F5 Nginx vulnerabilities

65 known vulnerabilities affecting f5/nginx.

Total CVEs
65
CISA KEV
1
actively exploited
Public exploits
11
Exploited in wild
1
Severity breakdown
CRITICAL5HIGH29MEDIUM29LOW2

Vulnerabilities

Page 3 of 4
CVE-2016-0746CRITICALCVSS 9.8≥ 0.6.18, ≤ 1.8.0≥ 1.9.0, < 1.9.102016-02-15
CVE-2016-0746 [CRITICAL] CWE-416 CVE-2016-0746: Use-after-free vulnerability in the resolver in nginx 0.6.18 through 1.8.0 and 1.9.x before 1.9.10 a Use-after-free vulnerability in the resolver in nginx 0.6.18 through 1.8.0 and 1.9.x before 1.9.10 allows remote attackers to cause a denial of service (worker process crash) or possibly have unspecified other impact via a crafted DNS response related to CNAME response processing.
nvdosv
CVE-2016-0742HIGHCVSS 7.5≥ 0.6.18, < 1.8.1≥ 1.9.0, < 1.9.102016-02-15
CVE-2016-0742 [HIGH] CWE-476 CVE-2016-0742: The resolver in nginx before 1.8.1 and 1.9.x before 1.9.10 allows remote attackers to cause a denial The resolver in nginx before 1.8.1 and 1.9.x before 1.9.10 allows remote attackers to cause a denial of service (invalid pointer dereference and worker process crash) via a crafted UDP DNS response.
nvdosv
CVE-2016-0747MEDIUMCVSS 5.3≥ 0.6.18, < 1.8.1≥ 1.9.0, < 1.9.102016-02-15
CVE-2016-0747 [MEDIUM] CWE-400 CVE-2016-0747: The resolver in nginx before 1.8.1 and 1.9.x before 1.9.10 does not properly limit CNAME resolution, The resolver in nginx before 1.8.1 and 1.9.x before 1.9.10 does not properly limit CNAME resolution, which allows remote attackers to cause a denial of service (worker process resource consumption) via vectors related to arbitrary name resolution.
nvdosv
CVE-2014-3556MEDIUMCVSS 6.8≥ 1.5.6, < 1.6.1≥ 1.7.0, < 1.7.42014-12-29
CVE-2014-3556 [MEDIUM] CVE-2014-3556: The STARTTLS implementation in mail/ngx_mail_smtp_handler.c in the SMTP proxy in nginx 1.5.x and 1.6 The STARTTLS implementation in mail/ngx_mail_smtp_handler.c in the SMTP proxy in nginx 1.5.x and 1.6.x before 1.6.1 and 1.7.x before 1.7.4 does not properly restrict I/O buffering, which allows man-in-the-middle attackers to insert commands into encrypted SMTP sessions by sending a cleartext command that is processed after TLS is in place, related to a "plain
nvdosv
CVE-2014-3616MEDIUMCVSS 4.3≥ 0.5.6, < 1.6.2≥ 1.7.0, < 1.7.52014-12-08
CVE-2014-3616 [MEDIUM] CWE-613 CVE-2014-3616: nginx 0.5.6 through 1.7.4, when using the same shared ssl_session_cache or ssl_session_ticket_key fo nginx 0.5.6 through 1.7.4, when using the same shared ssl_session_cache or ssl_session_ticket_key for multiple servers, can reuse a cached SSL session for an unrelated context, which allows remote attackers with certain privileges to conduct "virtual host confusion" attacks.
nvdosv
CVE-2014-0088HIGHCVSS 7.5v1.5.102014-04-29
CVE-2014-0088 [HIGH] CWE-119 CVE-2014-0088: The SPDY implementation in the ngx_http_spdy_module module in nginx 1.5.10 before 1.5.11, when runni The SPDY implementation in the ngx_http_spdy_module module in nginx 1.5.10 before 1.5.11, when running on a 32-bit platform, allows remote attackers to execute arbitrary code via a crafted request.
