Search for vulnerabilities
Vulnerability details: VCID-c9xc-nm4d-aaar
Vulnerability ID VCID-c9xc-nm4d-aaar
Aliases CVE-2024-7347
Summary Buffer overread in the ngx_http_mp4_module
Status Published
Exploitability 0.5
Weighted Severity 4.2
Risk 2.1
Affected and Fixed Packages Package Details
Weaknesses (2)
System Score Found at
cvssv3 4.7 https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-7347.json
epss 0.00044 https://api.first.org/data/v1/epss?cve=CVE-2024-7347
epss 0.00044 https://api.first.org/data/v1/epss?cve=CVE-2024-7347
epss 0.00044 https://api.first.org/data/v1/epss?cve=CVE-2024-7347
epss 0.00044 https://api.first.org/data/v1/epss?cve=CVE-2024-7347
epss 0.00044 https://api.first.org/data/v1/epss?cve=CVE-2024-7347
epss 0.00044 https://api.first.org/data/v1/epss?cve=CVE-2024-7347
epss 0.00044 https://api.first.org/data/v1/epss?cve=CVE-2024-7347
epss 0.00044 https://api.first.org/data/v1/epss?cve=CVE-2024-7347
epss 0.00044 https://api.first.org/data/v1/epss?cve=CVE-2024-7347
epss 0.00044 https://api.first.org/data/v1/epss?cve=CVE-2024-7347
epss 0.00044 https://api.first.org/data/v1/epss?cve=CVE-2024-7347
epss 0.00044 https://api.first.org/data/v1/epss?cve=CVE-2024-7347
epss 0.00044 https://api.first.org/data/v1/epss?cve=CVE-2024-7347
epss 0.00044 https://api.first.org/data/v1/epss?cve=CVE-2024-7347
epss 0.00044 https://api.first.org/data/v1/epss?cve=CVE-2024-7347
epss 0.00044 https://api.first.org/data/v1/epss?cve=CVE-2024-7347
epss 0.00053 https://api.first.org/data/v1/epss?cve=CVE-2024-7347
epss 0.00053 https://api.first.org/data/v1/epss?cve=CVE-2024-7347
epss 0.00053 https://api.first.org/data/v1/epss?cve=CVE-2024-7347
epss 0.00053 https://api.first.org/data/v1/epss?cve=CVE-2024-7347
epss 0.00053 https://api.first.org/data/v1/epss?cve=CVE-2024-7347
epss 0.00053 https://api.first.org/data/v1/epss?cve=CVE-2024-7347
epss 0.00053 https://api.first.org/data/v1/epss?cve=CVE-2024-7347
epss 0.00053 https://api.first.org/data/v1/epss?cve=CVE-2024-7347
epss 0.00053 https://api.first.org/data/v1/epss?cve=CVE-2024-7347
epss 0.00053 https://api.first.org/data/v1/epss?cve=CVE-2024-7347
epss 0.00053 https://api.first.org/data/v1/epss?cve=CVE-2024-7347
epss 0.00053 https://api.first.org/data/v1/epss?cve=CVE-2024-7347
epss 0.00053 https://api.first.org/data/v1/epss?cve=CVE-2024-7347
epss 0.00053 https://api.first.org/data/v1/epss?cve=CVE-2024-7347
epss 0.00053 https://api.first.org/data/v1/epss?cve=CVE-2024-7347
epss 0.00053 https://api.first.org/data/v1/epss?cve=CVE-2024-7347
epss 0.00053 https://api.first.org/data/v1/epss?cve=CVE-2024-7347
epss 0.00053 https://api.first.org/data/v1/epss?cve=CVE-2024-7347
epss 0.00054 https://api.first.org/data/v1/epss?cve=CVE-2024-7347
epss 0.00054 https://api.first.org/data/v1/epss?cve=CVE-2024-7347
epss 0.00054 https://api.first.org/data/v1/epss?cve=CVE-2024-7347
epss 0.00054 https://api.first.org/data/v1/epss?cve=CVE-2024-7347
epss 0.00054 https://api.first.org/data/v1/epss?cve=CVE-2024-7347
epss 0.00054 https://api.first.org/data/v1/epss?cve=CVE-2024-7347
epss 0.00054 https://api.first.org/data/v1/epss?cve=CVE-2024-7347
epss 0.00054 https://api.first.org/data/v1/epss?cve=CVE-2024-7347
