語言:
https://security-tracker.debian.org/tracker/source-package/nginx
https://security-tracker.debian.org/tracker/CVE-2025-53859
https://security-tracker.debian.org/tracker/CVE-2026-1642
https://security-tracker.debian.org/tracker/CVE-2026-27651
https://security-tracker.debian.org/tracker/CVE-2026-27654
https://security-tracker.debian.org/tracker/CVE-2026-27784
https://security-tracker.debian.org/tracker/CVE-2026-28753
https://security-tracker.debian.org/tracker/CVE-2026-32647
https://security-tracker.debian.org/tracker/CVE-2026-40701
https://security-tracker.debian.org/tracker/CVE-2026-42934
https://security-tracker.debian.org/tracker/CVE-2026-42945
嚴重性: Critical
ID: 315178
檔案名稱: debian_DLA-4589.nasl
版本: 1.1
類型: Local
代理程式: unix
已發布: 2026/5/18
已更新: 2026/5/18
支援的感應器: Frictionless Assessment Agent, Nessus Agent, Agentless Assessment, Continuous Assessment, Nessus
風險因素: Critical
分數: 9.4
風險因素: High
基本分數: 8.5
時間性分數: 6.7
媒介: CVSS2#AV:N/AC:L/Au:N/C:N/I:P/A:C
CVSS 評分資料來源: CVE-2026-27654
風險因素: Medium
基本分數: 5.5
時間性分數: 5
媒介: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
時間媒介: CVSS:3.0/E:P/RL:O/RC:C
CVSS 評分資料來源: CVE-2026-27784
風險因素: Critical
Base Score: 9.2
Threat Score: 8.2
Threat Vector: CVSS:4.0/E:P
Vector: CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
CVSS 評分資料來源: CVE-2026-42945
CPE: p-cpe:/a:debian:debian_linux:libnginx-mod-http-xslt-filter, cpe:/o:debian:debian_linux:11.0, p-cpe:/a:debian:debian_linux:libnginx-mod-http-upstream-fair, p-cpe:/a:debian:debian_linux:nginx-light, p-cpe:/a:debian:debian_linux:libnginx-mod-http-auth-pam, p-cpe:/a:debian:debian_linux:libnginx-mod-http-ndk, p-cpe:/a:debian:debian_linux:nginx-doc, p-cpe:/a:debian:debian_linux:nginx-extras, p-cpe:/a:debian:debian_linux:libnginx-mod-http-subs-filter, p-cpe:/a:debian:debian_linux:libnginx-mod-http-uploadprogress, p-cpe:/a:debian:debian_linux:libnginx-mod-http-perl, p-cpe:/a:debian:debian_linux:libnginx-mod-stream-geoip2, p-cpe:/a:debian:debian_linux:libnginx-mod-http-fancyindex, p-cpe:/a:debian:debian_linux:libnginx-mod-http-lua, p-cpe:/a:debian:debian_linux:libnginx-mod-mail, p-cpe:/a:debian:debian_linux:libnginx-mod-stream, p-cpe:/a:debian:debian_linux:nginx-core, p-cpe:/a:debian:debian_linux:nginx-full, p-cpe:/a:debian:debian_linux:libnginx-mod-stream-geoip, p-cpe:/a:debian:debian_linux:libnginx-mod-http-cache-purge, p-cpe:/a:debian:debian_linux:libnginx-mod-http-echo, p-cpe:/a:debian:debian_linux:libnginx-mod-http-headers-more-filter, p-cpe:/a:debian:debian_linux:libnginx-mod-nchan, p-cpe:/a:debian:debian_linux:nginx-common, p-cpe:/a:debian:debian_linux:libnginx-mod-http-image-filter, p-cpe:/a:debian:debian_linux:libnginx-mod-http-geoip, p-cpe:/a:debian:debian_linux:libnginx-mod-http-geoip2, p-cpe:/a:debian:debian_linux:nginx, p-cpe:/a:debian:debian_linux:libnginx-mod-http-dav-ext, p-cpe:/a:debian:debian_linux:libnginx-mod-rtmp
必要的 KB 項目: Host/local_checks_enabled, Host/Debian/release, Host/Debian/dpkg-l
可被惡意程式利用: true
可輕鬆利用: Exploits are available
修補程式發佈日期: 2026/5/18
弱點發布日期: 2025/8/13
CVE: CVE-2025-53859, CVE-2026-1642, CVE-2026-27651, CVE-2026-27654, CVE-2026-27784, CVE-2026-28753, CVE-2026-32647, CVE-2026-40701, CVE-2026-42934, CVE-2026-42945, CVE-2026-42946
IAVA: 2025-A-0615, 2026-A-0140, 2026-A-0280