Show filters
112 Total Results
Displaying 11-20 of 112
Sort by:
Attacker Value
Unknown
CVE-2024-49366
Disclosure Date: October 21, 2024 (last updated November 08, 2024)
Nginx UI is a web user interface for the Nginx web server. Nginx UI v2.0.0-beta.35 and earlier gets the value from the json field without verification, and can construct a value value in the form of `../../`. Arbitrary files can be written to the server, which may result in loss of permissions. Version 2.0.0-beta.26 fixes the issue.
0
Attacker Value
Unknown
CVE-2024-7634
Disclosure Date: August 22, 2024 (last updated January 25, 2025)
NGINX Agent's "config_dirs" restriction feature allows a highly privileged attacker to gain the ability to write/overwrite files outside of the designated secure directory.
0
Attacker Value
Unknown
CVE-2024-7646
Disclosure Date: August 16, 2024 (last updated August 17, 2024)
A security issue was discovered in ingress-nginx where an actor with permission to create Ingress objects (in the `networking.k8s.io` or `extensions` API group) can bypass annotation validation to inject arbitrary commands and obtain the credentials of the ingress-nginx controller. In the default configuration, that credential has access to all secrets in the cluster.
0
Attacker Value
Unknown
CVE-2024-7347
Disclosure Date: August 14, 2024 (last updated January 23, 2025)
NGINX Open Source and NGINX Plus have a vulnerability in the ngx_http_mp4_module, which might allow an attacker to over-read NGINX worker memory resulting in its termination, using a specially crafted mp4 file. The issue only affects NGINX if it is built with the ngx_http_mp4_module and the mp4 directive is used in the configuration file. Additionally, the attack is possible only if an attacker can trigger the processing of a specially crafted mp4 file with the ngx_http_mp4_module. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.
0
Attacker Value
Unknown
CVE-2024-39792
Disclosure Date: August 14, 2024 (last updated August 20, 2024)
When the NGINX Plus is configured to use the MQTT pre-read module, undisclosed requests can cause an increase in memory resource utilization. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.
0
Attacker Value
Unknown
CVE-2024-35200
Disclosure Date: May 29, 2024 (last updated January 25, 2025)
When NGINX Plus or NGINX OSS are configured to use the HTTP/3 QUIC module, undisclosed HTTP/3 requests can cause NGINX worker processes to terminate.
0
Attacker Value
Unknown
CVE-2024-34161
Disclosure Date: May 29, 2024 (last updated January 25, 2025)
When NGINX Plus or NGINX OSS are configured to use the HTTP/3 QUIC module and the network infrastructure supports a Maximum Transmission Unit (MTU) of 4096 or greater without fragmentation, undisclosed QUIC packets can cause NGINX worker processes to leak previously freed memory.
0
Attacker Value
Unknown
CVE-2024-32760
Disclosure Date: May 29, 2024 (last updated January 25, 2025)
When NGINX Plus or NGINX OSS are configured to use the HTTP/3 QUIC module, undisclosed HTTP/3 encoder instructions can cause NGINX worker processes to terminate or cause or other potential impact.
0
Attacker Value
Unknown
CVE-2024-31079
Disclosure Date: May 29, 2024 (last updated January 25, 2025)
When NGINX Plus or NGINX OSS are configured to use the HTTP/3 QUIC module, undisclosed HTTP/3 requests can cause NGINX worker processes to terminate or cause other potential impact. This attack requires that a request be specifically timed during the connection draining process, which the attacker has no visibility and limited influence over.
0
Attacker Value
Unknown
CVE-2024-3740
Disclosure Date: April 13, 2024 (last updated April 14, 2024)
A vulnerability, which was classified as critical, has been found in cym1102 nginxWebUI up to 3.9.9. This issue affects the function exec of the file /adminPage/conf/reload. The manipulation of the argument nginxExe leads to deserialization. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-260579.
0