epss 0.00054 https://api.first.org/data/v1/epss?cve=CVE-2024-7347
epss 0.00054 https://api.first.org/data/v1/epss?cve=CVE-2024-7347
epss 0.00054 https://api.first.org/data/v1/epss?cve=CVE-2024-7347
epss 0.00057 https://api.first.org/data/v1/epss?cve=CVE-2024-7347
epss 0.00057 https://api.first.org/data/v1/epss?cve=CVE-2024-7347
epss 0.00057 https://api.first.org/data/v1/epss?cve=CVE-2024-7347
epss 0.00063 https://api.first.org/data/v1/epss?cve=CVE-2024-7347
epss 0.00063 https://api.first.org/data/v1/epss?cve=CVE-2024-7347
epss 0.00063 https://api.first.org/data/v1/epss?cve=CVE-2024-7347
epss 0.00063 https://api.first.org/data/v1/epss?cve=CVE-2024-7347
epss 0.00071 https://api.first.org/data/v1/epss?cve=CVE-2024-7347
epss 0.00076 https://api.first.org/data/v1/epss?cve=CVE-2024-7347
epss 0.00076 https://api.first.org/data/v1/epss?cve=CVE-2024-7347
epss 0.00076 https://api.first.org/data/v1/epss?cve=CVE-2024-7347
epss 0.00076 https://api.first.org/data/v1/epss?cve=CVE-2024-7347
epss 0.00076 https://api.first.org/data/v1/epss?cve=CVE-2024-7347
epss 0.00076 https://api.first.org/data/v1/epss?cve=CVE-2024-7347
epss 0.00076 https://api.first.org/data/v1/epss?cve=CVE-2024-7347
epss 0.001 https://api.first.org/data/v1/epss?cve=CVE-2024-7347
epss 0.001 https://api.first.org/data/v1/epss?cve=CVE-2024-7347
epss 0.001 https://api.first.org/data/v1/epss?cve=CVE-2024-7347
epss 0.001 https://api.first.org/data/v1/epss?cve=CVE-2024-7347
epss 0.001 https://api.first.org/data/v1/epss?cve=CVE-2024-7347
epss 0.001 https://api.first.org/data/v1/epss?cve=CVE-2024-7347
epss 0.001 https://api.first.org/data/v1/epss?cve=CVE-2024-7347
epss 0.001 https://api.first.org/data/v1/epss?cve=CVE-2024-7347
epss 0.001 https://api.first.org/data/v1/epss?cve=CVE-2024-7347
epss 0.001 https://api.first.org/data/v1/epss?cve=CVE-2024-7347
epss 0.001 https://api.first.org/data/v1/epss?cve=CVE-2024-7347
epss 0.001 https://api.first.org/data/v1/epss?cve=CVE-2024-7347
epss 0.001 https://api.first.org/data/v1/epss?cve=CVE-2024-7347
epss 0.001 https://api.first.org/data/v1/epss?cve=CVE-2024-7347
epss 0.001 https://api.first.org/data/v1/epss?cve=CVE-2024-7347
epss 0.001 https://api.first.org/data/v1/epss?cve=CVE-2024-7347
epss 0.001 https://api.first.org/data/v1/epss?cve=CVE-2024-7347
epss 0.001 https://api.first.org/data/v1/epss?cve=CVE-2024-7347
epss 0.001 https://api.first.org/data/v1/epss?cve=CVE-2024-7347
epss 0.00103 https://api.first.org/data/v1/epss?cve=CVE-2024-7347
epss 0.00103 https://api.first.org/data/v1/epss?cve=CVE-2024-7347
epss 0.00103 https://api.first.org/data/v1/epss?cve=CVE-2024-7347
epss 0.00103 https://api.first.org/data/v1/epss?cve=CVE-2024-7347
epss 0.00103 https://api.first.org/data/v1/epss?cve=CVE-2024-7347
epss 0.00106 https://api.first.org/data/v1/epss?cve=CVE-2024-7347
epss 0.00106 https://api.first.org/data/v1/epss?cve=CVE-2024-7347
epss 0.00106 https://api.first.org/data/v1/epss?cve=CVE-2024-7347
epss 0.00106 https://api.first.org/data/v1/epss?cve=CVE-2024-7347
epss 0.00106 https://api.first.org/data/v1/epss?cve=CVE-2024-7347
cvssv3.1 5.3 https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
