Nginx-ui exposes sensitive API commands and settings, leading to potential remote code execution, privilege escalation, and information disclosure
Reporter | Title | Published | Views | Family All 14 |
---|---|---|---|---|
![]() | Command Injection | 12 Jan 202410:34 | – | veracode |
![]() | CVE-2024-22197 Authenticated (user role) remote command execution by modifying `nginx` settings (GHSL-2023-269) | 11 Jan 202417:56 | – | cvelist |
![]() | CVE-2024-23828 Nginx-UI authenticated RCE through injecting into the application config via CRLF | 29 Jan 202416:49 | – | cvelist |
![]() | Remote command execution in github.com/0xJacky/Nginx-UI | 17 Jan 202419:06 | – | osv |
![]() | CVE-2024-22197 | 11 Jan 202418:15 | – | nvd |
![]() | CVE-2024-23828 | 29 Jan 202417:15 | – | nvd |
![]() | Authenticated (user role) remote command execution by modifying `nginx` settings (GHSL-2023-269) | 11 Jan 202416:30 | – | github |
![]() | Information disclosure | 11 Jan 202418:15 | – | prion |
![]() | Design/Logic Flaw | 29 Jan 202417:15 | – | prion |
![]() | CVE-2024-22197 | 11 Jan 202418:15 | – | cve |
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo