insert commands into encrypted SMTP sessions by sending a cleartext command that is processed after TLS is in place, related to a "plaintext command injection" attack, a similar issue to CVE-2011-0411.

4.3 2014-12-08 CVE-2014-3616

nginx 0.5.6 through 1.7.4, when using the same shared ssl_session_cache or ssl_session_ticket_key for multiple servers, can reuse a cached SSL session for an unrelated context, which allows remote attackers with certain privileges to conduct "virtual host confusion" attacks.

7.5 2014-04-29 CVE-2014-0088

The SPDY implementation in the ngx_http_spdy_module module in nginx 1.5.10 before 1.5.11, when running on a 32-bit platform, allows remote attackers to execute arbitrary code via a crafted request.

5.1 2014-03-28 CVE-2014-0133

Heap-based buffer overflow in the SPDY implementation in nginx 1.3.15 before 1.4.7 and 1.5.x before 1.5.12 allows remote attackers to execute arbitrary code via a crafted request.

7.5 2013-11-23 CVE-2013-4547

nginx 0.8.41 through 1.4.3 and 1.5.x before 1.5.7 allows remote attackers to bypass intended restrictions via an unescaped space character in a URI.

7.5 2013-10-26 CVE-2013-0337

The default configuration of nginx, possibly 1.3.13 and earlier, uses world-readable permissions for the (1) access.log and (2) error.log files, which allows local users to obtain sensitive information by reading the files.

5.8 2013-07-19 CVE-2013-2070

http/modules/ngx_http_proxy_module.c in nginx 1.1.4 through 1.2.8 and 1.3.0 through 1.4.0, when proxy_pass is used with untrusted HTTP servers, allows remote attackers to cause a denial of service (crash) and obtain sensitive information from worker process memory via a crafted proxy response, a similar vulnerability to CVE-2013-2028.

7.5 2013-07-19 CVE-2013-2028

The ngx_http_parse_chunked function in http/ngx_http_parse.c in nginx 1.3.9 through 1.4.0 allows remote attackers to cause a denial of service (crash) and execute arbitrary code via a chunked Transfer-Encoding request with a large chunk size, which triggers an integer signedness error and a stack-based buffer overflow.

5 2012-07-26 CVE-2011-4963

nginx/Windows 1.3.x before 1.3.1 and 1.2.x before 1.2.1 allows remote attackers to bypass intended access restrictions and access restricted files via (1) a trailing . (dot) or (2) certain "$index_allocation" sequences in a request.

5.1 2012-04-17 CVE-2012-2089

Buffer overflow in ngx_http_mp4_module.c in the ngx_http_mp4_module module in nginx 1.0.7 through 1.0.14 and 1.1.3 through 1.1.18, when the mp4 directive is used, allows remote attackers to cause a denial of service (memory overwrite) or possibly execute arbitrary code via a crafted MP4 file.

5 2012-04-17 CVE-2012-1180

Use-after-free vulnerability in nginx before 1.0.14 and 1.1.x before 1.1.17 allows remote HTTP servers to obtain sensitive information from process memory via a crafted backend response, in conjunction with a client request.

5 2011-12-08 CVE-2011-4315

Heap-based buffer overflow in compression-pointer processing in core/ngx_resolver.c in nginx before 1.0.10 allows remote resolvers to cause a denial of service (daemon crash) or possibly have unspecified other impact via a long response.

5 2010-06-15 CVE-2010-2266

nginx 0.8.36 allows remote attackers to cause a denial of service (crash) via certain encoded directory traversal sequences that trigger memory corruption, as demonstrated using the "%c0.%c0." sequence.

5 2010-06-15 CVE-2010-2263

nginx 0.8 before 0.8.40 and 0.7 before 0.7.66, when running on Windows, allows remote attackers to obtain source code or unparsed content of arbitrary files under the web document root by appending ::$DATA to the URI.

CWE : Common Weakness Enumeration

%idName
25% (6) CWE-119 Failure to Constrain Operations within the Bounds of a Memory Buffer
16% (4) CWE-264 Permissions, Privileges, and Access Controls
8% (2) CWE-400 Uncontrolled Resource Consumption ('Resource Exhaustion')
8% (2) CWE-399 Resource Management Errors
8% (2) CWE-20 Improper Input Validation
4% (1) CWE-444 Inconsistent Interpretation of HTTP Requests ('HTTP Request Smuggli...
4% (1) CWE-284 Access Control (Authorization) Issues
4% (1) CWE-200 Information Exposure
4% (1) CWE-190 Integer Overflow or Wraparound
4% (1) CWE-189 Numeric Errors
4% (1) CWE-77 Improper Sanitization of Special Elements used in a Command ('Comma...
4% (1) CWE-59 Improper Link Resolution Before File Access ('Link Following')
4% (1) CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path ...

