WID-SEC-W-2026-1527

Vulnerability from csaf_certbund - Published: 2026-05-14 22:00 - Updated: 2026-05-18 22:00
Summary
NGINX Open Source and NGINX Plus: Mehrere Schwachstellen
Severity
Hoch
Notes
Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.
Produktbeschreibung: NGINX Plus ist die kommerzielle Variante von NGINX, einer Webserver-, Reverse Proxy- und E-Mail Proxy Software. NGINX ist eine Webserver-, Reverse Proxy- und E-Mail-Proxy Software.
Angriff: Ein entfernter, anonymer Angreifer kann mehrere Schwachstellen in NGINX Open Source and NGINX Plus ausnutzen, um Sicherheitsvorkehrungen zu umgehen, beliebigen Code auszuführen, Daten zu manipulieren, vertrauliche Informationen offenzulegen oder einen Denial-of-Service-Zustand zu verursachen.
Betroffene Betriebssysteme: - Linux - UNIX - Windows
Affected products
Product Identifier Version Remediation
NGINX NGINX Plus <37.0.0
NGINX / NGINX Plus
<37.0.0
Debian Linux
Debian
cpe:/o:debian:debian_linux:-
Red Hat Enterprise Linux
Red Hat
cpe:/o:redhat:enterprise_linux:-
Ubuntu Linux
Ubuntu
cpe:/o:canonical:ubuntu_linux:-
SUSE openSUSE
SUSE
cpe:/o:suse:opensuse:-
NGINX NGINX Plus <R32 P6
NGINX / NGINX Plus
<R32 P6
NGINX NGINX Open Source <1.30.1
NGINX / NGINX
Open Source <1.30.1
RESF Rocky Linux
RESF
cpe:/o:resf:rocky_linux:-
NGINX NGINX Open Source <1.31.0
NGINX / NGINX
Open Source <1.31.0
Fedora Linux
Fedora
cpe:/o:fedoraproject:fedora:-
NGINX NGINX Plus <R36 P4
NGINX / NGINX Plus
<R36 P4
Affected products
Product Identifier Version Remediation
Debian Linux
Debian
cpe:/o:debian:debian_linux:-
Red Hat Enterprise Linux
Red Hat
cpe:/o:redhat:enterprise_linux:-
Ubuntu Linux
Ubuntu
cpe:/o:canonical:ubuntu_linux:-
SUSE openSUSE
SUSE
cpe:/o:suse:opensuse:-
NGINX NGINX Plus <R32 P6
NGINX / NGINX Plus
<R32 P6
NGINX NGINX Open Source <1.30.1
NGINX / NGINX
Open Source <1.30.1
RESF Rocky Linux
RESF
cpe:/o:resf:rocky_linux:-
NGINX NGINX Open Source <1.31.0
NGINX / NGINX
Open Source <1.31.0
Fedora Linux
Fedora
cpe:/o:fedoraproject:fedora:-
NGINX NGINX Plus <R36 P4
NGINX / NGINX Plus
<R36 P4
Affected products
Product Identifier Version Remediation
Debian Linux
Debian
cpe:/o:debian:debian_linux:-
Red Hat Enterprise Linux
Red Hat
cpe:/o:redhat:enterprise_linux:-
Ubuntu Linux
Ubuntu
cpe:/o:canonical:ubuntu_linux:-
SUSE openSUSE
SUSE
cpe:/o:suse:opensuse:-
NGINX NGINX Open Source <1.30.1
NGINX / NGINX
Open Source <1.30.1
RESF Rocky Linux
RESF
cpe:/o:resf:rocky_linux:-
NGINX NGINX Open Source <1.31.0
NGINX / NGINX
Open Source <1.31.0
Fedora Linux
Fedora
cpe:/o:fedoraproject:fedora:-
Affected products
Product Identifier Version Remediation
NGINX NGINX Plus <37.0.0
NGINX / NGINX Plus
<37.0.0
Debian Linux
Debian
cpe:/o:debian:debian_linux:-
Red Hat Enterprise Linux
Red Hat
cpe:/o:redhat:enterprise_linux:-
Ubuntu Linux
Ubuntu
cpe:/o:canonical:ubuntu_linux:-
SUSE openSUSE
SUSE
cpe:/o:suse:opensuse:-
NGINX NGINX Plus <R32 P6
NGINX / NGINX Plus
<R32 P6
NGINX NGINX Open Source <1.30.1
NGINX / NGINX
Open Source <1.30.1
RESF Rocky Linux
RESF
cpe:/o:resf:rocky_linux:-
NGINX NGINX Open Source <1.31.0
NGINX / NGINX
Open Source <1.31.0
Fedora Linux
Fedora
cpe:/o:fedoraproject:fedora:-
NGINX NGINX Plus <R36 P4
NGINX / NGINX Plus
<R36 P4
Affected products
Product Identifier Version Remediation
NGINX NGINX Plus <37.0.0
NGINX / NGINX Plus
<37.0.0
Debian Linux
Debian
cpe:/o:debian:debian_linux:-
Red Hat Enterprise Linux
Red Hat
cpe:/o:redhat:enterprise_linux:-
Ubuntu Linux
Ubuntu
cpe:/o:canonical:ubuntu_linux:-
SUSE openSUSE
SUSE
cpe:/o:suse:opensuse:-
NGINX NGINX Plus <R32 P6
NGINX / NGINX Plus
<R32 P6
NGINX NGINX Open Source <1.30.1
NGINX / NGINX
Open Source <1.30.1
RESF Rocky Linux
RESF
cpe:/o:resf:rocky_linux:-
NGINX NGINX Open Source <1.31.0
NGINX / NGINX
Open Source <1.31.0
Fedora Linux
Fedora
cpe:/o:fedoraproject:fedora:-
NGINX NGINX Plus <R36 P4
NGINX / NGINX Plus
<R36 P4
Affected products
Product Identifier Version Remediation
Debian Linux
Debian
cpe:/o:debian:debian_linux:-
