Staging Environment: Content and features may be unstable or change without notice.
Search for packages
Package details: pkg:deb/debian/nginx@1.30.0-2?distro=trixie
purl pkg:deb/debian/nginx@1.30.0-2?distro=trixie
Vulnerabilities affecting this package (0)
Vulnerability Summary Fixed by
This package is not known to be affected by vulnerabilities.
Vulnerabilities fixed by this package (59)
Vulnerability Summary Aliases
VCID-22cq-z7km-cfdc SSL session reuse vulnerability CVE-2025-23419
VCID-2cu7-pyw5-t3dm Injection in auth_http and XCLIENT CVE-2026-28753
VCID-36pf-ddpb-3khs security update CVE-2020-11724
VCID-3czf-dtzg-8kdm NULL pointer dereference while using CRAM-MD5 or APOP CVE-2026-27651
VCID-3ysf-pvuu-47bs nginx: HTTP request smuggling in configurations with URL redirect used as error_page CVE-2019-20372
VCID-49q7-zqwm-hqgx Vulnerabilities with Windows directory aliases CVE-2011-4963
VCID-4mqa-bkha-kbaj security update CVE-2012-4929
VCID-5781-s1ny-q7ey CVE-2023-44487
GHSA-2m7v-gc89-fjqf
GHSA-qppj-fm5r-hxr3
GHSA-vx74-f528-fxqg
GHSA-xpw8-rcwv-8f8p
GMS-2023-3377
VSV00013
VCID-64n7-ygvq-cfds Excessive memory usage in HTTP/2 CVE-2018-16843
VCID-8mzu-swrb-sqd8 Buffer overwrite in HTTP/3 CVE-2024-32760
VCID-9hzg-r1fj-pubf Excessive CPU usage in HTTP/2 with priority changes CVE-2019-9513
VCID-9kx7-1dn9-dbdt Stack-based buffer overflow with specially crafted request CVE-2013-2028
VCID-asr7-uwpu-a7a5 STARTTLS command injection CVE-2014-3556
VCID-bana-j1wy-cfdy Excessive CPU usage in HTTP/2 CVE-2018-16844
VCID-c4ta-jqmg-wfgf lua-nginx-module: HTTP request smuggling via a crafted HEAD request CVE-2024-33452
VCID-c9ym-ckeq-63dq Memory corruption in the ngx_http_mp4_module CVE-2022-41741
VCID-cbn4-utmp-n7ba 1-byte memory overwrite in resolver CVE-2021-23017
VCID-cjx4-a19z-xufq Integer overflow in the range filter CVE-2017-7529
VCID-d1c6-dt2p-9kaa SSL upstream injection CVE-2026-1642
VCID-dmv4-ydq9-a7eq Excessive CPU usage in HTTP/2 with small window updates CVE-2019-9511
VCID-e49f-y1ky-5yb4 Insufficient limits of CNAME resolution in resolver CVE-2016-0747
VCID-eb23-pd25-yqg3 Buffer overread in the ngx_http_mp4_module CVE-2024-7347
VCID-fgaf-wqmd-gqf3 nginx http proxy module does not verify peer identity of https origin server which could facilitate man-in-the-middle attack (MITM) CVE-2011-4968
VCID-fmvd-vyt7-mkfk Buffer overflow in ngx_http_dav_module CVE-2026-27654
VCID-g39b-k8vv-kyaq Null pointer dereference vulnerability CVE-2009-3896
VCID-hemy-pnpj-sfg3 Buffer overread in the ngx_mail_smtp_module CVE-2025-53859
VCID-jau7-gfz8-dkfa The renegotiation vulnerability in SSL protocol CVE-2009-3555
GHSA-f7w7-6pjc-wwm6
VU#120541
VCID-jtgk-h6v6-2fgs Use-after-free during CNAME response processing in resolver CVE-2016-0746
VCID-k9vm-jbxf-dbf8 Stack overflow and use-after-free in HTTP/3 CVE-2024-31079
VCID-kcsp-h1s5-wbea Excessive memory usage in HTTP/2 with zero length headers CVE-2019-9516
VCID-kpjx-rrjs-subs OCSP result bypass in stream CVE-2026-28755
VCID-ktxc-d5t4-bkhg Buffer overflow in resolver CVE-2011-4315
VCID-m1y8-m8z6-kyg9 SPDY heap buffer overflow CVE-2014-0133
VCID-m393-anc8-dfgf Buffer overflow in the ngx_http_mp4_module CVE-2012-2089
VCID-mhdp-u59y-2kgw Buffer underflow vulnerability CVE-2009-2629
VU#180065
VCID-n3pn-h7s7-nfd4 Use-after-free in HTTP/3 CVE-2024-24990
VCID-nckn-qkc8-t7ge Memory disclosure in the ngx_http_mp4_module CVE-2018-16845
VCID-p1nx-cfx1-jqh3 SPDY memory corruption CVE-2014-0088
VCID-p933-hxvk-37bk Gentoo's NGINX ebuilds are vulnerable to privilege escalation due to the way log files are handled. CVE-2016-1247
VCID-pchd-6b6f-myds Memory disclosure in HTTP/3 CVE-2024-34161
VCID-pmrf-dxst-p7a7 Request line parsing vulnerability CVE-2013-4547
VCID-pq29-p7wp-bqe3 NULL pointer dereference in HTTP/3 CVE-2024-35200
VCID-qpfs-f882-gqd3 Directory traversal vulnerability in naxsi-ui/nx_extract.py in the Naxsi module before 0.46-1 for Nginx allows local users to read arbitrary files via unspecified vectors. CVE-2012-3380
VCID-qzcz-zvv6-dyda Invalid pointer dereference in resolver CVE-2016-0742
VCID-r6yw-nrv5-aycy Vulnerabilities with Windows file default stream CVE-2010-2263
VCID-rsr7-p977-tycc NULL pointer dereference while writing client request body CVE-2016-4450
VCID-saph-cq2z-ubga NULL pointer dereference in HTTP/3 CVE-2024-24989
VCID-su8w-6wa4-u3gp Vulnerabilities with invalid UTF-8 sequence on Windows CVE-2010-2266
