'; } else{ echo ''; } echo 'Hillstone Networks'; } elseif ($_SERVER[HTTP_HOST] == "update1.huaantech.com.cn") { echo ''; echo 'huaantech'; } elseif ($_SERVER[HTTP_HOST] == "update1.dcnetworks.com.cn") { echo ''; echo 'dcnetworks'; } elseif ($_SERVER[HTTP_HOST] == "update1.w-ibeda.com") { if (false===strpos($_SERVER[REQUEST_URI],"/en/")) echo ''; else echo ''; echo 'w-ibeda'; } elseif ($_SERVER[HTTP_HOST] == "update1.hp-telecom.com") { echo ''; echo 'hp-telecom'; } elseif ($_SERVER[HTTP_HOST] == "update1.maipu.com") { echo ''; echo 'Maipu'; } elseif ($_SERVER[HTTP_HOST] == "update1.ncurity.com") { echo ''; echo 'Ncurity'; } elseif ($_SERVER[HTTP_HOST] == "update1.socusnetwork.com") { echo ''; echo 'Socusnetwork'; } else{ echo ''; echo 'Hillstone Networks'; } ?>
 
   
 

vul_srv:nginx_integer_overflow_vul(Rule ID:1070010032)

Release Date2025/9/15

Rule NameCVE-2017-7529: NGINX Integer Overflow Vulnerability

Severity:high

CVE IDCVE-2017-7529

 

Descripiton

NGINX is a lightweight web server/reverse proxy server and email (IMAP/POP3) proxy server of NGINX company in the United States. The range filter module in Nginx version 0.5.6 to 1.13.2 has an input validation error vulnerability. An attacker could exploit this vulnerability to obtain sensitive information. This rule supports to defend the A6: Vulnerable and Outdated Components and A5: Security Misconfiguration of OWASP Top 10 - 2021.
Other reference:None

 

Solution

Update vendor patches.