Summary
Detail | |||
---|---|---|---|
Vendor | f5 | First view | 2009-09-15 |
Product | Nginx | Last view | 2025-03-04 |
Version | 0.5.7 | Type | Application |
Update | * | ||
Edition | * | ||
Language | * | ||
Sofware Edition | * | ||
Target Software | * | ||
Target Hardware | * | ||
Other | * | ||
CPE Product | cpe:2.3:a:f5:nginx |
Activity : Overall
Related : CVE
Date | Alert | Description | |
---|---|---|---|
0 | 2025-03-04 | CVE-2025-1695 | In NGINX Unit before version 1.34.2 with the Java Language Module in use, undisclosed requests can lead to an infinite loop and cause an increase in CPU resource utilization. This vulnerability allows a remote attacker to cause a degradation that can lead to a limited denial-of-service (DoS). Â There is no control plane exposure; this is a data plane issue only. Â Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated. |
7.5 | 2023-10-10 | CVE-2023-44487 | The HTTP/2 protocol allows a denial of service (server resource consumption) because request cancellation can reset many streams quickly, as exploited in the wild in August through October 2023. |
7.1 | 2022-10-19 | CVE-2022-41742 | NGINX Open Source before versions 1.23.2 and 1.22.1, NGINX Open Source Subscription before versions R2 P1 and R1 P1, and NGINX Plus before versions R27 P1 and R26 P1 have a vulnerability in the module ngx_http_mp4_module that might allow a local attacker to cause a worker process crash, or might result in worker process memory disclosure by using a specially crafted audio or video file. The issue affects only NGINX products that are built with the module ngx_http_mp4_module, when the mp4 directive is used in the configuration file. Further, the attack is possible only if an attacker can trigger processing of a specially crafted audio or video file with the module ngx_http_mp4_module. |
7.8 | 2022-10-19 | CVE-2022-41741 | NGINX Open Source before versions 1.23.2 and 1.22.1, NGINX Open Source Subscription before versions R2 P1 and R1 P1, and NGINX Plus before versions R27 P1 and R26 P1 have a vulnerability in the module ngx_http_mp4_module that might allow a local attacker to corrupt NGINX worker memory, resulting in its termination or potential other impact using a specially crafted audio or video file. The issue affects only NGINX products that are built with the ngx_http_mp4_module, when the mp4 directive is used in the configuration file. Further, the attack is possible only if an attacker can trigger processing of a specially crafted audio or video file with the module ngx_http_mp4_module. |
7.4 | 2022-03-23 | CVE-2021-3618 | ALPACA is an application layer protocol content confusion attack, exploiting TLS servers implementing different protocols but using compatible certificates, such as multi-domain or wildcard certificates. A MiTM attacker having access to victim's traffic at the TCP/IP layer can redirect traffic from one subdomain to another, resulting in a valid TLS session. This breaks the authentication of TLS and cross-protocol attacks may be possible where the behavior of one protocol service may compromise the other at the application layer. |
9.8 | 2021-06-06 | CVE-2017-20005 | NGINX before 1.13.6 has a buffer overflow for years that exceed four digits, as demonstrated by a file with a modification date in 1969 that causes an integer overflow (or a false modification date far in the future), when encountered by the autoindex module. |