Oval Markup Language : Definitions

OvalID Name
oval:org.mitre.oval:def:7674 DSA-1884 nginx -- buffer underflow
oval:org.mitre.oval:def:13138 DSA-1884-1 nginx -- buffer underflow
oval:org.mitre.oval:def:15289 DSA-2434-1 nginx -- sensitive information leak
oval:org.mitre.oval:def:18419 DSA-2721-1 nginx - nginx security update
oval:org.mitre.oval:def:20055 DSA-2802-1 nginx - restriction bypass
oval:org.mitre.oval:def:26801 USN-2351-1 -- nginx vulnerability
oval:org.mitre.oval:def:26331 DSA-3029-1 nginx - security update

Open Source Vulnerability Database (OSVDB)

id Description
77184 nginx ngx_resolver.c ngx_resolver_copy() Function DNS Response Parsing Remote...
65531 nginx on Windows URI ::$DATA Append Arbitrary File Access
65530 nginx Encoded Traversal Sequence Memory Corruption Remote DoS
59278 nginx src/http/ngx_http_parse.c ngx_http_process_request_headers() Function U...
58328 nginx WebDAV Multiple Method Traversal Arbitrary File Write
58128 nginx ngx_http_parse_complex_uri() Function Underflow

ExploitDB Exploits

id Description
32277 nginx 1.4.0 64-bit - Remote Exploit for Linux (Generic)
25499 nginx 1.3.9-1.4.0 DoS PoC

OpenVAS Exploits

This CPE Product have more than 25 Relations. If you want to see a complete summary for this CPE, please contact us.
id Description
2012-08-30 Name : Fedora Update for nginx FEDORA-2012-6238
File : nvt/gb_fedora_2012_6238_nginx_fc17.nasl
2012-08-30 Name : Fedora Update for nginx FEDORA-2012-3846
File : nvt/gb_fedora_2012_3846_nginx_fc17.nasl
2012-08-10 Name : Gentoo Security Advisory GLSA 201206-07 (nginx)
File : nvt/glsa_201206_07.nasl
2012-08-03 Name : Mandriva Update for nginx MDVSA-2012:043 (nginx)
File : nvt/gb_mandriva_MDVSA_2012_043.nasl
2012-08-02 Name : SuSE Update for nginx openSUSE-SU-2012:0237-1 (nginx)
File : nvt/gb_suse_2012_0237_1.nasl
2012-05-04 Name : Fedora Update for nginx FEDORA-2012-6411
File : nvt/gb_fedora_2012_6411_nginx_fc16.nasl
2012-05-04 Name : Fedora Update for nginx FEDORA-2012-6371
File : nvt/gb_fedora_2012_6371_nginx_fc15.nasl
2012-04-30 Name : Debian Security Advisory DSA 2434-1 (nginx)
File : nvt/deb_2434_1.nasl
2012-04-30 Name : Gentoo Security Advisory GLSA 201203-22 (nginx)
File : nvt/glsa_201203_22.nasl
2012-04-30 Name : FreeBSD Ports: nginx
File : nvt/freebsd_nginx0.nasl
2012-04-17 Name : nginx 'ngx_http_mp4_module.c' Buffer Overflow Vulnerability
File : nvt/gb_nginx_52999.nasl
2012-04-17 Name : nginx 'ngx_cpystrn()' Information Disclosure Vulnerability
File : nvt/gb_nginx_52578.nasl
2012-04-02 Name : Fedora Update for nginx FEDORA-2012-4006
File : nvt/gb_fedora_2012_4006_nginx_fc15.nasl
2012-04-02 Name : Fedora Update for nginx FEDORA-2012-3991
File : nvt/gb_fedora_2012_3991_nginx_fc16.nasl
2012-04-02 Name : Fedora Update for nginx FEDORA-2011-16075
File : nvt/gb_fedora_2011_16075_nginx_fc16.nasl
2011-12-09 Name : Fedora Update for nginx FEDORA-2011-16110
File : nvt/gb_fedora_2011_16110_nginx_fc15.nasl
2011-11-21 Name : nginx DNS Resolver Remote Heap Buffer Overflow Vulnerability
File : nvt/gb_nginx_50710.nasl
2010-12-09 Name : Fedora Update for kernel FEDORA-2010-18432
File : nvt/gb_fedora_2010_18432_kernel_fc12.nasl
2010-11-18 Name : nginx HTTP Request Remote Buffer Overflow Vulnerability
File : nvt/gb_nginx_http_request_bof_vuln.nasl
2010-09-22 Name : Fedora Update for kernel FEDORA-2010-14878
File : nvt/gb_fedora_2010_14878_kernel_fc12.nasl
2010-09-07 Name : Fedora Update for kernel FEDORA-2010-13903
File : nvt/gb_fedora_2010_13903_kernel_fc12.nasl
2010-08-30 Name : Fedora Update for kernel FEDORA-2010-13110
File : nvt/gb_fedora_2010_13110_kernel_fc12.nasl
2010-06-14 Name : nginx Remote Source Code Disclosure and Denial of Service Vulnerabilities
File : nvt/gb_nginx_40760.nasl
2009-12-10 Name : Fedora Core 12 FEDORA-2009-12750 (nginx)
File : nvt/fcore_2009_12750.nasl
2009-12-10 Name : Fedora Core 10 FEDORA-2009-12775 (nginx)
File : nvt/fcore_2009_12775.nasl

