Lookup for vulnerable packages by Package URL.

Purlpkg:nginx/nginx@1.5.6
Typenginx
Namespace
Namenginx
Version1.5.6
Qualifiers
Subpath
Is_vulnerabletrue
Next_non_vulnerable_version1.29.7
Latest_non_vulnerable_version1.29.7
Affected_by_vulnerabilities
0
url VCID-2cu7-pyw5-t3dm
vulnerability_id VCID-2cu7-pyw5-t3dm
summary Injection in auth_http and XCLIENT
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-28753.json
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-28753.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2026-28753
reference_id
reference_type
scores
0
value 0.00024
scoring_system epss
scoring_elements 0.06342
published_at 2026-04-02T12:55:00Z
1
value 0.00024
scoring_system epss
scoring_elements 0.06426
published_at 2026-04-13T12:55:00Z
2
value 0.00024
scoring_system epss
scoring_elements 0.06409
published_at 2026-04-08T12:55:00Z
3
value 0.00024
scoring_system epss
scoring_elements 0.06451
published_at 2026-04-09T12:55:00Z
4
value 0.00024
scoring_system epss
scoring_elements 0.06443
published_at 2026-04-11T12:55:00Z
5
value 0.00024
scoring_system epss
scoring_elements 0.06436
published_at 2026-04-12T12:55:00Z
6
value 0.00024
scoring_system epss
scoring_elements 0.06375
published_at 2026-04-04T12:55:00Z
7
value 0.00024
scoring_system epss
scoring_elements 0.06361
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2026-28753
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-28753
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-28753
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://my.f5.com/manage/s/article/K000160367
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value 6.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-03-24T15:24:28Z/
url https://my.f5.com/manage/s/article/K000160367
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2450780
reference_id 2450780
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2450780
6
reference_url https://nvd.nist.gov/vuln/detail/CVE-2026-28753
reference_id CVE-2026-28753
reference_type
scores
url https://nvd.nist.gov/vuln/detail/CVE-2026-28753
fixed_packages
0
url pkg:nginx/nginx@1.28.3
purl pkg:nginx/nginx@1.28.3
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-hemy-pnpj-sfg3
resource_url http://public2.vulnerablecode.io/packages/pkg:nginx/nginx@1.28.3
1
url pkg:nginx/nginx@1.29.7
purl pkg:nginx/nginx@1.29.7
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:nginx/nginx@1.29.7
aliases CVE-2026-28753
risk_score 1.6
exploitability 0.5
weighted_severity 3.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-2cu7-pyw5-t3dm
1
url VCID-3czf-dtzg-8kdm
vulnerability_id VCID-3czf-dtzg-8kdm
summary NULL pointer dereference while using CRAM-MD5 or APOP
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-27651.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-27651.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2026-27651
reference_id
reference_type
scores
0
value 0.00041
scoring_system epss
scoring_elements 0.12662
published_at 2026-04-02T12:55:00Z
1
value 0.00041
scoring_system epss
scoring_elements 0.12533
published_at 2026-04-13T12:55:00Z
2
value 0.00041
scoring_system epss
scoring_elements 0.12594
published_at 2026-04-08T12:55:00Z
3
value 0.00041
scoring_system epss
scoring_elements 0.12645
published_at 2026-04-09T12:55:00Z
4
value 0.00041
scoring_system epss
scoring_elements 0.12613
published_at 2026-04-11T12:55:00Z
5
value 0.00041
scoring_system epss
scoring_elements 0.12573
published_at 2026-04-12T12:55:00Z
6
value 0.00041
scoring_system epss
scoring_elements 0.12704
published_at 2026-04-04T12:55:00Z
7
value 0.00041
scoring_system epss
scoring_elements 0.12516
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2026-27651
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-27651
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-27651
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://my.f5.com/manage/s/article/K000160383
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value 8.7
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-03-24T15:02:03Z/
