{"url":"http://public2.vulnerablecode.io/api/packages/21?format=json","purl":"pkg:nginx/nginx@1.29.6","type":"nginx","namespace":"","name":"nginx","version":"1.29.6","qualifiers":{},"subpath":"","is_vulnerable":true,"next_non_vulnerable_version":"1.30.1","latest_non_vulnerable_version":"1.31.0","affected_by_vulnerabilities":[{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/7?format=json","vulnerability_id":"VCID-2cu7-pyw5-t3dm","summary":"Injection in auth_http and XCLIENT","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-28753.json","reference_id":"","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-28753.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2026-28753","reference_id":"","reference_type":"","scores":[{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.06342","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.06426","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.06375","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.06361","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.06409","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.06451","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.06443","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.06436","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.06367","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.06377","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.06526","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.06538","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.07081","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.07064","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.06828","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.06803","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.0684","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.06994","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.07078","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.07097","published_at":"2026-05-14T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2026-28753"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-28753","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-28753"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://my.f5.com/manage/s/article/K000160367","reference_id":"","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N"},{"value":"6.3","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-03-24T15:24:28Z/"}],"url":"https://my.f5.com/manage/s/article/K000160367"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2450780","reference_id":"2450780","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2450780"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2026-28753","reference_id":"CVE-2026-28753","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/detail/CVE-2026-28753"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:8346","reference_id":"RHSA-2026:8346","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:8346"},{"reference_url":"https://usn.ubuntu.com/8210-1/","reference_id":"USN-8210-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8210-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/22?format=json","purl":"pkg:nginx/nginx@1.29.7","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-6aam-phq6-tqgy"},{"vulnerability":"VCID-b2p7-cfw2-vyes"},{"vulnerability":"VCID-n1ec-fqnv-y3bp"},{"vulnerability":"VCID-n1ud-hzxn-hfg9"},{"vulnerability":"VCID-t4y3-favr-tken"},{"vulnerability":"VCID-ubpk-9a53-syfb"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:nginx/nginx@1.29.7"}],"aliases":["CVE-2026-28753"],"risk_score":1.6,"exploitability":"0.5","weighted_severity":"3.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-2cu7-pyw5-t3dm"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/35?format=json","vulnerability_id":"VCID-3czf-dtzg-8kdm","summary":"NULL pointer dereference while using CRAM-MD5 or APOP","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-27651.json","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-27651.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2026-27651","reference_id":"","reference_type":"","scores":[{"value":"0.00041","scoring_system":"epss","scoring_elements":"0.12662","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00041","scoring_system":"epss","scoring_elements":"0.12533","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00041","scoring_system":"epss","scoring_elements":"0.12704","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00041","scoring_system":"epss","scoring_elements":"0.12516","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00041","scoring_system":"epss","scoring_elements":"0.12594","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00041","scoring_system":"epss","scoring_elements":"0.12645","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00041","scoring_system":"epss","scoring_elements":"0.12613","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00041","scoring_system":"epss","scoring_elements":"0.12573","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00041","scoring_system":"epss","scoring_elements":"0.12438","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00044","scoring_system":"epss","scoring_elements":"0.13315","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00044","scoring_system":"epss","scoring_elements":"0.13228","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00044","scoring_system":"epss","scoring_elements":"0.13308","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00045","scoring_system":"epss","scoring_elements":"0.13754","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00045","scoring_system":"epss","scoring_elements":"0.13783","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00045","scoring_system":"epss","scoring_elements":"0.13878","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00045","scoring_system":"epss","scoring_elements":"0.13609","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00045","scoring_system":"epss","scoring_elements":"0.13513","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00045","scoring_system":"epss","scoring_elements":"0.13669","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00045","scoring_system":"epss","scoring_elements":"0.13751","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00045","scoring_system":"epss","scoring_elements":"0.13702","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2026-27651"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-27651","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-27651"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://my.f5.com/manage/s/article/K000160383","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"8.7","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-03-24T15:02:03Z/"}],"url":"https://my.f5.com/manage/s/article/K000160383"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2450791","reference_id":"2450791","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2450791"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2026-27651","reference_id":"CVE-2026-27651","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/detail/CVE-2026-27651"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:10065","reference_id":"RHSA-2026:10065","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:10065"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:13634","reference_id":"RHSA-2026:13634","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:13634"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:13680","reference_id":"RHSA-2026:13680","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:13680"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