Snort® IPS/IDS

Date Description
2016-03-14 nginx SMTP proxy STARTTLS plaintext command injection attempt
RuleID : 36197 - Type : SERVER-WEBAPP - Revision : 4
2015-03-31 nginx URI processing security bypass attempt
RuleID : 33581 - Type : SERVER-WEBAPP - Revision : 3
2014-01-10 nginx URI parsing buffer overflow attempt
RuleID : 17528 - Type : SERVER-WEBAPP - Revision : 10
2014-01-10 IIS 5.1 alternate data stream authentication bypass attempt
RuleID : 17103 - Type : SERVER-IIS - Revision : 16

Nessus® Vulnerability Scanner

This CPE Product have more than 25 Relations. If you want to see a complete summary for this CPE, please contact us.
id Description
2019-01-03 Name: The remote Fedora host is missing a security update.
File: fedora_2018-7c540fdab4.nasl - Type: ACT_GATHER_INFO
2018-12-17 Name: The remote Amazon Linux AMI host is missing a security update.
File: ala_ALAS-2018-1125.nasl - Type: ACT_GATHER_INFO
2018-12-10 Name: The remote EulerOS host is missing multiple security updates.
File: EulerOS_SA-2018-1399.nasl - Type: ACT_GATHER_INFO
2018-11-14 Name: The remote web server is affected by multiple vulnerabilities.
File: nginx_1_15_6.nasl - Type: ACT_GATHER_INFO
2018-11-09 Name: The remote Debian host is missing a security update.
File: debian_DLA-1572.nasl - Type: ACT_GATHER_INFO
2018-11-09 Name: The remote Debian host is missing a security-related update.
File: debian_DSA-4335.nasl - Type: ACT_GATHER_INFO
2018-11-07 Name: The remote FreeBSD host is missing one or more security-related updates.
File: freebsd_pkg_84ca56bee1de11e8bcfd00e04c1ea73d.nasl - Type: ACT_GATHER_INFO
2018-10-16 Name: The remote web server is affected by a denial of service vulnerability.
File: nginx_1_11_1.nasl - Type: ACT_GATHER_INFO
2018-10-16 Name: The remote web server is affected by a data disclosure vulnerability.
File: nginx_1_13_3.nasl - Type: ACT_GATHER_INFO
2018-08-17 Name: The remote PhotonOS host is missing multiple security updates.
File: PhotonOS_PHSA-2016-0012.nasl - Type: ACT_GATHER_INFO
2018-08-17 Name: The remote PhotonOS host is missing multiple security updates.
File: PhotonOS_PHSA-2017-0038.nasl - Type: ACT_GATHER_INFO
2018-03-09 Name: The remote web server is affected by a directory traversal vulnerability.
File: nginx_0_7_63.nasl - Type: ACT_GATHER_INFO
2018-03-09 Name: The remote web server is affected by an information disclosure vulnerability.
File: nginx_0_7_66.nasl - Type: ACT_GATHER_INFO
2018-03-09 Name: The remote web server is affected by a denial of service vulnerability.
File: nginx_0_7_67.nasl - Type: ACT_GATHER_INFO
2018-03-09 Name: The remote web server is affected by multiple vulnerabilities.
File: nginx_1_8_1.nasl - Type: ACT_GATHER_INFO
2018-02-28 Name: The version of Arista Networks EOS running on the remote device is affected b...
File: arista_eos_sa0021.nasl - Type: ACT_GATHER_INFO
2017-12-18 Name: The remote web server is affected by an integer overflow vulnerability.
File: nginx_1_13_2.nasl - Type: ACT_GATHER_INFO
2017-10-02 Name: The remote Gentoo host is missing one or more security-related patches.
File: gentoo_GLSA-201606-06.nasl - Type: ACT_GATHER_INFO
2017-09-15 Name: The remote Amazon Linux AMI host is missing a security update.
File: ala_ALAS-2017-894.nasl - Type: ACT_GATHER_INFO
2017-08-24 Name: The remote Fedora host is missing a security update.
File: fedora_2017-aecd25b8a9.nasl - Type: ACT_GATHER_INFO
2017-08-24 Name: The remote Fedora host is missing a security update.
File: fedora_2017-c27a947af1.nasl - Type: ACT_GATHER_INFO
2017-07-31 Name: The remote openSUSE host is missing a security update.
File: openSUSE-2017-867.nasl - Type: ACT_GATHER_INFO
2017-07-14 Name: The remote Debian host is missing a security update.
File: debian_DLA-1024.nasl - Type: ACT_GATHER_INFO
2017-07-14 Name: The remote Ubuntu host is missing one or more security-related patches.
File: ubuntu_USN-3352-1.nasl - Type: ACT_GATHER_INFO
2017-07-13 Name: The remote Debian host is missing a security-related update.
File: debian_DSA-3908.nasl - Type: ACT_GATHER_INFO