url https://my.f5.com/manage/s/article/K000160383
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2450791
reference_id 2450791
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2450791
6
reference_url https://nvd.nist.gov/vuln/detail/CVE-2026-27651
reference_id CVE-2026-27651
reference_type
scores
url https://nvd.nist.gov/vuln/detail/CVE-2026-27651
7
reference_url https://access.redhat.com/errata/RHSA-2026:6906
reference_id RHSA-2026:6906
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:6906
8
reference_url https://access.redhat.com/errata/RHSA-2026:6907
reference_id RHSA-2026:6907
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:6907
9
reference_url https://access.redhat.com/errata/RHSA-2026:6923
reference_id RHSA-2026:6923
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:6923
10
reference_url https://access.redhat.com/errata/RHSA-2026:7002
reference_id RHSA-2026:7002
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7002
11
reference_url https://access.redhat.com/errata/RHSA-2026:7343
reference_id RHSA-2026:7343
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7343
fixed_packages
0
url pkg:nginx/nginx@1.28.3
purl pkg:nginx/nginx@1.28.3
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-hemy-pnpj-sfg3
resource_url http://public2.vulnerablecode.io/packages/pkg:nginx/nginx@1.28.3
1
url pkg:nginx/nginx@1.29.7
purl pkg:nginx/nginx@1.29.7
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:nginx/nginx@1.29.7
aliases CVE-2026-27651
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-3czf-dtzg-8kdm
2
url VCID-asr7-uwpu-a7a5
vulnerability_id VCID-asr7-uwpu-a7a5
summary STARTTLS command injection
references
0
reference_url http://mailman.nginx.org/pipermail/nginx-announce/2014/000144.html
reference_id
reference_type
scores
url http://mailman.nginx.org/pipermail/nginx-announce/2014/000144.html
1
reference_url http://marc.info/?l=bugtraq&m=142103967620673&w=2
reference_id
reference_type
scores
url http://marc.info/?l=bugtraq&m=142103967620673&w=2
2
reference_url http://nginx.org/download/patch.2014.starttls.txt
reference_id
reference_type
scores
url http://nginx.org/download/patch.2014.starttls.txt
3
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-3556.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-3556.json
4
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-3556
reference_id
reference_type
scores
0
value 0.48169
scoring_system epss
scoring_elements 0.9773
published_at 2026-04-13T12:55:00Z
1
value 0.48169
scoring_system epss
scoring_elements 0.97707
published_at 2026-04-01T12:55:00Z
2
value 0.48169
scoring_system epss
scoring_elements 0.97726
published_at 2026-04-11T12:55:00Z
3
value 0.48169
scoring_system epss
scoring_elements 0.97728
published_at 2026-04-12T12:55:00Z
4
value 0.48169
scoring_system epss
scoring_elements 0.97714
published_at 2026-04-02T12:55:00Z
5
value 0.48169
scoring_system epss
scoring_elements 0.97715
published_at 2026-04-04T12:55:00Z
6
value 0.48169
scoring_system epss
scoring_elements 0.97716
published_at 2026-04-07T12:55:00Z
7
value 0.48169
scoring_system epss
scoring_elements 0.9772
published_at 2026-04-08T12:55:00Z
8
value 0.48169
scoring_system epss
scoring_elements 0.97723
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-3556
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3556
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3556
6
reference_url https://mailman.nginx.org/pipermail/nginx-announce/2014/000144.html
reference_id
reference_type
scores
0
value medium
scoring_system generic_textual
scoring_elements
url https://mailman.nginx.org/pipermail/nginx-announce/2014/000144.html
7
reference_url https://nginx.org/download/patch.2014.starttls.txt
reference_id
reference_type
scores
url https://nginx.org/download/patch.2014.starttls.txt
8
reference_url https://nginx.org/download/patch.2014.starttls.txt.asc
reference_id
reference_type
scores
url https://nginx.org/download/patch.2014.starttls.txt.asc
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1126891
reference_id 1126891