Red Hat Enterprise Linux
Red Hat
cpe:/o:redhat:enterprise_linux:-
Ubuntu Linux
Ubuntu
cpe:/o:canonical:ubuntu_linux:-
SUSE openSUSE
SUSE
cpe:/o:suse:opensuse:-
NGINX NGINX Plus <R32 P6
NGINX / NGINX Plus
<R32 P6
NGINX NGINX Open Source <1.30.1
NGINX / NGINX
Open Source <1.30.1
RESF Rocky Linux
RESF
cpe:/o:resf:rocky_linux:-
NGINX NGINX Open Source <1.31.0
NGINX / NGINX
Open Source <1.31.0
Fedora Linux
Fedora
cpe:/o:fedoraproject:fedora:-
NGINX NGINX Plus <R36 P4
NGINX / NGINX Plus
<R36 P4
References
URL Category
https://wid.cert-bund.de/.well-known/csaf/white/2… self
https://wid.cert-bund.de/portal/wid/securityadvis… self
https://github.com/advisories/GHSA-GCGV-V5GF-C543 external
https://github.com/advisories/GHSA-H7RQ-F9GQ-MC8R external
https://github.com/advisories/GHSA-X88Q-X2R7-VG3G external
https://github.com/advisories/GHSA-V43F-895R-CHHH external
https://github.com/advisories/GHSA-6VMC-2WH4-77QP external
https://github.com/advisories/GHSA-FM65-XRRR-C358 external
https://github.com/p3Nt3st3r-sTAr/CVE-2026-42945-POC external
https://my.f5.com/manage/s/article/K000161019 external
https://my.f5.com/manage/s/article/K000161021 external
https://my.f5.com/manage/s/article/K000161068 external
https://my.f5.com/manage/s/article/K000161131 external
https://my.f5.com/manage/s/article/K000161027 external
https://my.f5.com/manage/s/article/K000161028 external
https://bodhi.fedoraproject.org/updates/FEDORA-20… external
https://ubuntu.com/security/notices/USN-8271-1 external
https://bodhi.fedoraproject.org/updates/FEDORA-20… external
https://bodhi.fedoraproject.org/updates/FEDORA-20… external
https://access.redhat.com/errata/RHSA-2026:17751 external
https://access.redhat.com/errata/RHSA-2026:17753 external
https://access.redhat.com/errata/RHSA-2026:17752 external
https://access.redhat.com/errata/RHSA-2026:18029 external
https://access.redhat.com/errata/RHSA-2026:17790 external
https://access.redhat.com/errata/RHSA-2026:17791 external
https://access.redhat.com/errata/RHSA-2026:17792 external
https://access.redhat.com/errata/RHSA-2026:17793 external
https://access.redhat.com/errata/RHSA-2026:17794 external
https://access.redhat.com/errata/RHSA-2026:18063 external
https://access.redhat.com/errata/RHSA-2026:18041 external
https://lists.debian.org/debian-lts-announce/2026… external
https://lists.opensuse.org/archives/list/security… external
https://errata.build.resf.org/RLSA-2026:18041 external

{
  "document": {
    "aggregate_severity": {
      "text": "hoch"
    },
    "category": "csaf_base",
    "csaf_version": "2.0",
    "distribution": {
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "de-DE",
    "notes": [
      {
        "category": "legal_disclaimer",
        "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
      },
      {
        "category": "description",
        "text": "NGINX Plus ist die kommerzielle Variante von NGINX, einer Webserver-, Reverse Proxy- und E-Mail Proxy Software.\r\nNGINX ist eine Webserver-, Reverse Proxy- und E-Mail-Proxy Software.",
        "title": "Produktbeschreibung"
      },
      {
        "category": "summary",
        "text": "Ein entfernter, anonymer Angreifer kann mehrere Schwachstellen in NGINX Open Source and NGINX Plus ausnutzen, um Sicherheitsvorkehrungen zu umgehen, beliebigen Code auszuf\u00fchren, Daten zu manipulieren, vertrauliche Informationen offenzulegen oder einen Denial-of-Service-Zustand zu verursachen.",
        "title": "Angriff"
      },
      {
        "category": "general",
        "text": "- Linux\n- UNIX\n- Windows",
        "title": "Betroffene Betriebssysteme"
      }
    ],
    "publisher": {
      "category": "other",
      "contact_details": "csaf-provider@cert-bund.de",
      "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
      "namespace": "https://www.bsi.bund.de"
    },
    "references": [
      {
        "category": "self",
        "summary": "WID-SEC-W-2026-1527 - CSAF Version",
