Количество 16
Количество 16
CVE-2026-32647
NGINX Open Source and NGINX Plus have a vulnerability in the ngx_http_mp4_module module, which might allow an attacker to trigger a buffer over-read or over-write to the NGINX worker memory resulting in its termination or possibly code execution, using a specially crafted MP4 file. This issue affects NGINX Open Source and NGINX Plus if it is built with the ngx_http_mp4_module module and the mp4 directive is used in the configuration file. Additionally, the attack is possible only if an attacker can trigger the processing of a specially crafted MP4 file with the ngx_http_mp4_module module. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.
CVE-2026-32647
NGINX Open Source and NGINX Plus have a vulnerability in the ngx_http_mp4_module module, which might allow an attacker to trigger a buffer over-read or over-write to the NGINX worker memory resulting in its termination or possibly code execution, using a specially crafted MP4 file. This issue affects NGINX Open Source and NGINX Plus if it is built with the ngx_http_mp4_module module and the mp4 directive is used in the configuration file. Additionally, the attack is possible only if an attacker can trigger the processing of a specially crafted MP4 file with the ngx_http_mp4_module module. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.
CVE-2026-32647
NGINX Open Source and NGINX Plus have a vulnerability in the ngx_http_mp4_module module, which might allow an attacker to trigger a buffer over-read or over-write to the NGINX worker memory resulting in its termination or possibly code execution, using a specially crafted MP4 file. This issue affects NGINX Open Source and NGINX Plus if it is built with the ngx_http_mp4_module module and the mp4 directive is used in the configuration file. Additionally, the attack is possible only if an attacker can trigger the processing of a specially crafted MP4 file with the ngx_http_mp4_module module. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.
CVE-2026-32647
NGINX ngx_http_mp4_module vulnerability
CVE-2026-32647
NGINX Open Source and NGINX Plus have a vulnerability in the ngx_http_ ...
GHSA-6364-x4qj-7w59
NGINX Open Source and NGINX Plus have a vulnerability in the ngx_http_mp4_module module, which might allow an attacker to trigger a buffer over-read or over-write to the NGINX worker memory resulting in its termination or possibly code execution, using a specially crafted MP4 file. This issue affects NGINX Open Source and NGINX Plus if it is built with the ngx_http_mp4_module module and the mp4 directive is used in the configuration file. Additionally, the attack is possible only if an attacker can trigger the processing of a specially crafted MP4 file with the ngx_http_mp4_module module. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.
BDU:2026-04819
Уязвимость модуля ngx_http_mp4_module HTTP-сервера NGINX Plus и NGINX Open Source, позволяющая нарушителю вызвать отказ в обслуживании или выполнить произвольный код
RLSA-2026:7343
Important: nginx:1.26 security update
RLSA-2026:6923
Important: nginx:1.24 security update
RLSA-2026:6907
Important: nginx:1.24 security update
RLSA-2026:6906
Important: nginx security update
ELSA-2026-7343
ELSA-2026-7343: nginx:1.26 security update (IMPORTANT)
ELSA-2026-7002
ELSA-2026-7002: nginx security update (IMPORTANT)
ELSA-2026-6923
ELSA-2026-6923: nginx:1.24 security update (IMPORTANT)
ELSA-2026-6907
ELSA-2026-6907: nginx:1.24 security update (IMPORTANT)
ELSA-2026-6906
ELSA-2026-6906: nginx security update (IMPORTANT)
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
|---|---|---|---|---|
CVE-2026-32647 NGINX Open Source and NGINX Plus have a vulnerability in the ngx_http_mp4_module module, which might allow an attacker to trigger a buffer over-read or over-write to the NGINX worker memory resulting in its termination or possibly code execution, using a specially crafted MP4 file. This issue affects NGINX Open Source and NGINX Plus if it is built with the ngx_http_mp4_module module and the mp4 directive is used in the configuration file. Additionally, the attack is possible only if an attacker can trigger the processing of a specially crafted MP4 file with the ngx_http_mp4_module module. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated. | CVSS3: 7.8 | 0% Низкий | около 1 месяца назад | |
CVE-2026-32647 NGINX Open Source and NGINX Plus have a vulnerability in the ngx_http_mp4_module module, which might allow an attacker to trigger a buffer over-read or over-write to the NGINX worker memory resulting in its termination or possibly code execution, using a specially crafted MP4 file. This issue affects NGINX Open Source and NGINX Plus if it is built with the ngx_http_mp4_module module and the mp4 directive is used in the configuration file. Additionally, the attack is possible only if an attacker can trigger the processing of a specially crafted MP4 file with the ngx_http_mp4_module module. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated. | CVSS3: 7.8 | 0% Низкий | около 1 месяца назад | |
CVE-2026-32647 NGINX Open Source and NGINX Plus have a vulnerability in the ngx_http_mp4_module module, which might allow an attacker to trigger a buffer over-read or over-write to the NGINX worker memory resulting in its termination or possibly code execution, using a specially crafted MP4 file. This issue affects NGINX Open Source and NGINX Plus if it is built with the ngx_http_mp4_module module and the mp4 directive is used in the configuration file. Additionally, the attack is possible only if an attacker can trigger the processing of a specially crafted MP4 file with the ngx_http_mp4_module module. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated. | CVSS3: 7.8 | 0% Низкий | около 1 месяца назад | |
CVE-2026-32647 NGINX ngx_http_mp4_module vulnerability | CVSS3: 7.8 | 0% Низкий | около 1 месяца назад | |
CVE-2026-32647 NGINX Open Source and NGINX Plus have a vulnerability in the ngx_http_ ... | CVSS3: 7.8 | 0% Низкий | около 1 месяца назад | |
GHSA-6364-x4qj-7w59 NGINX Open Source and NGINX Plus have a vulnerability in the ngx_http_mp4_module module, which might allow an attacker to trigger a buffer over-read or over-write to the NGINX worker memory resulting in its termination or possibly code execution, using a specially crafted MP4 file. This issue affects NGINX Open Source and NGINX Plus if it is built with the ngx_http_mp4_module module and the mp4 directive is used in the configuration file. Additionally, the attack is possible only if an attacker can trigger the processing of a specially crafted MP4 file with the ngx_http_mp4_module module. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated. | CVSS3: 7.8 | 0% Низкий | около 1 месяца назад | |
BDU:2026-04819 Уязвимость модуля ngx_http_mp4_module HTTP-сервера NGINX Plus и NGINX Open Source, позволяющая нарушителю вызвать отказ в обслуживании или выполнить произвольный код | CVSS3: 7.8 | 0% Низкий | около 1 месяца назад | |
RLSA-2026:7343 Important: nginx:1.26 security update | 27 дней назад | |||
RLSA-2026:6923 Important: nginx:1.24 security update | 29 дней назад | |||
RLSA-2026:6907 Important: nginx:1.24 security update | 27 дней назад | |||
RLSA-2026:6906 Important: nginx security update | 27 дней назад | |||
ELSA-2026-7343 ELSA-2026-7343: nginx:1.26 security update (IMPORTANT) | 26 дней назад | |||
ELSA-2026-7002 ELSA-2026-7002: nginx security update (IMPORTANT) | 29 дней назад | |||
ELSA-2026-6923 ELSA-2026-6923: nginx:1.24 security update (IMPORTANT) | 29 дней назад | |||
ELSA-2026-6907 ELSA-2026-6907: nginx:1.24 security update (IMPORTANT) | 29 дней назад | |||
ELSA-2026-6906 ELSA-2026-6906: nginx security update (IMPORTANT) | 30 дней назад |
Уязвимостей на страницу