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1126891
10
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=757196
reference_id 757196
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=757196
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:nginx:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:f5:nginx:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:nginx:*:*:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/detail/CVE-2014-3556
reference_id CVE-2014-3556
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2014-3556
fixed_packages
0
url pkg:nginx/nginx@1.6.1
purl pkg:nginx/nginx@1.6.1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cu7-pyw5-t3dm
1
vulnerability VCID-3czf-dtzg-8kdm
2
vulnerability VCID-d1c6-dt2p-9kaa
3
vulnerability VCID-fmvd-vyt7-mkfk
4
vulnerability VCID-hemy-pnpj-sfg3
5
vulnerability VCID-sxf9-qr1j-u3et
6
vulnerability VCID-z3xb-4krg-rbae
resource_url http://public2.vulnerablecode.io/packages/pkg:nginx/nginx@1.6.1
1
url pkg:nginx/nginx@1.7.4
purl pkg:nginx/nginx@1.7.4
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cu7-pyw5-t3dm
1
vulnerability VCID-3czf-dtzg-8kdm
2
vulnerability VCID-d1c6-dt2p-9kaa
3
vulnerability VCID-fmvd-vyt7-mkfk
4
vulnerability VCID-hemy-pnpj-sfg3
5
vulnerability VCID-sxf9-qr1j-u3et
6
vulnerability VCID-x8ck-rceh-ukdw
7
vulnerability VCID-z3xb-4krg-rbae
resource_url http://public2.vulnerablecode.io/packages/pkg:nginx/nginx@1.7.4
aliases CVE-2014-3556
risk_score 3.0
exploitability 0.5
weighted_severity 6.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-asr7-uwpu-a7a5
3
url VCID-d1c6-dt2p-9kaa
vulnerability_id VCID-d1c6-dt2p-9kaa
summary SSL upstream injection
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-1642.json
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-1642.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2026-1642
reference_id
reference_type
scores
0
value 0.00016
scoring_system epss
scoring_elements 0.03395
published_at 2026-04-02T12:55:00Z
1
value 0.00016
scoring_system epss
scoring_elements 0.03796
published_at 2026-04-13T12:55:00Z
2
value 0.00016
scoring_system epss
scoring_elements 0.03427
published_at 2026-04-08T12:55:00Z
3
value 0.00016
scoring_system epss
scoring_elements 0.03448
published_at 2026-04-09T12:55:00Z
4
value 0.00016
scoring_system epss
scoring_elements 0.03408
published_at 2026-04-11T12:55:00Z
5
value 0.00016
scoring_system epss
scoring_elements 0.03381
published_at 2026-04-12T12:55:00Z
6
value 0.00016
scoring_system epss
scoring_elements 0.03409
published_at 2026-04-04T12:55:00Z
7
value 0.00016
scoring_system epss
scoring_elements 0.03425
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2026-1642
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-1642
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-1642
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://my.f5.com/manage/s/article/K000159824
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value 8.2
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-02-04T16:01:47Z/
url https://my.f5.com/manage/s/article/K000159824
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1127053
reference_id 1127053
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1127053
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2436738
reference_id 2436738
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2436738
7
reference_url https://nvd.nist.gov/vuln/detail/CVE-2026-1642
reference_id CVE-2026-1642
reference_type
scores
url https://nvd.nist.gov/vuln/detail/CVE-2026-1642
8
reference_url https://access.redhat.com/errata/RHSA-2026:3638
reference_id RHSA-2026:3638
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3638
9
reference_url https://access.redhat.com/errata/RHSA-2026:4235
reference_id RHSA-2026:4235
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:4235
10
reference_url https://access.redhat.com/errata/RHSA-2026:4501
reference_id RHSA-2026:4501
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:4501
11
reference_url https://access.redhat.com/errata/RHSA-2026:4705
reference_id RHSA-2026:4705