        "url": "https://wid.cert-bund.de/.well-known/csaf/white/2026/wid-sec-w-2026-1527.json"
      },
      {
        "category": "self",
        "summary": "WID-SEC-2026-1527 - Portal Version",
        "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1527"
      },
      {
        "category": "external",
        "summary": "GitHub Security Advisory GHSA-GCGV-V5GF-C543 vom 2026-05-13",
        "url": "https://github.com/advisories/GHSA-GCGV-V5GF-C543"
      },
      {
        "category": "external",
        "summary": "GitHub Security Advisory GHSA-H7RQ-F9GQ-MC8R vom 2026-05-13",
        "url": "https://github.com/advisories/GHSA-H7RQ-F9GQ-MC8R"
      },
      {
        "category": "external",
        "summary": "GitHub Security Advisory GHSA-X88Q-X2R7-VG3G vom 2026-05-13",
        "url": "https://github.com/advisories/GHSA-X88Q-X2R7-VG3G"
      },
      {
        "category": "external",
        "summary": "GitHub Security Advisory GHSA-V43F-895R-CHHH vom 2026-05-13",
        "url": "https://github.com/advisories/GHSA-V43F-895R-CHHH"
      },
      {
        "category": "external",
        "summary": "GitHub Security Advisory GHSA-6VMC-2WH4-77QP vom 2026-05-13",
        "url": "https://github.com/advisories/GHSA-6VMC-2WH4-77QP"
      },
      {
        "category": "external",
        "summary": "GitHub Security Advisory GHSA-FM65-XRRR-C358 vom 2026-05-13",
        "url": "https://github.com/advisories/GHSA-FM65-XRRR-C358"
      },
      {
        "category": "external",
        "summary": "PoC CVE-2026-42945 vom 2026-05-13",
        "url": "https://github.com/p3Nt3st3r-sTAr/CVE-2026-42945-POC"
      },
      {
        "category": "external",
        "summary": "F5 Security Advisory K000161019 vom 2026-05-13",
        "url": "https://my.f5.com/manage/s/article/K000161019"
      },
      {
        "category": "external",
        "summary": "F5 Security Advisory K000161021 vom 2026-05-13",
        "url": "https://my.f5.com/manage/s/article/K000161021"
      },
      {
        "category": "external",
        "summary": "F5 Security Advisory K000161068 vom 2026-05-13",
        "url": "https://my.f5.com/manage/s/article/K000161068"
      },
      {
        "category": "external",
        "summary": "F5 Security Advisory K000161131 vom 2026-05-13",
        "url": "https://my.f5.com/manage/s/article/K000161131"
      },
      {
        "category": "external",
        "summary": "F5 Security Advisory K000161027 vom 2026-05-13",
        "url": "https://my.f5.com/manage/s/article/K000161027"
      },
      {
        "category": "external",
        "summary": "F5 Security Advisory K000161028 vom 2026-05-13",
        "url": "https://my.f5.com/manage/s/article/K000161028"
      },
      {
        "category": "external",
        "summary": "Fedora Security Advisory FEDORA-2026-094EB13BB1 vom 2026-05-14",
        "url": "https://bodhi.fedoraproject.org/updates/FEDORA-2026-094eb13bb1"
      },
      {
        "category": "external",
        "summary": "Ubuntu Security Notice USN-8271-1 vom 2026-05-14",
        "url": "https://ubuntu.com/security/notices/USN-8271-1"
      },
      {
        "category": "external",
        "summary": "Fedora Security Advisory FEDORA-2026-FB53CB4D67 vom 2026-05-14",
        "url": "https://bodhi.fedoraproject.org/updates/FEDORA-2026-fb53cb4d67"
      },
      {
        "category": "external",
        "summary": "Fedora Security Advisory FEDORA-2026-38623B4FED vom 2026-05-14",
        "url": "https://bodhi.fedoraproject.org/updates/FEDORA-2026-38623b4fed"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2026:17751 vom 2026-05-15",
        "url": "https://access.redhat.com/errata/RHSA-2026:17751"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2026:17753 vom 2026-05-15",
        "url": "https://access.redhat.com/errata/RHSA-2026:17753"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2026:17752 vom 2026-05-15",
