Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

NGNIX

NGNIXHTTP-сервер, обратный прокси сервер с поддержкой кеширования и балансировки нагрузки, TCP/UDP прокси-сервер, а также почтовый прокси-сервер.

Релизный цикл, информация об уязвимостях

Продукт: NGNIX
Вендор: f5

График релизов

1.241.251.261.271.281.2920232024202520262027

Недавние уязвимости NGNIX

Количество 45

rocky логотип

RLSA-2026:4235

14 дней назад

Moderate: nginx:1.26 security update

EPSS: Низкий
rocky логотип

RLSA-2026:3638

21 день назад

Moderate: nginx:1.24 security update

EPSS: Низкий
github логотип

GHSA-7chh-rv6q-8pp3

около 2 месяцев назад

A vulnerability exists in NGINX OSS and NGINX Plus when configured to proxy to upstream Transport Layer Security (TLS) servers. An attacker with a man-in-the-middle (MITM) position on the upstream server side—along with conditions beyond the attacker's control—may be able to inject plain text data into the response from an upstream proxied server.  Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.

CVSS3: 5.9
EPSS: Низкий
debian логотип

CVE-2026-1642

около 2 месяцев назад

A vulnerability exists in NGINX OSS and NGINX Plus when configured to ...

CVSS3: 5.9
EPSS: Низкий
nvd логотип

CVE-2026-1642

около 2 месяцев назад

A vulnerability exists in NGINX OSS and NGINX Plus when configured to proxy to upstream Transport Layer Security (TLS) servers. An attacker with a man-in-the-middle (MITM) position on the upstream server side—along with conditions beyond the attacker's control—may be able to inject plain text data into the response from an upstream proxied server.  Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.

CVSS3: 5.9
EPSS: Низкий
ubuntu логотип

CVE-2026-1642

около 2 месяцев назад

A vulnerability exists in NGINX OSS and NGINX Plus when configured to proxy to upstream Transport Layer Security (TLS) servers. An attacker with a man-in-the-middle (MITM) position on the upstream server side—along with conditions beyond the attacker's control—may be able to inject plain text data into the response from an upstream proxied server.  Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.

CVSS3: 5.9
EPSS: Низкий
redhat логотип

CVE-2026-1642

около 2 месяцев назад

A vulnerability exists in NGINX OSS and NGINX Plus when configured to proxy to upstream Transport Layer Security (TLS) servers. An attacker with a man-in-the-middle (MITM) position on the upstream server side—along with conditions beyond the attacker's control—may be able to inject plain text data into the response from an upstream proxied server.  Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.

CVSS3: 5.9
EPSS: Низкий
github логотип

GHSA-2qmj-q2xc-85v8

7 месяцев назад

NGINX Open Source and NGINX Plus have a vulnerability in the ngx_mail_smtp_module that might allow an unauthenticated attacker to over-read NGINX SMTP authentication process memory; as a result, the server side may leak arbitrary bytes sent in a request to the authentication server. This issue happens during the NGINX SMTP authentication process and requires the attacker to make preparations against the target system to extract the leaked data. The issue affects NGINX only if (1) it is built with the ngx_mail_smtp_module, (2) the smtp_auth directive is configured with method "none," and (3) the authentication server returns the "Auth-Wait" response header. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.

CVSS3: 3.7
EPSS: Низкий
debian логотип

CVE-2025-53859

7 месяцев назад

NGINX Open Source and NGINX Plus have a vulnerability in the ngx_mail_ ...

CVSS3: 3.7
EPSS: Низкий
nvd логотип

CVE-2025-53859

7 месяцев назад

NGINX Open Source and NGINX Plus have a vulnerability in the ngx_mail_smtp_module that might allow an unauthenticated attacker to over-read NGINX SMTP authentication process memory; as a result, the server side may leak arbitrary bytes sent in a request to the authentication server. This issue happens during the NGINX SMTP authentication process and requires the attacker to make preparations against the target system to extract the leaked data. The issue affects NGINX only if (1) it is built with the ngx_mail_smtp_module, (2) the smtp_auth directive is configured with method "none," and (3) the authentication server returns the "Auth-Wait" response header. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.