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:4705
12
reference_url https://access.redhat.com/errata/RHSA-2026:4943
reference_id RHSA-2026:4943
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:4943
13
reference_url https://access.redhat.com/errata/RHSA-2026:5581
reference_id RHSA-2026:5581
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:5581
14
reference_url https://access.redhat.com/errata/RHSA-2026:5599
reference_id RHSA-2026:5599
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:5599
15
reference_url https://access.redhat.com/errata/RHSA-2026:6182
reference_id RHSA-2026:6182
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:6182
16
reference_url https://access.redhat.com/errata/RHSA-2026:6234
reference_id RHSA-2026:6234
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:6234
17
reference_url https://access.redhat.com/errata/RHSA-2026:6235
reference_id RHSA-2026:6235
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:6235
18
reference_url https://access.redhat.com/errata/RHSA-2026:6302
reference_id RHSA-2026:6302
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:6302
19
reference_url https://access.redhat.com/errata/RHSA-2026:6311
reference_id RHSA-2026:6311
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:6311
20
reference_url https://access.redhat.com/errata/RHSA-2026:6407
reference_id RHSA-2026:6407
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:6407
21
reference_url https://access.redhat.com/errata/RHSA-2026:6408
reference_id RHSA-2026:6408
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:6408
22
reference_url https://access.redhat.com/errata/RHSA-2026:6427
reference_id RHSA-2026:6427
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:6427
23
reference_url https://usn.ubuntu.com/8038-1/
reference_id USN-8038-1
reference_type
scores
url https://usn.ubuntu.com/8038-1/
fixed_packages
0
url pkg:nginx/nginx@1.28.2
purl pkg:nginx/nginx@1.28.2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cu7-pyw5-t3dm
1
vulnerability VCID-3czf-dtzg-8kdm
2
vulnerability VCID-fmvd-vyt7-mkfk
3
vulnerability VCID-hemy-pnpj-sfg3
4
vulnerability VCID-kpjx-rrjs-subs
5
vulnerability VCID-sxf9-qr1j-u3et
6
vulnerability VCID-z3xb-4krg-rbae
resource_url http://public2.vulnerablecode.io/packages/pkg:nginx/nginx@1.28.2
1
url pkg:nginx/nginx@1.29.5
purl pkg:nginx/nginx@1.29.5
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cu7-pyw5-t3dm
1
vulnerability VCID-3czf-dtzg-8kdm
2
vulnerability VCID-fmvd-vyt7-mkfk
3
vulnerability VCID-kpjx-rrjs-subs
4
vulnerability VCID-sxf9-qr1j-u3et
5
vulnerability VCID-z3xb-4krg-rbae
resource_url http://public2.vulnerablecode.io/packages/pkg:nginx/nginx@1.29.5
aliases CVE-2026-1642
risk_score 2.6
exploitability 0.5
weighted_severity 5.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-d1c6-dt2p-9kaa
4
url VCID-fmvd-vyt7-mkfk
vulnerability_id VCID-fmvd-vyt7-mkfk
summary Buffer overflow in ngx_http_dav_module
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-27654.json
reference_id
reference_type
scores
0
value 8.2
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-27654.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2026-27654
reference_id
reference_type
scores
0
value 0.00034
scoring_system epss
scoring_elements 0.0984
published_at 2026-04-02T12:55:00Z
1
value 0.00034
scoring_system epss
scoring_elements 0.09867
published_at 2026-04-13T12:55:00Z
2
value 0.00034
scoring_system epss
scoring_elements 0.09861
published_at 2026-04-08T12:55:00Z
3
value 0.00034
scoring_system epss
scoring_elements 0.09914
published_at 2026-04-09T12:55:00Z
4
value 0.00034
scoring_system epss
scoring_elements 0.0992
published_at 2026-04-11T12:55:00Z
5
value 0.00034
scoring_system epss
scoring_elements 0.09883
published_at 2026-04-12T12:55:00Z
6
value 0.00034
scoring_system epss
scoring_elements 0.0989
published_at 2026-04-04T12:55:00Z
7
value 0.00034
scoring_system epss
scoring_elements 0.09789
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2026-27654
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-27654