        "url": "https://access.redhat.com/errata/RHSA-2026:17752"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2026:18029 vom 2026-05-18",
        "url": "https://access.redhat.com/errata/RHSA-2026:18029"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2026:17790 vom 2026-05-15",
        "url": "https://access.redhat.com/errata/RHSA-2026:17790"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2026:17791 vom 2026-05-15",
        "url": "https://access.redhat.com/errata/RHSA-2026:17791"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2026:17792 vom 2026-05-16",
        "url": "https://access.redhat.com/errata/RHSA-2026:17792"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2026:17793 vom 2026-05-15",
        "url": "https://access.redhat.com/errata/RHSA-2026:17793"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2026:17794 vom 2026-05-16",
        "url": "https://access.redhat.com/errata/RHSA-2026:17794"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2026:18063 vom 2026-05-18",
        "url": "https://access.redhat.com/errata/RHSA-2026:18063"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2026:18041 vom 2026-05-18",
        "url": "https://access.redhat.com/errata/RHSA-2026:18041"
      },
      {
        "category": "external",
        "summary": "Debian Security Advisory DLA-4589 vom 2026-05-18",
        "url": "https://lists.debian.org/debian-lts-announce/2026/05/msg00033.html"
      },
      {
        "category": "external",
        "summary": "openSUSE Security Update OPENSUSE-SU-2026:10796-1 vom 2026-05-18",
        "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/EVUBHQ3CZLOXLHHOL5Y3BXTI4PSUI2YD/"
      },
      {
        "category": "external",
        "summary": "Rocky Linux Security Advisory RLSA-2026:18041 vom 2026-05-18",
        "url": "https://errata.build.resf.org/RLSA-2026:18041"
      }
    ],
    "source_lang": "en-US",
    "title": "NGINX Open Source and NGINX Plus: Mehrere Schwachstellen",
    "tracking": {
      "current_release_date": "2026-05-18T22:00:00.000+00:00",
      "generator": {
        "date": "2026-05-19T05:36:18.303+00:00",
        "engine": {
          "name": "BSI-WID",
          "version": "1.5.0"
        }
      },
      "id": "WID-SEC-W-2026-1527",
      "initial_release_date": "2026-05-14T22:00:00.000+00:00",
      "revision_history": [
        {
          "date": "2026-05-14T22:00:00.000+00:00",
          "number": "1",
          "summary": "Initiale Fassung"
        },
        {
          "date": "2026-05-14T22:00:00.000+00:00",
          "number": "2",
          "summary": "version nicht vorhanden"
        },
        {
          "date": "2026-05-17T22:00:00.000+00:00",
          "number": "3",
          "summary": "Exploit CVE-2026-42945 best\u00e4tigt"
        },
        {
          "date": "2026-05-18T22:00:00.000+00:00",
          "number": "4",
          "summary": "Neue Updates von Red Hat, Debian, openSUSE und Rocky Enterprise Software Foundation aufgenommen"
        }
      ],
      "status": "final",
      "version": "4"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "category": "product_name",
            "name": "Debian Linux",
            "product": {
              "name": "Debian Linux",
              "product_id": "2951",
              "product_identification_helper": {
                "cpe": "cpe:/o:debian:debian_linux:-"
              }
            }
          }
        ],
        "category": "vendor",
        "name": "Debian"
      },
      {
        "branches": [
          {
            "category": "product_name",
            "name": "Fedora Linux",
            "product": {
              "name": "Fedora Linux",
              "product_id": "74185",
              "product_identification_helper": {
                "cpe": "cpe:/o:fedoraproject:fedora:-"
              }
            }
          }
        ],
        "category": "vendor",
        "name": "Fedora"
      },
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "Open Source \u003c1.31.0",