CVSS3: 3.7
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
1
rocky логотип
RLSA-2026:4235

Moderate: nginx:1.26 security update

0%
Низкий
14 дней назад
rocky логотип
RLSA-2026:3638

Moderate: nginx:1.24 security update

0%
Низкий
21 день назад
github логотип
GHSA-7chh-rv6q-8pp3

A vulnerability exists in NGINX OSS and NGINX Plus when configured to proxy to upstream Transport Layer Security (TLS) servers. An attacker with a man-in-the-middle (MITM) position on the upstream server side—along with conditions beyond the attacker's control—may be able to inject plain text data into the response from an upstream proxied server.  Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.

CVSS3: 5.9
0%
Низкий
около 2 месяцев назад
debian логотип
CVE-2026-1642

A vulnerability exists in NGINX OSS and NGINX Plus when configured to ...

CVSS3: 5.9
0%
Низкий
около 2 месяцев назад
nvd логотип
CVE-2026-1642

A vulnerability exists in NGINX OSS and NGINX Plus when configured to proxy to upstream Transport Layer Security (TLS) servers. An attacker with a man-in-the-middle (MITM) position on the upstream server side—along with conditions beyond the attacker's control—may be able to inject plain text data into the response from an upstream proxied server.  Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.

CVSS3: 5.9
0%
Низкий
около 2 месяцев назад
ubuntu логотип
CVE-2026-1642

A vulnerability exists in NGINX OSS and NGINX Plus when configured to proxy to upstream Transport Layer Security (TLS) servers. An attacker with a man-in-the-middle (MITM) position on the upstream server side—along with conditions beyond the attacker's control—may be able to inject plain text data into the response from an upstream proxied server.  Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.

CVSS3: 5.9
0%
Низкий
около 2 месяцев назад
redhat логотип
CVE-2026-1642

A vulnerability exists in NGINX OSS and NGINX Plus when configured to proxy to upstream Transport Layer Security (TLS) servers. An attacker with a man-in-the-middle (MITM) position on the upstream server side—along with conditions beyond the attacker's control—may be able to inject plain text data into the response from an upstream proxied server.  Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.

CVSS3: 5.9
0%
Низкий
около 2 месяцев назад
github логотип
GHSA-2qmj-q2xc-85v8

NGINX Open Source and NGINX Plus have a vulnerability in the ngx_mail_smtp_module that might allow an unauthenticated attacker to over-read NGINX SMTP authentication process memory; as a result, the server side may leak arbitrary bytes sent in a request to the authentication server. This issue happens during the NGINX SMTP authentication process and requires the attacker to make preparations against the target system to extract the leaked data. The issue affects NGINX only if (1) it is built with the ngx_mail_smtp_module, (2) the smtp_auth directive is configured with method "none," and (3) the authentication server returns the "Auth-Wait" response header. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.

CVSS3: 3.7
0%
Низкий
7 месяцев назад
debian логотип
CVE-2025-53859

NGINX Open Source and NGINX Plus have a vulnerability in the ngx_mail_ ...

CVSS3: 3.7
0%
Низкий
7 месяцев назад
nvd логотип
CVE-2025-53859

NGINX Open Source and NGINX Plus have a vulnerability in the ngx_mail_smtp_module that might allow an unauthenticated attacker to over-read NGINX SMTP authentication process memory; as a result, the server side may leak arbitrary bytes sent in a request to the authentication server. This issue happens during the NGINX SMTP authentication process and requires the attacker to make preparations against the target system to extract the leaked data. The issue affects NGINX only if (1) it is built with the ngx_mail_smtp_module, (2) the smtp_auth directive is configured with method "none," and (3) the authentication server returns the "Auth-Wait" response header. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.

CVSS3: 3.7
0%
Низкий
7 месяцев назад

Уязвимостей на страницу


Поделиться