{
  "$type": "site.standard.document",
  "bskyPostRef": {
    "cid": "bafyreib632s47g6dtvlo6cttyr3pgpsl4eajgb6jp4kxjwnvq7fpvfmcni",
    "uri": "at://did:plc:ghkvexthfanuyq7fb5veq6tw/app.bsky.feed.post/3mm2nc5iz3jo2"
  },
  "coverImage": {
    "$type": "blob",
    "ref": {
      "$link": "bafkreiabsshxcoeuzonifgdi3ocqbjdexchynj5amahlotqxz42ypdo76m"
    },
    "mimeType": "image/jpeg",
    "size": 264979
  },
  "path": "/2026/05/nginx-cve-2026-42945-exploited-in-wild.html",
  "publishedAt": "2026-05-17T11:57:53.000Z",
  "site": "https://thehackernews.com",
  "textContent": "A newly disclosed security flaw impacting NGINX Plus and NGINX Open has come under active exploitation in the wild, days after its public disclosure, according to VulnCheck.\nThe vulnerability, tracked as CVE-2026-42945 (CVSS score: 9.2), is a heap buffer overflow in ngx_http_rewrite_module affecting NGINX versions 0.6.27 through 1.30.0. According to AI-native security company depthfirst, the",
  "title": "NGINX CVE-2026-42945 Exploited in the Wild, Causing Worker Crashes and Possible RCE"
}