                "product": {
                  "name": "NGINX NGINX Open Source \u003c1.31.0",
                  "product_id": "T054115"
                }
              },
              {
                "category": "product_version",
                "name": "Open Source 1.31.0",
                "product": {
                  "name": "NGINX NGINX Open Source 1.31.0",
                  "product_id": "T054115-fixed",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:nginx:nginx:open_source__1.31.0"
                  }
                }
              },
              {
                "category": "product_version_range",
                "name": "Open Source \u003c1.30.1",
                "product": {
                  "name": "NGINX NGINX Open Source \u003c1.30.1",
                  "product_id": "T054116"
                }
              },
              {
                "category": "product_version",
                "name": "Open Source 1.30.1",
                "product": {
                  "name": "NGINX NGINX Open Source 1.30.1",
                  "product_id": "T054116-fixed",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:nginx:nginx:open_source__1.30.1"
                  }
                }
              }
            ],
            "category": "product_name",
            "name": "NGINX"
          },
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "\u003c37.0.0",
                "product": {
                  "name": "NGINX NGINX Plus \u003c37.0.0",
                  "product_id": "T054112"
                }
              },
              {
                "category": "product_version",
                "name": "37.0.0",
                "product": {
                  "name": "NGINX NGINX Plus 37.0.0",
                  "product_id": "T054112-fixed",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:nginx:nginx_plus:37.0.0"
                  }
                }
              },
              {
                "category": "product_version_range",
                "name": "\u003cR36 P4",
                "product": {
                  "name": "NGINX NGINX Plus \u003cR36 P4",
                  "product_id": "T054113"
                }
              },
              {
                "category": "product_version",
                "name": "R36 P4",
                "product": {
                  "name": "NGINX NGINX Plus R36 P4",
                  "product_id": "T054113-fixed",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:nginx:nginx_plus:r36_p4"
                  }
                }
              },
              {
                "category": "product_version_range",
                "name": "\u003cR32 P6",
                "product": {
                  "name": "NGINX NGINX Plus \u003cR32 P6",
                  "product_id": "T054118"
                }
              },
              {
                "category": "product_version",
                "name": "R32 P6",
                "product": {
                  "name": "NGINX NGINX Plus R32 P6",
                  "product_id": "T054118-fixed",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:nginx:nginx_plus:r32_p6"
                  }
                }
              }
            ],
            "category": "product_name",
            "name": "NGINX Plus"
          }
        ],
        "category": "vendor",
        "name": "NGINX"
      },
      {
        "branches": [
          {
            "category": "product_name",
            "name": "RESF Rocky Linux",
            "product": {
              "name": "RESF Rocky Linux",
              "product_id": "T032255",
              "product_identification_helper": {
                "cpe": "cpe:/o:resf:rocky_linux:-"
              }
            }
          }
        ],
        "category": "vendor",
        "name": "RESF"
      },
      {
        "branches": [
          {
            "category": "product_name",
            "name": "Red Hat Enterprise Linux",
