Lookup for vulnerable packages by Package URL.

Purlpkg:nginx/nginx@1.0.9
Typenginx
Namespace
Namenginx
Version1.0.9
Qualifiers
Subpath
Is_vulnerabletrue
Next_non_vulnerable_version1.29.7
Latest_non_vulnerable_version1.29.7
Affected_by_vulnerabilities
0
url VCID-2cu7-pyw5-t3dm
vulnerability_id VCID-2cu7-pyw5-t3dm
summary Injection in auth_http and XCLIENT
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-28753.json
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-28753.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2026-28753
reference_id
reference_type
scores
0
value 0.00024
scoring_system epss
scoring_elements 0.06342
published_at 2026-04-02T12:55:00Z
1
value 0.00024
scoring_system epss
scoring_elements 0.06426
published_at 2026-04-13T12:55:00Z
2
value 0.00024
scoring_system epss
scoring_elements 0.06409
published_at 2026-04-08T12:55:00Z
3
value 0.00024
scoring_system epss
scoring_elements 0.06451
published_at 2026-04-09T12:55:00Z
4
value 0.00024
scoring_system epss
scoring_elements 0.06443
published_at 2026-04-11T12:55:00Z
5
value 0.00024
scoring_system epss
scoring_elements 0.06436
published_at 2026-04-12T12:55:00Z
6
value 0.00024
scoring_system epss
scoring_elements 0.06375
published_at 2026-04-04T12:55:00Z
7
value 0.00024
scoring_system epss
scoring_elements 0.06361
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2026-28753
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-28753
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-28753
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://my.f5.com/manage/s/article/K000160367
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value 6.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-03-24T15:24:28Z/
url https://my.f5.com/manage/s/article/K000160367
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2450780
reference_id 2450780
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2450780
6
reference_url https://nvd.nist.gov/vuln/detail/CVE-2026-28753
reference_id CVE-2026-28753
reference_type
scores
url https://nvd.nist.gov/vuln/detail/CVE-2026-28753
fixed_packages
0
url pkg:nginx/nginx@1.28.3
purl pkg:nginx/nginx@1.28.3
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-hemy-pnpj-sfg3
resource_url http://public2.vulnerablecode.io/packages/pkg:nginx/nginx@1.28.3
1
url pkg:nginx/nginx@1.29.7
purl pkg:nginx/nginx@1.29.7
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:nginx/nginx@1.29.7
aliases CVE-2026-28753
risk_score 1.6
exploitability 0.5
weighted_severity 3.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-2cu7-pyw5-t3dm
1
url VCID-3czf-dtzg-8kdm
vulnerability_id VCID-3czf-dtzg-8kdm
summary NULL pointer dereference while using CRAM-MD5 or APOP
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-27651.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-27651.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2026-27651
reference_id
reference_type
scores
0
value 0.00041
scoring_system epss
scoring_elements 0.12662
published_at 2026-04-02T12:55:00Z
1
value 0.00041
scoring_system epss
scoring_elements 0.12533
published_at 2026-04-13T12:55:00Z
2
value 0.00041
scoring_system epss
scoring_elements 0.12594
published_at 2026-04-08T12:55:00Z
3
value 0.00041
scoring_system epss
scoring_elements 0.12645
published_at 2026-04-09T12:55:00Z
4
value 0.00041
scoring_system epss
scoring_elements 0.12613
published_at 2026-04-11T12:55:00Z
5
value 0.00041
scoring_system epss
scoring_elements 0.12573
published_at 2026-04-12T12:55:00Z
6
value 0.00041
scoring_system epss
scoring_elements 0.12704
published_at 2026-04-04T12:55:00Z
7
value 0.00041
scoring_system epss
scoring_elements 0.12516
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2026-27651
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-27651
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-27651
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://my.f5.com/manage/s/article/K000160383
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value 8.7