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-27654
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://my.f5.com/manage/s/article/K000160382
reference_id
reference_type
scores
0
value 8.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H
1
value 8.8
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-03-24T15:14:50Z/
url https://my.f5.com/manage/s/article/K000160382
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2450776
reference_id 2450776
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2450776
6
reference_url https://nvd.nist.gov/vuln/detail/CVE-2026-27654
reference_id CVE-2026-27654
reference_type
scores
url https://nvd.nist.gov/vuln/detail/CVE-2026-27654
7
reference_url https://access.redhat.com/errata/RHSA-2026:6906
reference_id RHSA-2026:6906
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:6906
8
reference_url https://access.redhat.com/errata/RHSA-2026:6907
reference_id RHSA-2026:6907
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:6907
9
reference_url https://access.redhat.com/errata/RHSA-2026:6923
reference_id RHSA-2026:6923
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:6923
10
reference_url https://access.redhat.com/errata/RHSA-2026:7002
reference_id RHSA-2026:7002
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7002
11
reference_url https://access.redhat.com/errata/RHSA-2026:7343
reference_id RHSA-2026:7343
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7343
fixed_packages
0
url pkg:nginx/nginx@1.28.3
purl pkg:nginx/nginx@1.28.3
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-hemy-pnpj-sfg3
resource_url http://public2.vulnerablecode.io/packages/pkg:nginx/nginx@1.28.3
1
url pkg:nginx/nginx@1.29.7
purl pkg:nginx/nginx@1.29.7
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:nginx/nginx@1.29.7
aliases CVE-2026-27654
risk_score 3.7
exploitability 0.5
weighted_severity 7.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-fmvd-vyt7-mkfk
5
url VCID-hemy-pnpj-sfg3
vulnerability_id VCID-hemy-pnpj-sfg3
summary Buffer overread in the ngx_mail_smtp_module
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-53859.json
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-53859.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-53859
reference_id
reference_type
scores
0
value 0.00023
scoring_system epss
scoring_elements 0.06024
published_at 2026-04-02T12:55:00Z
1
value 0.00023
scoring_system epss
scoring_elements 0.06102
published_at 2026-04-13T12:55:00Z
2
value 0.00023
scoring_system epss
scoring_elements 0.06084
published_at 2026-04-08T12:55:00Z
3
value 0.00023
scoring_system epss
scoring_elements 0.06123
published_at 2026-04-09T12:55:00Z
4
value 0.00023
scoring_system epss
scoring_elements 0.06114
published_at 2026-04-11T12:55:00Z
5
value 0.00023
scoring_system epss
scoring_elements 0.06109
published_at 2026-04-12T12:55:00Z
6
value 0.00023
scoring_system epss
scoring_elements 0.06059
published_at 2026-04-04T12:55:00Z
7
value 0.00023
scoring_system epss
scoring_elements 0.06044
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-53859
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-53859
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-53859
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://my.f5.com/manage/s/article/K000152786
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value 6.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-08-13T15:06:23Z/
url https://my.f5.com/manage/s/article/K000152786
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1111138
reference_id 1111138
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1111138
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2388238
reference_id 2388238
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2388238
7
reference_url https://nvd.nist.gov/vuln/detail/CVE-2025-53859
reference_id CVE-2025-53859
reference_type
scores
url https://nvd.nist.gov/vuln/detail/CVE-2025-53859
8
reference_url https://usn.ubuntu.com/7715-1/
reference_id USN-7715-1
reference_type
scores
url https://usn.ubuntu.com/7715-1/
fixed_packages
