CVE-2017-7529
high-risk
Published 2017-07-13
Nginx versions since 0.5.6 up to and including 1.13.2 are vulnerable to integer overflow vulnerability in nginx range filter module resulting into leak of potentially sensitive information triggered by specially crafted request.
Do I need to act?
!
92.9% chance of exploitation in next 30 days
EPSS score — higher than 7% of all CVEs
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
7
CVSS 7.5/10
High
NETWORK
/ LOW complexity
Affected Products (3)
References (14)
Mailing List
http://seclists.org/fulldisclosure/2021/Sep/36
Third Party Advisory
http://www.securityfocus.com/bid/99534
Third Party Advisory
http://www.securitytracker.com/id/1039238
Third Party Advisory
https://access.redhat.com/errata/RHSA-2017:2538
Third Party Advisory
https://puppet.com/security/cve/cve-2017-7529
Third Party Advisory
https://support.apple.com/kb/HT212818
Mailing List
http://seclists.org/fulldisclosure/2021/Sep/36
Third Party Advisory
http://www.securityfocus.com/bid/99534
Third Party Advisory
http://www.securitytracker.com/id/1039238
Third Party Advisory
https://access.redhat.com/errata/RHSA-2017:2538
Third Party Advisory
https://puppet.com/security/cve/cve-2017-7529
Third Party Advisory
https://support.apple.com/kb/HT212818
55
/ 100
high-risk
Severity
26/34 · High
Exploitability
20/34 · Moderate
Exposure
9/34 · Low