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-03-24T15:02:03Z/
url https://my.f5.com/manage/s/article/K000160383
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2450791
reference_id 2450791
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2450791
6
reference_url https://nvd.nist.gov/vuln/detail/CVE-2026-27651
reference_id CVE-2026-27651
reference_type
scores
url https://nvd.nist.gov/vuln/detail/CVE-2026-27651
7
reference_url https://access.redhat.com/errata/RHSA-2026:6906
reference_id RHSA-2026:6906
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:6906
8
reference_url https://access.redhat.com/errata/RHSA-2026:6907
reference_id RHSA-2026:6907
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:6907
9
reference_url https://access.redhat.com/errata/RHSA-2026:6923
reference_id RHSA-2026:6923
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:6923
10
reference_url https://access.redhat.com/errata/RHSA-2026:7002
reference_id RHSA-2026:7002
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7002
11
reference_url https://access.redhat.com/errata/RHSA-2026:7343
reference_id RHSA-2026:7343
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7343
fixed_packages
0
url pkg:nginx/nginx@1.28.3
purl pkg:nginx/nginx@1.28.3
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-hemy-pnpj-sfg3
resource_url http://public2.vulnerablecode.io/packages/pkg:nginx/nginx@1.28.3
1
url pkg:nginx/nginx@1.29.7
purl pkg:nginx/nginx@1.29.7
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:nginx/nginx@1.29.7
aliases CVE-2026-27651
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-3czf-dtzg-8kdm
2
url VCID-fmvd-vyt7-mkfk
vulnerability_id VCID-fmvd-vyt7-mkfk
summary Buffer overflow in ngx_http_dav_module
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-27654.json
reference_id
reference_type
scores
0
value 8.2
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-27654.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2026-27654
reference_id
reference_type
scores
0
value 0.00034
scoring_system epss
scoring_elements 0.0984
published_at 2026-04-02T12:55:00Z
1
value 0.00034
scoring_system epss
scoring_elements 0.09867
published_at 2026-04-13T12:55:00Z
2
value 0.00034
scoring_system epss
scoring_elements 0.09861
published_at 2026-04-08T12:55:00Z
3
value 0.00034
scoring_system epss
scoring_elements 0.09914
published_at 2026-04-09T12:55:00Z
4
value 0.00034
scoring_system epss
scoring_elements 0.0992
published_at 2026-04-11T12:55:00Z
5
value 0.00034
scoring_system epss
scoring_elements 0.09883
published_at 2026-04-12T12:55:00Z
6
value 0.00034
scoring_system epss
scoring_elements 0.0989
published_at 2026-04-04T12:55:00Z
7
value 0.00034
scoring_system epss
scoring_elements 0.09789
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2026-27654
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-27654
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-27654
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://my.f5.com/manage/s/article/K000160382
reference_id
reference_type
scores
0
value 8.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H
1
value 8.8
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-03-24T15:14:50Z/
url https://my.f5.com/manage/s/article/K000160382
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2450776
reference_id 2450776
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2450776
6
reference_url https://nvd.nist.gov/vuln/detail/CVE-2026-27654
reference_id CVE-2026-27654
reference_type
scores
url https://nvd.nist.gov/vuln/detail/CVE-2026-27654
7
reference_url https://access.redhat.com/errata/RHSA-2026:6906
reference_id RHSA-2026:6906
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:6906
8
reference_url https://access.redhat.com/errata/RHSA-2026:6907
reference_id RHSA-2026:6907
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:6907
9
reference_url https://access.redhat.com/errata/RHSA-2026:6923