0
url pkg:nginx/nginx@1.29.1
purl pkg:nginx/nginx@1.29.1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cu7-pyw5-t3dm
1
vulnerability VCID-3czf-dtzg-8kdm
2
vulnerability VCID-d1c6-dt2p-9kaa
3
vulnerability VCID-fmvd-vyt7-mkfk
4
vulnerability VCID-kpjx-rrjs-subs
5
vulnerability VCID-sxf9-qr1j-u3et
6
vulnerability VCID-z3xb-4krg-rbae
resource_url http://public2.vulnerablecode.io/packages/pkg:nginx/nginx@1.29.1
aliases CVE-2025-53859
risk_score 1.6
exploitability 0.5
weighted_severity 3.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-hemy-pnpj-sfg3
6
url VCID-m1y8-m8z6-kyg9
vulnerability_id VCID-m1y8-m8z6-kyg9
summary SPDY heap buffer overflow
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-0133.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-0133.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-0133
reference_id
reference_type
scores
0
value 0.20913
scoring_system epss
scoring_elements 0.95596
published_at 2026-04-01T12:55:00Z
1
value 0.20913
scoring_system epss
scoring_elements 0.95605
published_at 2026-04-02T12:55:00Z
2
value 0.20913
scoring_system epss
scoring_elements 0.9561
published_at 2026-04-04T12:55:00Z
3
value 0.20913
scoring_system epss
scoring_elements 0.95612
published_at 2026-04-07T12:55:00Z
4
value 0.20913
scoring_system epss
scoring_elements 0.95621
published_at 2026-04-08T12:55:00Z
5
value 0.20913
scoring_system epss
scoring_elements 0.95624
published_at 2026-04-09T12:55:00Z
6
value 0.20913
scoring_system epss
scoring_elements 0.95629
published_at 2026-04-12T12:55:00Z
7
value 0.20913
scoring_system epss
scoring_elements 0.95631
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-0133
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0133
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0133
3
reference_url https://mailman.nginx.org/pipermail/nginx-announce/2014/000135.html
reference_id
reference_type
scores
url https://mailman.nginx.org/pipermail/nginx-announce/2014/000135.html
4
reference_url https://nginx.org/download/patch.2014.spdy2.txt
reference_id
reference_type
scores
url https://nginx.org/download/patch.2014.spdy2.txt
5
reference_url https://nginx.org/download/patch.2014.spdy2.txt.asc
reference_id
reference_type
scores
url https://nginx.org/download/patch.2014.spdy2.txt.asc
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1077988
reference_id 1077988
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1077988
7
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=742059
reference_id 742059
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=742059
8
reference_url https://nvd.nist.gov/vuln/detail/CVE-2014-0133
reference_id CVE-2014-0133
reference_type
scores
url https://nvd.nist.gov/vuln/detail/CVE-2014-0133
9
reference_url https://security.gentoo.org/glsa/201406-20
reference_id GLSA-201406-20
reference_type
scores
url https://security.gentoo.org/glsa/201406-20
fixed_packages
0
url pkg:nginx/nginx@1.5.12
purl pkg:nginx/nginx@1.5.12
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cu7-pyw5-t3dm
1
vulnerability VCID-3czf-dtzg-8kdm
2
vulnerability VCID-d1c6-dt2p-9kaa
3
vulnerability VCID-fmvd-vyt7-mkfk
4
vulnerability VCID-hemy-pnpj-sfg3
5
vulnerability VCID-sxf9-qr1j-u3et
6
vulnerability VCID-z3xb-4krg-rbae
resource_url http://public2.vulnerablecode.io/packages/pkg:nginx/nginx@1.5.12
aliases CVE-2014-0133
risk_score 0.1
exploitability 0.5
weighted_severity 0.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-m1y8-m8z6-kyg9
7
url VCID-pmrf-dxst-p7a7
vulnerability_id VCID-pmrf-dxst-p7a7
summary Request line parsing vulnerability
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2013-4547
reference_id
reference_type
scores
0
value 0.90921
scoring_system epss
scoring_elements 0.9963
published_at 2026-04-04T12:55:00Z
1
value 0.90921
scoring_system epss
scoring_elements 0.99629
published_at 2026-04-02T12:55:00Z
2
value 0.90921
scoring_system epss
scoring_elements 0.99632
published_at 2026-04-12T12:55:00Z
3
value 0.90921
scoring_system epss
scoring_elements 0.99633
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2013-4547