nvdosv
CVE-2014-0133HIGHCVSS 7.5≥ 1.3.15, < 1.4.7≥ 1.5.0, ≤ 1.5.112014-03-28
CVE-2014-0133 [HIGH] CWE-787 CVE-2014-0133: Heap-based buffer overflow in the SPDY implementation in nginx 1.3.15 before 1.4.7 and 1.5.x before Heap-based buffer overflow in the SPDY implementation in nginx 1.3.15 before 1.4.7 and 1.5.x before 1.5.12 allows remote attackers to execute arbitrary code via a crafted request.
nvdosv
CVE-2013-4547HIGHCVSS 7.5PoC≥ 0.8.41, < 1.4.4≥ 1.5.0, ≤ 1.5.62013-11-23
CVE-2013-4547 [HIGH] CWE-116 CVE-2013-4547: nginx 0.8.41 through 1.4.3 and 1.5.x before 1.5.7 allows remote attackers to bypass intended restric nginx 0.8.41 through 1.4.3 and 1.5.x before 1.5.7 allows remote attackers to bypass intended restrictions via an unescaped space character in a URI.
nvdosv
CVE-2013-0337HIGHCVSS 7.5≤ 1.3.13v1.0.0+49 more2013-10-27
CVE-2013-0337 [HIGH] CWE-264 CVE-2013-0337: The default configuration of nginx, possibly 1.3.13 and earlier, uses world-readable permissions for The default configuration of nginx, possibly 1.3.13 and earlier, uses world-readable permissions for the (1) access.log and (2) error.log files, which allows local users to obtain sensitive information by reading the files.
nvd
CVE-2013-2028HIGHCVSS 7.5PoC≥ 1.3.9, ≤ 1.4.02013-07-20
CVE-2013-2028 [HIGH] CWE-787 CVE-2013-2028: The ngx_http_parse_chunked function in http/ngx_http_parse.c in nginx 1.3.9 through 1.4.0 allows rem The ngx_http_parse_chunked function in http/ngx_http_parse.c in nginx 1.3.9 through 1.4.0 allows remote attackers to cause a denial of service (crash) and execute arbitrary code via a chunked Transfer-Encoding request with a large chunk size, which triggers an integer signedness error and a stack-based buffer overflow.
nvd
CVE-2013-2070MEDIUMCVSS 5.8≥ 1.1.4, ≤ 1.2.8≥ 1.3.9, ≤ 1.4.02013-07-20
CVE-2013-2070 [MEDIUM] CVE-2013-2070: http/modules/ngx_http_proxy_module.c in nginx 1.1.4 through 1.2.8 and 1.3.0 through 1.4.0, when prox http/modules/ngx_http_proxy_module.c in nginx 1.1.4 through 1.2.8 and 1.3.0 through 1.4.0, when proxy_pass is used with untrusted HTTP servers, allows remote attackers to cause a denial of service (crash) and obtain sensitive information from worker process memory via a crafted proxy response, a similar vulnerability to CVE-2013-2028.
nvdosv
CVE-2012-4929LOWCVSS 2.6≥ 0, < 1.2.1-2.22012-09-15
CVE-2012-4929 [LOW] CVE-2012-4929: The TLS protocol 1 The TLS protocol 1.2 and earlier, as used in Mozilla Firefox, Google Chrome, Qt, and other products, can encrypt compressed data without properly obfuscating the length of the unencrypted data, which allows man-in-the-middle attackers to obtain plaintext HTTP headers by observing length differences during a series of guesses in which a string in an HTTP request potentially matches an unknown string in an HTTP header, aka a "CRIME" attack.
osv
CVE-2012-3380LOWCVSS 2.1≥ 0, < 1.2.1-22012-08-31
CVE-2012-3380 [LOW] CVE-2012-3380: Directory traversal vulnerability in naxsi-ui/nx_extract Directory traversal vulnerability in naxsi-ui/nx_extract.py in the Naxsi module before 0.46-1 for Nginx allows local users to read arbitrary files via unspecified vectors.