reference_id RHSA-2026:6923
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:6923
10
reference_url https://access.redhat.com/errata/RHSA-2026:7002
reference_id RHSA-2026:7002
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7002
11
reference_url https://access.redhat.com/errata/RHSA-2026:7343
reference_id RHSA-2026:7343
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7343
fixed_packages
0
url pkg:nginx/nginx@1.28.3
purl pkg:nginx/nginx@1.28.3
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-hemy-pnpj-sfg3
resource_url http://public2.vulnerablecode.io/packages/pkg:nginx/nginx@1.28.3
1
url pkg:nginx/nginx@1.29.7
purl pkg:nginx/nginx@1.29.7
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:nginx/nginx@1.29.7
aliases CVE-2026-27654
risk_score 3.7
exploitability 0.5
weighted_severity 7.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-fmvd-vyt7-mkfk
3
url VCID-hemy-pnpj-sfg3
vulnerability_id VCID-hemy-pnpj-sfg3
summary Buffer overread in the ngx_mail_smtp_module
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-53859.json
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-53859.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-53859
reference_id
reference_type
scores
0
value 0.00023
scoring_system epss
scoring_elements 0.06024
published_at 2026-04-02T12:55:00Z
1
value 0.00023
scoring_system epss
scoring_elements 0.06102
published_at 2026-04-13T12:55:00Z
2
value 0.00023
scoring_system epss
scoring_elements 0.06084
published_at 2026-04-08T12:55:00Z
3
value 0.00023
scoring_system epss
scoring_elements 0.06123
published_at 2026-04-09T12:55:00Z
4
value 0.00023
scoring_system epss
scoring_elements 0.06114
published_at 2026-04-11T12:55:00Z
5
value 0.00023
scoring_system epss
scoring_elements 0.06109
published_at 2026-04-12T12:55:00Z
6
value 0.00023
scoring_system epss
scoring_elements 0.06059
published_at 2026-04-04T12:55:00Z
7
value 0.00023
scoring_system epss
scoring_elements 0.06044
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-53859
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-53859
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-53859
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://my.f5.com/manage/s/article/K000152786
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value 6.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-08-13T15:06:23Z/
url https://my.f5.com/manage/s/article/K000152786
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1111138
reference_id 1111138
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1111138
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2388238
reference_id 2388238
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2388238
7
reference_url https://nvd.nist.gov/vuln/detail/CVE-2025-53859
reference_id CVE-2025-53859
reference_type
scores
url https://nvd.nist.gov/vuln/detail/CVE-2025-53859
8
reference_url https://usn.ubuntu.com/7715-1/
reference_id USN-7715-1
reference_type
scores
url https://usn.ubuntu.com/7715-1/
fixed_packages
0
url pkg:nginx/nginx@1.29.1
purl pkg:nginx/nginx@1.29.1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cu7-pyw5-t3dm
1
vulnerability VCID-3czf-dtzg-8kdm
2
vulnerability VCID-d1c6-dt2p-9kaa
3
vulnerability VCID-fmvd-vyt7-mkfk
4
vulnerability VCID-kpjx-rrjs-subs
5
vulnerability VCID-sxf9-qr1j-u3et
6
vulnerability VCID-z3xb-4krg-rbae
resource_url http://public2.vulnerablecode.io/packages/pkg:nginx/nginx@1.29.1
aliases CVE-2025-53859
risk_score 1.6
exploitability 0.5
weighted_severity 3.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-hemy-pnpj-sfg3
4
url VCID-ktxc-d5t4-bkhg
vulnerability_id VCID-ktxc-d5t4-bkhg
summary Buffer overflow in resolver
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2011-4315
reference_id
reference_type
scores
0
value 0.02811
scoring_system epss
scoring_elements 0.8607
published_at 2026-04-01T12:55:00Z
1
value 0.02811
scoring_system epss
scoring_elements 0.8608
published_at 2026-04-02T12:55:00Z
2
value 0.02811