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4547
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4547
2
reference_url https://mailman.nginx.org/pipermail/nginx-announce/2013/000125.html
reference_id
reference_type
scores
0
value medium
scoring_system generic_textual
scoring_elements
url https://mailman.nginx.org/pipermail/nginx-announce/2013/000125.html
3
reference_url https://nginx.org/download/patch.2013.space.txt
reference_id
reference_type
scores
url https://nginx.org/download/patch.2013.space.txt
4
reference_url https://nginx.org/download/patch.2013.space.txt.asc
reference_id
reference_type
scores
url https://nginx.org/download/patch.2013.space.txt.asc
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=730012
reference_id 730012
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=730012
6
reference_url https://nvd.nist.gov/vuln/detail/CVE-2013-4547
reference_id CVE-2013-4547
reference_type
scores
url https://nvd.nist.gov/vuln/detail/CVE-2013-4547
7
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/remote/38846.txt
reference_id CVE-2013-4547;OSVDB-100015
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/remote/38846.txt
8
reference_url https://www.securityfocus.com/bid/63814/info
reference_id CVE-2013-4547;OSVDB-100015
reference_type exploit
scores
url https://www.securityfocus.com/bid/63814/info
fixed_packages
0
url pkg:nginx/nginx@1.5.7
purl pkg:nginx/nginx@1.5.7
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cu7-pyw5-t3dm
1
vulnerability VCID-3czf-dtzg-8kdm
2
vulnerability VCID-d1c6-dt2p-9kaa
3
vulnerability VCID-fmvd-vyt7-mkfk
4
vulnerability VCID-hemy-pnpj-sfg3
5
vulnerability VCID-m1y8-m8z6-kyg9
6
vulnerability VCID-sxf9-qr1j-u3et
7
vulnerability VCID-z3xb-4krg-rbae
resource_url http://public2.vulnerablecode.io/packages/pkg:nginx/nginx@1.5.7
aliases CVE-2013-4547
risk_score 7.0
exploitability 2.0
weighted_severity 3.5
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-pmrf-dxst-p7a7
8
url VCID-sxf9-qr1j-u3et
vulnerability_id VCID-sxf9-qr1j-u3et
summary Buffer overflow in the ngx_http_mp4_module
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-27784.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-27784.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2026-27784
reference_id
reference_type
scores
0
value 0.00012
scoring_system epss
scoring_elements 0.01788
published_at 2026-04-02T12:55:00Z
1
value 0.00012
scoring_system epss
scoring_elements 0.01797
published_at 2026-04-13T12:55:00Z
2
value 0.00012
scoring_system epss
scoring_elements 0.01803
published_at 2026-04-08T12:55:00Z
3
value 0.00012
scoring_system epss
scoring_elements 0.01817
published_at 2026-04-09T12:55:00Z
4
value 0.00012
scoring_system epss
scoring_elements 0.0181
published_at 2026-04-11T12:55:00Z
5
value 0.00012
scoring_system epss
scoring_elements 0.01799
published_at 2026-04-12T12:55:00Z
6
value 0.00012
scoring_system epss
scoring_elements 0.018
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2026-27784
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-27784
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-27784
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://my.f5.com/manage/s/article/K000160364
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value 8.5
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-03-25T03:55:53Z/
url https://my.f5.com/manage/s/article/K000160364
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2450785
reference_id 2450785
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2450785
6
reference_url https://nvd.nist.gov/vuln/detail/CVE-2026-27784
reference_id CVE-2026-27784
reference_type
scores
url https://nvd.nist.gov/vuln/detail/CVE-2026-27784
7
reference_url https://access.redhat.com/errata/RHSA-2026:6906
reference_id RHSA-2026:6906
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:6906
8
reference_url https://access.redhat.com/errata/RHSA-2026:6907
reference_id RHSA-2026:6907
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:6907
9
reference_url https://access.redhat.com/errata/RHSA-2026:6923
