{
"$type": "site.standard.document",
"bskyPostRef": {
"cid": "bafyreib632s47g6dtvlo6cttyr3pgpsl4eajgb6jp4kxjwnvq7fpvfmcni",
"uri": "at://did:plc:ghkvexthfanuyq7fb5veq6tw/app.bsky.feed.post/3mm2nc5iz3jo2"
},
"coverImage": {
"$type": "blob",
"ref": {
"$link": "bafkreiabsshxcoeuzonifgdi3ocqbjdexchynj5amahlotqxz42ypdo76m"
},
"mimeType": "image/jpeg",
"size": 264979
},
"path": "/2026/05/nginx-cve-2026-42945-exploited-in-wild.html",
"publishedAt": "2026-05-17T11:57:53.000Z",
"site": "https://thehackernews.com",
"textContent": "A newly disclosed security flaw impacting NGINX Plus and NGINX Open has come under active exploitation in the wild, days after its public disclosure, according to VulnCheck.\nThe vulnerability, tracked as CVE-2026-42945 (CVSS score: 9.2), is a heap buffer overflow in ngx_http_rewrite_module affecting NGINX versions 0.6.27 through 1.30.0. According to AI-native security company depthfirst, the",
"title": "NGINX CVE-2026-42945 Exploited in the Wild, Causing Worker Crashes and Possible RCE"
}