generic_textual low https://mailman.nginx.org/pipermail/nginx-announce/2024/UUOCLLONPR6244YQYU65PO5LB7JDYCWM.html
cvssv3 4.7 https://nvd.nist.gov/vuln/detail/CVE-2024-7347
cvssv3.1 4.7 https://nvd.nist.gov/vuln/detail/CVE-2024-7347
Reference id Reference type URL
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-7347.json
https://api.first.org/data/v1/epss?cve=CVE-2024-7347
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7347
https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
https://mailman.nginx.org/pipermail/nginx-announce/2024/UUOCLLONPR6244YQYU65PO5LB7JDYCWM.html
https://my.f5.com/manage/s/article/K000140529
https://nginx.org/download/patch.2024.mp4.txt
https://nginx.org/download/patch.2024.mp4.txt.asc
http://www.openwall.com/lists/oss-security/2024/08/14/4
1078971 https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1078971
2304966 https://bugzilla.redhat.com/show_bug.cgi?id=2304966
cpe:2.3:a:f5:nginx_open_source:*:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:nginx_open_source:*:*:*:*:*:*:*:*
cpe:2.3:a:f5:nginx_open_source:1.27.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:nginx_open_source:1.27.0:*:*:*:*:*:*:*
cpe:2.3:a:f5:nginx_plus:*:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:nginx_plus:*:*:*:*:*:*:*:*
cpe:2.3:a:f5:nginx_plus:r31:-:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:nginx_plus:r31:-:*:*:*:*:*:*
cpe:2.3:a:f5:nginx_plus:r31:p1:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:nginx_plus:r31:p1:*:*:*:*:*:*
cpe:2.3:a:f5:nginx_plus:r32:-:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:nginx_plus:r32:-:*:*:*:*:*:*
CVE-2024-7347 https://nvd.nist.gov/vuln/detail/CVE-2024-7347
GLSA-202409-32 https://security.gentoo.org/glsa/202409-32
RHSA-2025:3261 https://access.redhat.com/errata/RHSA-2025:3261
RHSA-2025:3262 https://access.redhat.com/errata/RHSA-2025:3262
RHSA-2025:7402 https://access.redhat.com/errata/RHSA-2025:7402
RHSA-2025:7542 https://access.redhat.com/errata/RHSA-2025:7542
RHSA-2025:7546 https://access.redhat.com/errata/RHSA-2025:7546
RHSA-2025:7548 https://access.redhat.com/errata/RHSA-2025:7548
RHSA-2025:7549 https://access.redhat.com/errata/RHSA-2025:7549
RHSA-2025:7619 https://access.redhat.com/errata/RHSA-2025:7619
USN-7014-1 https://usn.ubuntu.com/7014-1/
USN-7014-2 https://usn.ubuntu.com/7014-2/
USN-7014-3 https://usn.ubuntu.com/7014-3/
No exploits are available.
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H Found at https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-7347.json
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L Found at https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H Found at https://nvd.nist.gov/vuln/detail/CVE-2024-7347
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H Found at https://nvd.nist.gov/vuln/detail/CVE-2024-7347
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Exploit Prediction Scoring System (EPSS)
Percentile 0.13743
EPSS Score 0.00044
Published At Nov. 1, 2024, midnight
Date Actor Action Source VulnerableCode Version
2024-08-14T15:28:30.771342+00:00 Nginx Importer Import https://nginx.org/en/security_advisories.html 34.0.0rc4