reference_id RHSA-2026:6923
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:6923
10
reference_url https://access.redhat.com/errata/RHSA-2026:7002
reference_id RHSA-2026:7002
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7002
11
reference_url https://access.redhat.com/errata/RHSA-2026:7343
reference_id RHSA-2026:7343
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7343
fixed_packages
0
url pkg:nginx/nginx@1.28.3
purl pkg:nginx/nginx@1.28.3
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-hemy-pnpj-sfg3
resource_url http://public2.vulnerablecode.io/packages/pkg:nginx/nginx@1.28.3
1
url pkg:nginx/nginx@1.29.7
purl pkg:nginx/nginx@1.29.7
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:nginx/nginx@1.29.7
aliases CVE-2026-27784
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-sxf9-qr1j-u3et
9
url VCID-z3xb-4krg-rbae
vulnerability_id VCID-z3xb-4krg-rbae
summary Buffer overflow in the ngx_http_mp4_module
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-32647.json
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-32647.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2026-32647
reference_id
reference_type
scores
0
value 0.00013
scoring_system epss
scoring_elements 0.02083
published_at 2026-04-02T12:55:00Z
1
value 0.00013
scoring_system epss
scoring_elements 0.02062
published_at 2026-04-13T12:55:00Z
2
value 0.00013
scoring_system epss
scoring_elements 0.02087
published_at 2026-04-08T12:55:00Z
3
value 0.00013
scoring_system epss
scoring_elements 0.02104
published_at 2026-04-09T12:55:00Z
4
value 0.00013
scoring_system epss
scoring_elements 0.02081
published_at 2026-04-11T12:55:00Z
5
value 0.00013
scoring_system epss
scoring_elements 0.02066
published_at 2026-04-12T12:55:00Z
6
value 0.00013
scoring_system epss
scoring_elements 0.02091
published_at 2026-04-04T12:55:00Z
7
value 0.00013
scoring_system epss
scoring_elements 0.02085
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2026-32647
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-32647
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-32647
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://my.f5.com/manage/s/article/K000160366
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value 8.5
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-03-24T14:51:04Z/
url https://my.f5.com/manage/s/article/K000160366
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2449598
reference_id 2449598
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2449598
6
reference_url https://nvd.nist.gov/vuln/detail/CVE-2026-32647
reference_id CVE-2026-32647
reference_type
scores
url https://nvd.nist.gov/vuln/detail/CVE-2026-32647
7
reference_url https://access.redhat.com/errata/RHSA-2026:6906
reference_id RHSA-2026:6906
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:6906
8
reference_url https://access.redhat.com/errata/RHSA-2026:6907
reference_id RHSA-2026:6907
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:6907
9
reference_url https://access.redhat.com/errata/RHSA-2026:6923
reference_id RHSA-2026:6923
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:6923
10
reference_url https://access.redhat.com/errata/RHSA-2026:7002
reference_id RHSA-2026:7002
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7002
11
reference_url https://access.redhat.com/errata/RHSA-2026:7343
reference_id RHSA-2026:7343
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7343
fixed_packages
0
url pkg:nginx/nginx@1.28.3
purl pkg:nginx/nginx@1.28.3
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-hemy-pnpj-sfg3
resource_url http://public2.vulnerablecode.io/packages/pkg:nginx/nginx@1.28.3
1
url pkg:nginx/nginx@1.29.7
purl pkg:nginx/nginx@1.29.7
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:nginx/nginx@1.29.7
aliases CVE-2026-32647
risk_score 3.5
exploitability 0.5
weighted_severity 7.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-z3xb-4krg-rbae
Fixing_vulnerabilities
Risk_score7.0
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:nginx/nginx@1.5.6