scoring_system epss
scoring_elements 0.86096
published_at 2026-04-07T12:55:00Z
3
value 0.02811
scoring_system epss
scoring_elements 0.86114
published_at 2026-04-08T12:55:00Z
4
value 0.02811
scoring_system epss
scoring_elements 0.86126
published_at 2026-04-09T12:55:00Z
5
value 0.02811
scoring_system epss
scoring_elements 0.8614
published_at 2026-04-11T12:55:00Z
6
value 0.02811
scoring_system epss
scoring_elements 0.86139
published_at 2026-04-12T12:55:00Z
7
value 0.02811
scoring_system epss
scoring_elements 0.86135
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2011-4315
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4315
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4315
2
reference_url https://nvd.nist.gov/vuln/detail/CVE-2011-4315
reference_id CVE-2011-4315
reference_type
scores
url https://nvd.nist.gov/vuln/detail/CVE-2011-4315
3
reference_url https://security.gentoo.org/glsa/201203-22
reference_id GLSA-201203-22
reference_type
scores
url https://security.gentoo.org/glsa/201203-22
fixed_packages
0
url pkg:nginx/nginx@1.0.10
purl pkg:nginx/nginx@1.0.10
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cu7-pyw5-t3dm
1
vulnerability VCID-3czf-dtzg-8kdm
2
vulnerability VCID-fmvd-vyt7-mkfk
3
vulnerability VCID-hemy-pnpj-sfg3
4
vulnerability VCID-m393-anc8-dfgf
5
vulnerability VCID-wsxq-wqqr-n3ey
resource_url http://public2.vulnerablecode.io/packages/pkg:nginx/nginx@1.0.10
1
url pkg:nginx/nginx@1.1.8
purl pkg:nginx/nginx@1.1.8
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cu7-pyw5-t3dm
1
vulnerability VCID-3czf-dtzg-8kdm
2
vulnerability VCID-fmvd-vyt7-mkfk
3
vulnerability VCID-hemy-pnpj-sfg3
4
vulnerability VCID-m393-anc8-dfgf
5
vulnerability VCID-wsxq-wqqr-n3ey
resource_url http://public2.vulnerablecode.io/packages/pkg:nginx/nginx@1.1.8
aliases CVE-2011-4315
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ktxc-d5t4-bkhg
5
url VCID-m393-anc8-dfgf
vulnerability_id VCID-m393-anc8-dfgf
summary Buffer overflow in the ngx_http_mp4_module
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2012-2089
reference_id
reference_type
scores
0
value 0.05317
scoring_system epss
scoring_elements 0.89995
published_at 2026-04-01T12:55:00Z
1
value 0.05317
scoring_system epss
scoring_elements 0.89998
published_at 2026-04-02T12:55:00Z
2
value 0.05317
scoring_system epss
scoring_elements 0.9001
published_at 2026-04-04T12:55:00Z
3
value 0.05317
scoring_system epss
scoring_elements 0.90015
published_at 2026-04-07T12:55:00Z
4
value 0.05317
scoring_system epss
scoring_elements 0.90031
published_at 2026-04-08T12:55:00Z
5
value 0.05317
scoring_system epss
scoring_elements 0.90037
published_at 2026-04-09T12:55:00Z
6
value 0.05317
scoring_system epss
scoring_elements 0.90045
published_at 2026-04-11T12:55:00Z
7
value 0.05317
scoring_system epss
scoring_elements 0.90044
published_at 2026-04-12T12:55:00Z
8
value 0.05317
scoring_system epss
scoring_elements 0.90038
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2012-2089
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2089
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2089
2
reference_url https://mailman.nginx.org/pipermail/nginx-announce/2012/000080.html
reference_id
reference_type
scores
url https://mailman.nginx.org/pipermail/nginx-announce/2012/000080.html
3
reference_url https://nginx.org/download/patch.2012.mp4.txt
reference_id
reference_type
scores
url https://nginx.org/download/patch.2012.mp4.txt
4
reference_url https://nginx.org/download/patch.2012.mp4.txt.asc
reference_id
reference_type
scores
url https://nginx.org/download/patch.2012.mp4.txt.asc
5
reference_url https://nvd.nist.gov/vuln/detail/CVE-2012-2089
reference_id CVE-2012-2089
reference_type
scores
url https://nvd.nist.gov/vuln/detail/CVE-2012-2089
6
reference_url https://security.gentoo.org/glsa/201206-07
reference_id GLSA-201206-07
reference_type
scores
url https://security.gentoo.org/glsa/201206-07
fixed_packages
0
url pkg:nginx/nginx@1.0.15