7.7 | 2021-06-01 | CVE-2021-23017 | A security issue in nginx resolver was identified, which might allow an attacker who is able to forge UDP packets from the DNS server to cause 1-byte memory overwrite, resulting in worker process crash or potential other impact. |
5.3 | 2020-01-09 | CVE-2019-20372 | NGINX before 1.17.7, with certain error_page configurations, allows HTTP request smuggling, as demonstrated by the ability of an attacker to read unauthorized web pages in environments where NGINX is being fronted by a load balancer. |
6.1 | 2018-11-07 | CVE-2018-16845 | nginx before versions 1.15.6, 1.14.1 has a vulnerability in the ngx_http_mp4_module, which might allow an attacker to cause infinite loop in a worker process, cause a worker process crash, or might result in worker process memory disclosure by using a specially crafted mp4 file. The issue only affects nginx if it is built with the ngx_http_mp4_module (the module is not built by default) and the .mp4. directive is used in the configuration file. Further, the attack is only possible if an attacker is able to trigger processing of a specially crafted mp4 file with the ngx_http_mp4_module. |
7.5 | 2018-11-07 | CVE-2018-16844 | nginx before versions 1.15.6 and 1.14.1 has a vulnerability in the implementation of HTTP/2 that can allow for excessive CPU usage. This issue affects nginx compiled with the ngx_http_v2_module (not compiled by default) if the 'http2' option of the 'listen' directive is used in a configuration file. |
7.5 | 2018-11-07 | CVE-2018-16843 | nginx before versions 1.15.6 and 1.14.1 has a vulnerability in the implementation of HTTP/2 that can allow for excessive memory consumption. This issue affects nginx compiled with the ngx_http_v2_module (not compiled by default) if the 'http2' option of the 'listen' directive is used in a configuration file. |
7.5 | 2017-07-13 | CVE-2017-7529 | Nginx versions since 0.5.6 up to and including 1.13.2 are vulnerable to integer overflow vulnerability in nginx range filter module resulting into leak of potentially sensitive information triggered by specially crafted request. |
7.8 | 2016-11-29 | CVE-2016-1247 | The nginx package before 1.6.2-5+deb8u3 on Debian jessie, the nginx packages before 1.4.6-1ubuntu3.6 on Ubuntu 14.04 LTS, before 1.10.0-0ubuntu0.16.04.3 on Ubuntu 16.04 LTS, and before 1.10.1-0ubuntu1.1 on Ubuntu 16.10, and the nginx ebuild before 1.10.2-r3 on Gentoo allow local users with access to the web server user account to gain root privileges via a symlink attack on the error log. |
7.5 | 2016-06-07 | CVE-2016-4450 | os/unix/ngx_files.c in nginx before 1.10.1 and 1.11.x before 1.11.1 allows remote attackers to cause a denial of service (NULL pointer dereference and worker process crash) via a crafted request, involving writing a client request body to a temporary file. |
5.3 | 2016-02-15 | CVE-2016-0747 | The resolver in nginx before 1.8.1 and 1.9.x before 1.9.10 does not properly limit CNAME resolution, which allows remote attackers to cause a denial of service (worker process resource consumption) via vectors related to arbitrary name resolution. |
9.8 | 2016-02-15 | CVE-2016-0746 | Use-after-free vulnerability in the resolver in nginx 0.6.18 through 1.8.0 and 1.9.x before 1.9.10 allows remote attackers to cause a denial of service (worker process crash) or possibly have unspecified other impact via a crafted DNS response related to CNAME response processing. |