osv
CVE-2011-4963MEDIUMCVSS 5.0≥ 0.7.52, < 1.2.1v1.3.02012-07-26
CVE-2011-4963 [MEDIUM] CVE-2011-4963: nginx/Windows 1.3.x before 1.3.1 and 1.2.x before 1.2.1 allows remote attackers to bypass intended a nginx/Windows 1.3.x before 1.3.1 and 1.2.x before 1.2.1 allows remote attackers to bypass intended access restrictions and access restricted files via (1) a trailing . (dot) or (2) certain "$index_allocation" sequences in a request.
nvd
CVE-2012-2089MEDIUMCVSS 6.8≥ 1.0.7, ≤ 1.0.14≥ 1.1.3, ≤ 1.1.182012-04-17
CVE-2012-2089 [MEDIUM] CWE-120 CVE-2012-2089: Buffer overflow in ngx_http_mp4_module.c in the ngx_http_mp4_module module in nginx 1.0.7 through 1. Buffer overflow in ngx_http_mp4_module.c in the ngx_http_mp4_module module in nginx 1.0.7 through 1.0.14 and 1.1.3 through 1.1.18, when the mp4 directive is used, allows remote attackers to cause a denial of service (memory overwrite) or possibly execute arbitrary code via a crafted MP4 file.
nvdosv
CVE-2012-1180MEDIUMCVSS 5.0≥ 0.1.0, < 1.0.14≥ 1.1.0, < 1.1.172012-04-17
CVE-2012-1180 [MEDIUM] CWE-416 CVE-2012-1180: Use-after-free vulnerability in nginx before 1.0.14 and 1.1.x before 1.1.17 allows remote HTTP serve Use-after-free vulnerability in nginx before 1.0.14 and 1.1.x before 1.1.17 allows remote HTTP servers to obtain sensitive information from process memory via a crafted backend response, in conjunction with a client request.
nvdosv
CVE-2011-4315MEDIUMCVSS 6.8≥ 0.6.18, < 1.0.10≥ 1.1.0, ≤ 1.1.72011-12-08
CVE-2011-4315 [MEDIUM] CWE-787 CVE-2011-4315: Heap-based buffer overflow in compression-pointer processing in core/ngx_resolver.c in nginx before Heap-based buffer overflow in compression-pointer processing in core/ngx_resolver.c in nginx before 1.0.10 allows remote resolvers to cause a denial of service (daemon crash) or possibly have unspecified other impact via a long response.
nvdosv
CVE-2010-4180MEDIUMCVSS 4.3fixed in 0.9.22010-12-06
CVE-2010-4180 [MEDIUM] CVE-2010-4180: OpenSSL before 0.9.8q, and 1.0.x before 1.0.0c, when SSL_OP_NETSCAPE_REUSE_CIPHER_CHANGE_BUG is enab OpenSSL before 0.9.8q, and 1.0.x before 1.0.0c, when SSL_OP_NETSCAPE_REUSE_CIPHER_CHANGE_BUG is enabled, does not properly prevent modification of the ciphersuite in the session cache, which allows remote attackers to force the downgrade to an unintended cipher via vectors involving sniffing network traffic to discover a session identifier.
nvd
CVE-2010-2263MEDIUMCVSS 5.0PoC≥ 0.7.52, < 0.7.66≥ 0.8.0, ≤ 0.8.392010-06-15
CVE-2010-2263 [MEDIUM] CWE-200 CVE-2010-2263: nginx 0.8 before 0.8.40 and 0.7 before 0.7.66, when running on Windows, allows remote attackers to o nginx 0.8 before 0.8.40 and 0.7 before 0.7.66, when running on Windows, allows remote attackers to obtain source code or unparsed content of arbitrary files under the web document root by appending ::$DATA to the URI.
nvd
CVE-2010-2266MEDIUMCVSS 5.0PoC≥ 0.7.52, < 0.7.67≥ 0.8.0, ≤ 0.8.402010-06-15
CVE-2010-2266 [MEDIUM] CWE-22 CVE-2010-2266: nginx 0.8.36 allows remote attackers to cause a denial of service (crash) via certain encoded direct nginx 0.8.36 allows remote attackers to cause a denial of service (crash) via certain encoded directory traversal sequences that trigger memory corruption, as demonstrated using the "%c0.%c0." sequence.
nvd
F5 Nginx vulnerabilities | cvebase