purl pkg:nginx/nginx@1.0.15
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cu7-pyw5-t3dm
1
vulnerability VCID-3czf-dtzg-8kdm
2
vulnerability VCID-c9ym-ckeq-63dq
3
vulnerability VCID-fmvd-vyt7-mkfk
4
vulnerability VCID-hemy-pnpj-sfg3
5
vulnerability VCID-nckn-qkc8-t7ge
6
vulnerability VCID-wc3j-5xmu-kyex
resource_url http://public2.vulnerablecode.io/packages/pkg:nginx/nginx@1.0.15
1
url pkg:nginx/nginx@1.1.19
purl pkg:nginx/nginx@1.1.19
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cu7-pyw5-t3dm
1
vulnerability VCID-3czf-dtzg-8kdm
2
vulnerability VCID-fmvd-vyt7-mkfk
3
vulnerability VCID-hemy-pnpj-sfg3
4
vulnerability VCID-sxf9-qr1j-u3et
5
vulnerability VCID-z3xb-4krg-rbae
resource_url http://public2.vulnerablecode.io/packages/pkg:nginx/nginx@1.1.19
aliases CVE-2012-2089
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-m393-anc8-dfgf
6
url VCID-wsxq-wqqr-n3ey
vulnerability_id VCID-wsxq-wqqr-n3ey
summary Memory disclosure with specially crafted backend responses
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2012-1180
reference_id
reference_type
scores
0
value 0.03062
scoring_system epss
scoring_elements 0.86659
published_at 2026-04-01T12:55:00Z
1
value 0.03062
scoring_system epss
scoring_elements 0.86669
published_at 2026-04-02T12:55:00Z
2
value 0.03062
scoring_system epss
scoring_elements 0.86688
published_at 2026-04-04T12:55:00Z
3
value 0.03062
scoring_system epss
scoring_elements 0.86687
published_at 2026-04-07T12:55:00Z
4
value 0.03062
scoring_system epss
scoring_elements 0.86706
published_at 2026-04-08T12:55:00Z
5
value 0.03062
scoring_system epss
scoring_elements 0.86716
published_at 2026-04-09T12:55:00Z
6
value 0.03062
scoring_system epss
scoring_elements 0.86729
published_at 2026-04-11T12:55:00Z
7
value 0.03062
scoring_system epss
scoring_elements 0.86727
published_at 2026-04-12T12:55:00Z
8
value 0.03062
scoring_system epss
scoring_elements 0.8672
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2012-1180
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1180
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1180
2
reference_url https://mailman.nginx.org/pipermail/nginx-announce/2012/000076.html
reference_id
reference_type
scores
url https://mailman.nginx.org/pipermail/nginx-announce/2012/000076.html
3
reference_url https://nginx.org/download/patch.2012.memory.txt
reference_id
reference_type
scores
url https://nginx.org/download/patch.2012.memory.txt
4
reference_url https://nginx.org/download/patch.2012.memory.txt.asc
reference_id
reference_type
scores
url https://nginx.org/download/patch.2012.memory.txt.asc
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=664137
reference_id 664137
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=664137
6
reference_url https://nvd.nist.gov/vuln/detail/CVE-2012-1180
reference_id CVE-2012-1180
reference_type
scores
url https://nvd.nist.gov/vuln/detail/CVE-2012-1180
7
reference_url https://security.gentoo.org/glsa/201203-22
reference_id GLSA-201203-22
reference_type
scores
url https://security.gentoo.org/glsa/201203-22
fixed_packages
0
url pkg:nginx/nginx@1.0.14
purl pkg:nginx/nginx@1.0.14
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cu7-pyw5-t3dm
1
vulnerability VCID-3czf-dtzg-8kdm
2
vulnerability VCID-fmvd-vyt7-mkfk
3
vulnerability VCID-hemy-pnpj-sfg3
4
vulnerability VCID-m393-anc8-dfgf
resource_url http://public2.vulnerablecode.io/packages/pkg:nginx/nginx@1.0.14
1
url pkg:nginx/nginx@1.1.17
purl pkg:nginx/nginx@1.1.17
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cu7-pyw5-t3dm
1
vulnerability VCID-3czf-dtzg-8kdm
2
vulnerability VCID-fmvd-vyt7-mkfk
3
vulnerability VCID-hemy-pnpj-sfg3
4
vulnerability VCID-m393-anc8-dfgf
resource_url http://public2.vulnerablecode.io/packages/pkg:nginx/nginx@1.1.17
aliases CVE-2012-1180
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-wsxq-wqqr-n3ey
Fixing_vulnerabilities
Risk_score3.7
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:nginx/nginx@1.0.9