7.5 | 2016-02-15 | CVE-2016-0742 | The resolver in nginx before 1.8.1 and 1.9.x before 1.9.10 allows remote attackers to cause a denial of service (invalid pointer dereference and worker process crash) via a crafted UDP DNS response. |
6.8 | 2014-12-29 | CVE-2014-3556 | The STARTTLS implementation in mail/ngx_mail_smtp_handler.c in the SMTP proxy in nginx 1.5.x and 1.6.x before 1.6.1 and 1.7.x before 1.7.4 does not properly restrict I/O buffering, which allows man-in-the-middle attackers to insert commands into encrypted SMTP sessions by sending a cleartext command that is processed after TLS is in place, related to a "plaintext command injection" attack, a similar issue to CVE-2011-0411. |
4.3 | 2014-12-08 | CVE-2014-3616 | nginx 0.5.6 through 1.7.4, when using the same shared ssl_session_cache or ssl_session_ticket_key for multiple servers, can reuse a cached SSL session for an unrelated context, which allows remote attackers with certain privileges to conduct "virtual host confusion" attacks. |
7.5 | 2014-03-28 | CVE-2014-0133 | Heap-based buffer overflow in the SPDY implementation in nginx 1.3.15 before 1.4.7 and 1.5.x before 1.5.12 allows remote attackers to execute arbitrary code via a crafted request. |
7.5 | 2013-11-23 | CVE-2013-4547 | nginx 0.8.41 through 1.4.3 and 1.5.x before 1.5.7 allows remote attackers to bypass intended restrictions via an unescaped space character in a URI. |
7.5 | 2013-10-26 | CVE-2013-0337 | The default configuration of nginx, possibly 1.3.13 and earlier, uses world-readable permissions for the (1) access.log and (2) error.log files, which allows local users to obtain sensitive information by reading the files. |
5.8 | 2013-07-19 | CVE-2013-2070 | http/modules/ngx_http_proxy_module.c in nginx 1.1.4 through 1.2.8 and 1.3.0 through 1.4.0, when proxy_pass is used with untrusted HTTP servers, allows remote attackers to cause a denial of service (crash) and obtain sensitive information from worker process memory via a crafted proxy response, a similar vulnerability to CVE-2013-2028. |
7.5 | 2013-07-19 | CVE-2013-2028 | The ngx_http_parse_chunked function in http/ngx_http_parse.c in nginx 1.3.9 through 1.4.0 allows remote attackers to cause a denial of service (crash) and execute arbitrary code via a chunked Transfer-Encoding request with a large chunk size, which triggers an integer signedness error and a stack-based buffer overflow. |
5 | 2012-07-26 | CVE-2011-4963 | nginx/Windows 1.3.x before 1.3.1 and 1.2.x before 1.2.1 allows remote attackers to bypass intended access restrictions and access restricted files via (1) a trailing . (dot) or (2) certain "$index_allocation" sequences in a request. |
CWE : Common Weakness Enumeration
% | id | Name |
---|---|---|
25% (6) | CWE-787 | Out-of-bounds Write |
8% (2) | CWE-476 | NULL Pointer Dereference |
8% (2) | CWE-416 | Use After Free |
8% (2) | CWE-22 | Improper Limitation of a Pathname to a Restricted Directory ('Path ... |
4% (1) | CWE-613 | Insufficient Session Expiration |
4% (1) | CWE-444 | Inconsistent Interpretation of HTTP Requests ('HTTP Request Smuggli... |
4% (1) | CWE-400 | Uncontrolled Resource Consumption ('Resource Exhaustion') |
4% (1) | CWE-295 | Certificate Issues |
4% (1) | CWE-264 | Permissions, Privileges, and Access Controls |
4% (1) | CWE-200 | Information Exposure |
4% (1) | CWE-190 | Integer Overflow or Wraparound |
4% (1) | CWE-120 | Buffer Copy without Checking Size of Input ('Classic Buffer Overflo... |
4% (1) | CWE-119 | Failure to Constrain Operations within the Bounds of a Memory Buffer |
