Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
nginx vulnerabilities and exploits
(subscribe to this query)
7.5
CVSSv3
CVE-2022-34032
Nginx NJS v0.7.5 exists to contain a segmentation violation in the function njs_value_own_enumerate at src/njs_value.c.
F5 Njs 0.7.5
9.1
CVSSv3
CVE-2022-34029
Nginx NJS v0.7.4 exists to contain an out-of-bounds read via njs_scope_value at njs_scope.h.
F5 Njs 0.7.4
7.5
CVSSv3
CVE-2021-40150
The web server of the E1 Zoom camera up to and including 3.0.0.716 discloses its configuration via the /conf/ directory that is mapped to a publicly accessible path. In this way an attacker can download the entire NGINX/FastCGI configurations by querying the /conf/nginx.conf or /...
Reolink E1 Zoom Firmware
9.8
CVSSv3
CVE-2022-31161
Roxy-WI is a Web interface for managing HAProxy, Nginx and Keepalived servers. Prior to version 6.1.1.0, the system command can be run remotely via the subprocess_execute function without processing the inputs received from the user in the /app/options.py file. Version 6.1.1.0 co...
Roxy-wi Roxy-wi
9.8
CVSSv3
CVE-2022-31137
Roxy-WI is a web interface for managing Haproxy, Nginx, Apache and Keepalived servers. Versions before 6.1.1.0 are subject to a remote code execution vulnerability. System commands can be run remotely via the subprocess_execute function without processing the inputs received from...
Roxy-wi Roxy-wi
1 Github repository
9.8
CVSSv3
CVE-2022-31125
Roxy-wi is an open source web interface for managing Haproxy, Nginx, Apache and Keepalived servers. A vulnerability in Roxy-wi allows a remote, unauthenticated malicious user to bypass authentication and access admin functionality by sending a specially crafted HTTP request. This...
Roxy-wi Roxy-wi
9.8
CVSSv3
CVE-2022-31126
Roxy-wi is an open source web interface for managing Haproxy, Nginx, Apache and Keepalived servers. A vulnerability in Roxy-wi allows a remote, unauthenticated malicious user to code execution by sending a specially crafted HTTP request to /app/options.py file. This affects Roxy-...
Roxy-wi Roxy-wi
6.5
CVSSv3
CVE-2022-31081
HTTP::Daemon is a simple http server class written in perl. Versions before 6.15 are subject to a vulnerability which could potentially be exploited to gain privileged access to APIs or poison intermediate caches. It is uncertain how large the risks are, most Perl based applicati...
Http\\ \\ Daemon Project
Debian Debian Linux 10.0
5.5
CVSSv3
CVE-2022-32414
Nginx NJS v0.7.2 exists to contain a segmentation violation in the function njs_vmcode_interpreter at src/njs_vmcode.c.
F5 Njs 0.7.2
5.5
CVSSv3
CVE-2022-31306
Nginx NJS v0.7.2 exists to contain a segmentation violation in the function njs_array_convert_to_slow_array at src/njs_array.c.
F5 Njs 0.7.2
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-29895
blind SQL injection
CVE-2024-5064
CVE-2023-52677
CVE-2023-52682
CVE-2024-30051
CVE-2024-35849
remote attackers
remote
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
3
4
5
6
7
8
9
10
NEXT »