            "product": {
              "name": "Red Hat Enterprise Linux",
              "product_id": "67646",
              "product_identification_helper": {
                "cpe": "cpe:/o:redhat:enterprise_linux:-"
              }
            }
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      },
      {
        "branches": [
          {
            "category": "product_name",
            "name": "SUSE openSUSE",
            "product": {
              "name": "SUSE openSUSE",
              "product_id": "T027843",
              "product_identification_helper": {
                "cpe": "cpe:/o:suse:opensuse:-"
              }
            }
          }
        ],
        "category": "vendor",
        "name": "SUSE"
      },
      {
        "branches": [
          {
            "category": "product_name",
            "name": "Ubuntu Linux",
            "product": {
              "name": "Ubuntu Linux",
              "product_id": "T000126",
              "product_identification_helper": {
                "cpe": "cpe:/o:canonical:ubuntu_linux:-"
              }
            }
          }
        ],
        "category": "vendor",
        "name": "Ubuntu"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2026-40460",
      "product_status": {
        "known_affected": [
          "T054112",
          "2951",
          "67646",
          "T000126",
          "T027843",
          "T054118",
          "T054116",
          "T032255",
          "T054115",
          "74185",
          "T054113"
        ]
      },
      "release_date": "2026-05-13T22:00:00.000+00:00",
      "title": "CVE-2026-40460"
    },
    {
      "cve": "CVE-2026-40701",
      "product_status": {
        "known_affected": [
          "2951",
          "67646",
          "T000126",
          "T027843",
          "T054118",
          "T054116",
          "T032255",
          "T054115",
          "74185",
          "T054113"
        ]
      },
      "release_date": "2026-05-13T22:00:00.000+00:00",
      "title": "CVE-2026-40701"
    },
    {
      "cve": "CVE-2026-42926",
      "product_status": {
        "known_affected": [
          "2951",
          "67646",
          "T000126",
          "T027843",
          "T054116",
          "T032255",
          "T054115",
          "74185"
        ]
      },
      "release_date": "2026-05-13T22:00:00.000+00:00",
      "title": "CVE-2026-42926"
    },
    {
      "cve": "CVE-2026-42934",
      "product_status": {
        "known_affected": [
          "T054112",
          "2951",
          "67646",
          "T000126",
          "T027843",
          "T054118",
          "T054116",
          "T032255",
          "T054115",
          "74185",
          "T054113"
        ]
      },
      "release_date": "2026-05-13T22:00:00.000+00:00",
      "title": "CVE-2026-42934"
    },
    {
      "cve": "CVE-2026-42945",
      "product_status": {
        "known_affected": [
          "T054112",
          "2951",
          "67646",
          "T000126",
          "T027843",
          "T054118",
          "T054116",
          "T032255",
          "T054115",
          "74185",
          "T054113"
        ]
      },
      "release_date": "2026-05-13T22:00:00.000+00:00",
      "title": "CVE-2026-42945"
    },
    {
      "cve": "CVE-2026-42946",
      "product_status": {
        "known_affected": [
          "2951",
          "67646",
          "T000126",
          "T027843",
          "T054118",
          "T054116",
          "T032255",
          "T054115",
          "74185",
          "T054113"
        ]
      },
      "release_date": "2026-05-13T22:00:00.000+00:00",
      "title": "CVE-2026-42946"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…
Forecast uses a logistic model when the trend is rising, or an exponential decay model when the trend is falling. Fitted via linearized least squares.

Sightings

Author Source Type Date Other

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…