4% (1) | CWE-116 | Improper Encoding or Escaping of Output |
4% (1) | CWE-77 | Improper Sanitization of Special Elements used in a Command ('Comma... |
4% (1) | CWE-59 | Improper Link Resolution Before File Access ('Link Following') |
Open Source Vulnerability Database (OSVDB)
id | Description |
---|---|
77832 | Parallels Plesk Panel Billing System TLS Renegotiation Handshakes MiTM Plaint... |
77184 | nginx ngx_resolver.c ngx_resolver_copy() Function DNS Response Parsing Remote... |
75622 | Blue Coat Director TLS Renegotiation Handshakes MiTM Plaintext Data Injection |
74335 | Hitachi Web Server TLS Renegotiation Handshakes MiTM Plaintext Data Injection |
71961 | Oracle Fusion Middleware Oracle WebLogic Server TLS Renegotiation Handshakes ... |
71951 | Oracle Multiple Products Oracle Security Service TLS Renegotiation Handshakes... |
70620 | mGuard TLS Renegotiation Handshakes MiTM Plaintext Data Injection |
70055 | Oracle Supply Chain Transportation Management TLS Renegotiation Handshakes Mi... |
69565 | OpenSSL SSL_OP_NETSCAPE_REUSE_CIPHER_CHANGE_BUG Session Resume Ciphersuite Do... |
69561 | IBM WebSphere MQ Internet Pass-Thru TLS Renegotiation Handshake MiTM Plaintex... |
69032 | Oracle Java SE / Java for Business TLS Renegotiation Handshake MiTM Plaintext... |
67029 | HP Threat Management Services zl Module TLS Renegotiation Handshakes MiTM Pla... |
66315 | HP Insight Manager TLS Renegotiation Handshakes MiTM Plaintext Data Injection |
65531 | nginx on Windows URI ::$DATA Append Arbitrary File Access |
65530 | nginx Encoded Traversal Sequence Memory Corruption Remote DoS |
65202 | OpenOffice.org (OOo) TLS Renegotiation Handshakes MiTM Plaintext Data Injection |
64725 | HP System Management Homepage (SMH) TLS Renegotiation Handshakes MiTM Plainte... |
64499 | ArubaOS HTTPS WebUI Admin Interface TLS Renegotiation Handshakes MiTM Plainte... |
64040 | IBM DB2 TLS Renegotiation Handshakes MiTM Plaintext Data Injection |
62877 | SSH Tectia Audit Player TLS Renegotiation Handshakes MiTM Plaintext Data Inje... |
62536 | Blue Coat Products TLS Renegotiation Handshakes MiTM Plaintext Data Injection |
62273 | Opera TLS Renegotiation Handshakes MiTM Plaintext Data Injection |
62210 | Aruba Mobility Controller TLS Renegotiation Handshakes MiTM Plaintext Data In... |
62135 | Network Security Services (NSS) TLS Renegotiation Handshakes MiTM Plaintext D... |
62064 | IBM Java TLS Renegotiation Handshakes MiTM Plaintext Data Injection |
ExploitDB Exploits
id | Description |
---|---|
32277 | nginx 1.4.0 64-bit - Remote Exploit for Linux (Generic) |
25499 | nginx 1.3.9-1.4.0 DoS PoC |
10579 | TLS Renegotiation Vulnerability PoC Exploit |
OpenVAS Exploits
id | Description |
---|---|
2012-08-31 | Name : VMSA-2012-0013 VMware vSphere and vCOps updates to third party libraries. File : nvt/gb_VMSA-2012-0013.nasl |
2012-08-30 | Name : Fedora Update for nginx FEDORA-2012-3846 File : nvt/gb_fedora_2012_3846_nginx_fc17.nasl |
2012-08-30 | Name : Fedora Update for nginx FEDORA-2012-6238 File : nvt/gb_fedora_2012_6238_nginx_fc17.nasl |
2012-08-10 | Name : Gentoo Security Advisory GLSA 201206-07 (nginx) File : nvt/glsa_201206_07.nasl |
2012-08-10 | Name : Gentoo Security Advisory GLSA 201206-18 (GnuTLS) File : nvt/glsa_201206_18.nasl |
2012-08-03 | Name : Mandriva Update for nginx MDVSA-2012:043 (nginx) File : nvt/gb_mandriva_MDVSA_2012_043.nasl |
2012-08-02 | Name : SuSE Update for nginx openSUSE-SU-2012:0237-1 (nginx) File : nvt/gb_suse_2012_0237_1.nasl |