VCID-sxf9-qr1j-u3et Buffer overflow in the ngx_http_mp4_module CVE-2026-27784
VCID-t6gs-g1cq-hqem Directory traversal vulnerability CVE-2009-3898
VCID-u25m-v3f6-23dk Memory disclosure with specially crafted HTTP backend responses CVE-2013-2070
VCID-u8aq-2qhu-gff5 ALPACA: Application Layer Protocol Confusion - Analyzing and Mitigating Cracks in TLS Authentication CVE-2021-3618
VCID-w6nj-1hnj-kbf6 When the NGINX Plus is configured to use the MQTT pre-read module, undisclosed requests can cause an increase in memory resource utilization.  Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated. CVE-2024-39792
VCID-wc3j-5xmu-kyex Memory disclosure in the ngx_http_mp4_module CVE-2022-41742
VCID-wsxq-wqqr-n3ey Memory disclosure with specially crafted backend responses CVE-2012-1180
VCID-x8ck-rceh-ukdw SSL session reuse vulnerability CVE-2014-3616
VCID-y3tg-7fge-1yfy ngx_http_lua_module (aka lua-nginx-module) before 0.10.16 in OpenResty allows unsafe characters in an argument when using the API to mutate a URI, or a request or response header. CVE-2020-36309
VCID-yu2j-f4q9-bbcx nginx: buffer overflow in ngx_gmtime() triggered by 5 digit years CVE-2017-20005
VCID-z3xb-4krg-rbae Buffer overflow in the ngx_http_mp4_module CVE-2026-32647

Date Actor Action Vulnerability Source VulnerableCode Version
2026-04-23T05:41:35.243550+00:00 Debian Importer Fixing VCID-z3xb-4krg-rbae https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-23T05:41:35.185281+00:00 Debian Importer Fixing VCID-kpjx-rrjs-subs https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-23T05:41:35.142589+00:00 Debian Importer Fixing VCID-2cu7-pyw5-t3dm https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-23T05:41:35.083085+00:00 Debian Importer Fixing VCID-sxf9-qr1j-u3et https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-23T05:41:35.018991+00:00 Debian Importer Fixing VCID-fmvd-vyt7-mkfk https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-23T05:41:34.957089+00:00 Debian Importer Fixing VCID-3czf-dtzg-8kdm https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-23T05:41:34.881713+00:00 Debian Importer Fixing VCID-d1c6-dt2p-9kaa https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-23T05:41:34.781185+00:00 Debian Importer Fixing VCID-hemy-pnpj-sfg3 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-23T05:41:34.715793+00:00 Debian Importer Fixing VCID-22cq-z7km-cfdc https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-23T05:41:34.643201+00:00 Debian Importer Fixing VCID-eb23-pd25-yqg3 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-23T05:41:34.578863+00:00 Debian Importer Fixing VCID-w6nj-1hnj-kbf6 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-23T05:41:34.536967+00:00 Debian Importer Fixing VCID-pq29-p7wp-bqe3 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-23T05:41:34.489866+00:00 Debian Importer Fixing VCID-pchd-6b6f-myds https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-23T05:41:34.443390+00:00 Debian Importer Fixing VCID-c4ta-jqmg-wfgf https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-23T05:41:34.394819+00:00 Debian Importer Fixing VCID-8mzu-swrb-sqd8 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-23T05:41:34.343251+00:00 Debian Importer Fixing VCID-k9vm-jbxf-dbf8 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-23T05:41:34.291688+00:00 Debian Importer Fixing VCID-n3pn-h7s7-nfd4 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-23T05:41:34.234942+00:00 Debian Importer Fixing VCID-saph-cq2z-ubga https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-23T05:41:34.166008+00:00 Debian Importer Fixing VCID-5781-s1ny-q7ey https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-23T05:41:34.102898+00:00 Debian Importer Fixing VCID-wc3j-5xmu-kyex https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-23T05:41:34.056630+00:00 Debian Importer Fixing VCID-c9ym-ckeq-63dq https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-23T05:41:34.007780+00:00 Debian Importer Fixing VCID-u8aq-2qhu-gff5 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-23T05:41:33.945736+00:00 Debian Importer Fixing VCID-cbn4-utmp-n7ba https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-23T05:41:33.889569+00:00 Debian Importer Fixing VCID-y3tg-7fge-1yfy https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-23T05:41:33.827965+00:00 