:13839","reference_id":"RHSA-2026:13839","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:13839"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:14836","reference_id":"RHSA-2026:14836","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:14836"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:15942","reference_id":"RHSA-2026:15942","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:15942"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:15943","reference_id":"RHSA-2026:15943","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:15943"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:15945","reference_id":"RHSA-2026:15945","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:15945"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:15966","reference_id":"RHSA-2026:15966","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:15966"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:6906","reference_id":"RHSA-2026:6906","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:6906"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:6907","reference_id":"RHSA-2026:6907","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:6907"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:6923","reference_id":"RHSA-2026:6923","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:6923"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:7002","reference_id":"RHSA-2026:7002","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:7002"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:7343","reference_id":"RHSA-2026:7343","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:7343"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:8346","reference_id":"RHSA-2026:8346","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:8346"},{"reference_url":"https://usn.ubuntu.com/8210-1/","reference_id":"USN-8210-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8210-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/22?format=json","purl":"pkg:nginx/nginx@1.29.7","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-6aam-phq6-tqgy"},{"vulnerability":"VCID-b2p7-cfw2-vyes"},{"vulnerability":"VCID-n1ec-fqnv-y3bp"},{"vulnerability":"VCID-n1ud-hzxn-hfg9"},{"vulnerability":"VCID-t4y3-favr-tken"},{"vulnerability":"VCID-ubpk-9a53-syfb"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:nginx/nginx@1.29.7"}],"aliases":["CVE-2026-27651"],"risk_score":3.4,"exploitability":"0.5","weighted_severity":"6.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-3czf-dtzg-8kdm"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/358674?format=json","vulnerability_id":"VCID-6aam-phq6-tqgy","summary":"Buffer overflow in the ngx_http_rewrite_module","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-42945.json","reference_id":"","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-42945.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2026-42945","reference_id":"","reference_type":"","scores":[{"value":"0.00166","scoring_system":"epss","scoring_elements":"0.3722","published_at":"2026-05-14T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2026-42945"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-42945","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-42945"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://my.f5.com/manage/s/article/K000161019","reference_id":"","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"9.2","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-05-13T15:55:27Z/"}],"url":"https://my.f5.com/manage/s/article/K000161019"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2477116","reference_id":"2477116","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2477116"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2026-42945","reference_id":"CVE-2026-42945","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/detail/CVE-2026-42945"},{"reference_url":"https://usn.ubuntu.com/8271-1/","reference_id":"USN-8271-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8271-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1112749?format=json","purl":"pkg:nginx/nginx@1.30.1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:nginx/nginx@1.30.1"},{"url":"http://public2.vulnerablecode.io/api/packages/1112748?format=json","purl":"pkg:nginx/nginx@1.31.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:nginx/nginx@1.31.0"}],"aliases":["CVE-2026-42945"],"risk_score":2.3,"exploitability":"0.5","weighted_severity":"4.6","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-6aam-phq6-tqgy"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/358672?format=json","vulnerability_id":"VCID-b2p7-cfw2-vyes","summary":"resolver use-after-free in OCSP","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2026-40701","reference_id":"","reference_type":"","scores":[{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10405","published_at":"2026-05-14T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2026-40701"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-40701","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-40701"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://my.f5.com/manage/s/article/K000161021","reference_id":"","reference_type":"","scores":[{"value":"4.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L"},{"value":"6.3","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:N/VA:L/SC:N/SI:N/SA:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-05-13T15:55:34Z/"}],"url":"https://my.f5.com/manage/s/article/K000161021"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2026-40701","reference_id":"CVE-2026-40701","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/detail/CVE-2026-40701"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1112749?format=json","purl":"pkg:nginx/nginx@1.30.1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:nginx/nginx@1.30.1"},{"url":"http://public2.vulnerablecode.io/api/packages/1112748?format=json","purl":"pkg:nginx/nginx@1.31.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:nginx/nginx@1.31.0"}],"aliases":["CVE-2026-40701"],"risk_score":1.6,"exploitability":"0.5","weighted_severity":"3.1","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-b2p7-cfw2-vyes"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/8?format=json","vulnerability_id":"VCID-fmvd-vyt7-mkfk","summary":"Buffer overflow in ngx_http_dav_module","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-27654.json","reference_id":"","reference_type":"","scores":[{"value":"8.2","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-27654.