2012-07-30 | Name : CentOS Update for openssl CESA-2010:0977 centos4 x86_64 File : nvt/gb_CESA-2010_0977_openssl_centos4_x86_64.nasl |
2012-05-04 | Name : Fedora Update for nginx FEDORA-2012-6371 File : nvt/gb_fedora_2012_6371_nginx_fc15.nasl |
2012-05-04 | Name : Fedora Update for nginx FEDORA-2012-6411 File : nvt/gb_fedora_2012_6411_nginx_fc16.nasl |
2012-04-30 | Name : Debian Security Advisory DSA 2434-1 (nginx) File : nvt/deb_2434_1.nasl |
2012-04-30 | Name : FreeBSD Ports: nginx File : nvt/freebsd_nginx0.nasl |
2012-04-30 | Name : Gentoo Security Advisory GLSA 201203-22 (nginx) File : nvt/glsa_201203_22.nasl |
2012-04-17 | Name : nginx 'ngx_cpystrn()' Information Disclosure Vulnerability File : nvt/gb_nginx_52578.nasl |
2012-04-17 | Name : nginx 'ngx_http_mp4_module.c' Buffer Overflow Vulnerability File : nvt/gb_nginx_52999.nasl |
2012-04-02 | Name : Fedora Update for nginx FEDORA-2011-16075 File : nvt/gb_fedora_2011_16075_nginx_fc16.nasl |
2012-04-02 | Name : Fedora Update for nginx FEDORA-2012-3991 File : nvt/gb_fedora_2012_3991_nginx_fc16.nasl |
2012-04-02 | Name : Fedora Update for nginx FEDORA-2012-4006 File : nvt/gb_fedora_2012_4006_nginx_fc15.nasl |
2012-03-16 | Name : VMSA-2011-0003.2 Third party component updates for VMware vCenter Server, vCe... File : nvt/gb_VMSA-2011-0003.nasl |
2012-03-15 | Name : VMSA-2011-0013.2 VMware third party component updates for VMware vCenter Serv... File : nvt/gb_VMSA-2011-0013.nasl |
2012-02-12 | Name : Gentoo Security Advisory GLSA 201110-01 (openssl) File : nvt/glsa_201110_01.nasl |
2012-02-12 | Name : Gentoo Security Advisory GLSA 201110-05 (gnutls) File : nvt/glsa_201110_05.nasl |
2011-12-09 | Name : Fedora Update for nginx FEDORA-2011-16110 File : nvt/gb_fedora_2011_16110_nginx_fc15.nasl |
2011-11-21 | Name : nginx DNS Resolver Remote Heap Buffer Overflow Vulnerability File : nvt/gb_nginx_50710.nasl |
2011-09-12 | Name : Fedora Update for openssl FEDORA-2011-12281 File : nvt/gb_fedora_2011_12281_openssl_fc14.nasl |
Information Assurance Vulnerability Management (IAVM)
id | Description |
---|---|
2012-A-0153 | Multiple Vulnerabilities in VMware ESX 4.0 and ESXi 4.0 Severity: Category I - VMSKEY: V0033884 |
2012-A-0148 | Multiple Vulnerabilities in VMware ESXi 4.1 and ESX 4.1 Severity: Category I - VMSKEY: V0033794 |
2012-B-0048 | Multiple Vulnerabilities in HP Systems Insight Manager Severity: Category I - VMSKEY: V0032178 |
2012-B-0038 | Multiple Vulnerabilities in HP Onboard Administrator Severity: Category I - VMSKEY: V0031972 |
2011-A-0160 | Multiple Vulnerabilities in VMware vCenter Server 4.0 and vCenter Update Mana... Severity: Category I - VMSKEY: V0030769 |
2011-A-0066 | Multiple Vulnerabilities in VMware Products Severity: Category I - VMSKEY: V0027158 |
Snort® IPS/IDS
Date | Description |
---|---|
2016-03-14 | nginx SMTP proxy STARTTLS plaintext command injection attempt RuleID : 36197 - Type : SERVER-WEBAPP - Revision : 5 |
2015-03-31 | nginx URI processing security bypass attempt RuleID : 33581 - Type : SERVER-WEBAPP - Revision : 3 |
2014-01-10 | nginx URI parsing buffer overflow attempt RuleID : 17528 - Type : SERVER-WEBAPP - Revision : 10 |
2014-01-10 | IIS 5.1 alternate data stream authentication bypass attempt RuleID : 17103 - Type : SERVER-IIS - Revision : 16 |
2019-01-15 | (http_inspect)oversizechunkencoding RuleID : 16 - Type : - Revision : 3 |
2014-01-10 | (http_inspect)unusedeventnumber--shouldnotappear RuleID : 108 - Type : - Revision : 3 |
Nessus® Vulnerability Scanner