Debian Importer Fixing VCID-36pf-ddpb-3khs https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-23T05:41:33.774962+00:00 Debian Importer Fixing VCID-kcsp-h1s5-wbea https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-23T05:41:33.722683+00:00 Debian Importer Fixing VCID-9hzg-r1fj-pubf https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-23T05:41:33.671165+00:00 Debian Importer Fixing VCID-dmv4-ydq9-a7eq https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-23T05:41:33.620050+00:00 Debian Importer Fixing VCID-3ysf-pvuu-47bs https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-23T05:41:33.568106+00:00 Debian Importer Fixing VCID-nckn-qkc8-t7ge https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-23T05:41:33.516772+00:00 Debian Importer Fixing VCID-bana-j1wy-cfdy https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-23T05:41:33.467216+00:00 Debian Importer Fixing VCID-64n7-ygvq-cfds https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-23T05:41:33.416212+00:00 Debian Importer Fixing VCID-cjx4-a19z-xufq https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-23T05:41:33.367366+00:00 Debian Importer Fixing VCID-yu2j-f4q9-bbcx https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-23T05:41:33.323979+00:00 Debian Importer Fixing VCID-rsr7-p977-tycc https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-23T05:41:33.271928+00:00 Debian Importer Fixing VCID-p933-hxvk-37bk https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-23T05:41:33.219958+00:00 Debian Importer Fixing VCID-e49f-y1ky-5yb4 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-23T05:41:33.167299+00:00 Debian Importer Fixing VCID-jtgk-h6v6-2fgs https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-23T05:41:33.112599+00:00 Debian Importer Fixing VCID-qzcz-zvv6-dyda https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-23T05:41:33.060236+00:00 Debian Importer Fixing VCID-x8ck-rceh-ukdw https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-23T05:41:33.008293+00:00 Debian Importer Fixing VCID-asr7-uwpu-a7a5 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-23T05:41:32.958247+00:00 Debian Importer Fixing VCID-m1y8-m8z6-kyg9 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-23T05:41:32.908789+00:00 Debian Importer Fixing VCID-p1nx-cfx1-jqh3 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-23T05:41:32.862344+00:00 Debian Importer Fixing VCID-pmrf-dxst-p7a7 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-23T05:41:32.810285+00:00 Debian Importer Fixing VCID-u25m-v3f6-23dk https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-23T05:41:32.752591+00:00 Debian Importer Fixing VCID-9kx7-1dn9-dbdt https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-23T05:41:32.707225+00:00 Debian Importer Fixing VCID-4mqa-bkha-kbaj https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-23T05:41:32.657655+00:00 Debian Importer Fixing VCID-qpfs-f882-gqd3 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-23T05:41:32.612989+00:00 Debian Importer Fixing VCID-m393-anc8-dfgf https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-23T05:41:32.567959+00:00 Debian Importer Fixing VCID-wsxq-wqqr-n3ey https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-23T05:41:32.518317+00:00 Debian Importer Fixing VCID-fgaf-wqmd-gqf3 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-23T05:41:32.469238+00:00 Debian Importer Fixing VCID-49q7-zqwm-hqgx https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-23T05:41:32.425275+00:00 Debian Importer Fixing VCID-ktxc-d5t4-bkhg https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-23T05:41:32.382730+00:00 Debian Importer Fixing VCID-su8w-6wa4-u3gp https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-23T05:41:32.339888+00:00 Debian Importer Fixing VCID-r6yw-nrv5-aycy https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-23T05:41:32.294507+00:00 Debian Importer Fixing VCID-t6gs-g1cq-hqem https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-23T05:41:32.239642+00:00 Debian Importer Fixing VCID-g39b-k8vv-kyaq https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-23T05:41:32.194525+00:00 Debian Importer Fixing VCID-jau7-gfz8-dkfa https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-23T05:41:32.148835+00:00 Debian Importer Fixing VCID-mhdp-u59y-2kgw https://security-tracker.debian.org/tracker/data/json 38.4.0