id | Description |
---|---|
2019-01-03 | Name: The remote Fedora host is missing a security update. File: fedora_2018-7c540fdab4.nasl - Type: ACT_GATHER_INFO |
2018-12-17 | Name: The remote Amazon Linux AMI host is missing a security update. File: ala_ALAS-2018-1125.nasl - Type: ACT_GATHER_INFO |
2018-12-10 | Name: The remote EulerOS host is missing multiple security updates. File: EulerOS_SA-2018-1399.nasl - Type: ACT_GATHER_INFO |
2018-11-14 | Name: The remote web server is affected by multiple vulnerabilities. File: nginx_1_15_6.nasl - Type: ACT_GATHER_INFO |
2018-11-09 | Name: The remote Debian host is missing a security update. File: debian_DLA-1572.nasl - Type: ACT_GATHER_INFO |
2018-11-09 | Name: The remote Debian host is missing a security-related update. File: debian_DSA-4335.nasl - Type: ACT_GATHER_INFO |
2018-11-07 | Name: The remote FreeBSD host is missing one or more security-related updates. File: freebsd_pkg_84ca56bee1de11e8bcfd00e04c1ea73d.nasl - Type: ACT_GATHER_INFO |
2018-10-16 | Name: The remote web server is affected by a denial of service vulnerability. File: nginx_1_11_1.nasl - Type: ACT_GATHER_INFO |
2018-10-16 | Name: The remote web server is affected by a data disclosure vulnerability. File: nginx_1_13_3.nasl - Type: ACT_GATHER_INFO |
2018-08-17 | Name: The remote PhotonOS host is missing multiple security updates. File: PhotonOS_PHSA-2016-0012.nasl - Type: ACT_GATHER_INFO |
2018-08-17 | Name: The remote PhotonOS host is missing multiple security updates. File: PhotonOS_PHSA-2017-0038.nasl - Type: ACT_GATHER_INFO |
2018-04-03 | Name: The remote web server may allow remote code execution. File: iis_7_pci.nasl - Type: ACT_GATHER_INFO |
2018-03-09 | Name: The remote web server is affected by a directory traversal vulnerability. File: nginx_0_7_63.nasl - Type: ACT_GATHER_INFO |
2018-03-09 | Name: The remote web server is affected by multiple vulnerabilities. File: nginx_0_7_64.nasl - Type: ACT_GATHER_INFO |
2018-03-09 | Name: The remote web server is affected by an information disclosure vulnerability. File: nginx_0_7_66.nasl - Type: ACT_GATHER_INFO |
2018-03-09 | Name: The remote web server is affected by a denial of service vulnerability. File: nginx_0_7_67.nasl - Type: ACT_GATHER_INFO |
2018-03-09 | Name: The remote web server is affected by multiple vulnerabilities. File: nginx_1_8_1.nasl - Type: ACT_GATHER_INFO |
2018-02-28 | Name: The version of Arista Networks EOS running on the remote device is affected b... File: arista_eos_sa0021.nasl - Type: ACT_GATHER_INFO |
2017-12-18 | Name: The remote web server is affected by an integer overflow vulnerability. File: nginx_1_13_2.nasl - Type: ACT_GATHER_INFO |
2017-11-17 | Name: The remote host is affected by a MITM vulnerability. File: fortios_FG-IR-17-137.nasl - Type: ACT_GATHER_INFO |
2017-10-02 | Name: The remote Gentoo host is missing one or more security-related patches. File: gentoo_GLSA-201606-06.nasl - Type: ACT_GATHER_INFO |
2017-09-15 | Name: The remote Amazon Linux AMI host is missing a security update. File: ala_ALAS-2017-894.nasl - Type: ACT_GATHER_INFO |
2017-08-24 | Name: The remote Fedora host is missing a security update. File: fedora_2017-aecd25b8a9.nasl - Type: ACT_GATHER_INFO |
2017-08-24 | Name: The remote Fedora host is missing a security update. File: fedora_2017-c27a947af1.nasl - Type: ACT_GATHER_INFO |
2017-07-31 | Name: The remote openSUSE host is missing a security update. File: openSUSE-2017-867.nasl - Type: ACT_GATHER_INFO |