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2026-27654","reference_id":"","reference_type":"","scores":[{"value":"0.00034","scoring_system":"epss","scoring_elements":"0.0984","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00034","scoring_system":"epss","scoring_elements":"0.09867","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00034","scoring_system":"epss","scoring_elements":"0.0989","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00034","scoring_system":"epss","scoring_elements":"0.09789","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00034","scoring_system":"epss","scoring_elements":"0.09861","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00034","scoring_system":"epss","scoring_elements":"0.09914","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00034","scoring_system":"epss","scoring_elements":"0.0992","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00034","scoring_system":"epss","scoring_elements":"0.09883","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00034","scoring_system":"epss","scoring_elements":"0.09749","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00034","scoring_system":"epss","scoring_elements":"0.09721","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00034","scoring_system":"epss","scoring_elements":"0.09871","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00034","scoring_system":"epss","scoring_elements":"0.09917","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10379","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10356","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10267","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10211","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10161","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.1031","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10398","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10456","published_at":"2026-05-14T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2026-27654"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-27654","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-27654"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8.2","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://my.f5.com/manage/s/article/K000160382","reference_id":"","reference_type":"","scores":[{"value":"8.2","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H"},{"value":"8.8","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-03-24T15:14:50Z/"}],"url":"https://my.f5.com/manage/s/article/K000160382"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2450776","reference_id":"2450776","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2450776"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2026-27654","reference_id":"CVE-2026-27654","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/detail/CVE-2026-27654"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:10065","reference_id":"RHSA-2026:10065","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:10065"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:13634","reference_id":"RHSA-2026:13634","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:13634"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:13680","reference_id":"RHSA-2026:13680","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:13680"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:13839","reference_id":"RHSA-2026:13839","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:13839"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:14836","reference_id":"RHSA-2026:14836","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:14836"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:15942","reference_id":"RHSA-2026:15942","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:15942"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:15943","reference_id":"RHSA-2026:15943","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:15943"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:15945","reference_id":"RHSA-2026:15945","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:15945"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:15966","reference_id":"RHSA-2026:15966","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:15966"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:6906","reference_id":"RHSA-2026:6906","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:6906"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:6907","reference_id":"RHSA-2026:6907","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:6907"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:6923","reference_id":"RHSA-2026:6923","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:6923"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:7002","reference_id":"RHSA-2026:7002","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:7002"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:7343","reference_id":"RHSA-2026:7343","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:7343"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:8346","reference_id":"RHSA-2026:8346","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:8346"},{"reference_url":"https://usn.ubuntu.com/8210-1/","reference_id":"USN-8210-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8210-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/22?format=json","purl":"pkg:nginx/nginx@1.29.7","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-6aam-phq6-tqgy"},{"vulnerability":"VCID-b2p7-cfw2-vyes"},{"vulnerability":"VCID-n1ec-fqnv-y3bp"},{"vulnerability":"VCID-n1ud-hzxn-hfg9"},{"vulnerability":"VCID-t4y3-favr-tken"},{"vulnerability":"VCID-ubpk-9a53-syfb"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:nginx/nginx@1.29.7"}],"aliases":["CVE-2026-27654"],"risk_score":3.7,"exploitability":"0.5","weighted_severity":"7.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-fmvd-vyt7-mkfk"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/38?format=json","vulnerability_id":"VCID-kpjx-rrjs-subs","summary":"OCSP result bypass in stream","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-28755.json","reference_id":"","reference_type":"","scores":[{"value":"5.4","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-28755.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2026-28755","reference_id":"","reference_type":"","scores":[{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02462","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02475","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02473","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02477","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02497","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02476","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02468","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02467","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02451","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02458","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02563","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.0255","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02744","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02802","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02776","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02792","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02828","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02836","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02837","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02869","published_at":"2026-05-14T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2026-28755"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-28755","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-28755"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://my.f5.com/manage/s/article/K000160368","reference_id":"","reference_type":"","scores":[],"url":"https://my.f5.com/manage/s/article/K000160368"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2450779","reference_id":"2450779","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2450779"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2026-28755","reference_id":"CVE-2026-28755","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/detail/CVE-2026-28755"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:8346","reference_id":"RHSA-2026:8346","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:8346"},{"reference_url":"https://usn.ubuntu.com/8210-1/","reference_id":"USN-8210-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8210-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/22?format=json","purl":"pkg:nginx/nginx@1.29.7","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-6aam-phq6-tqgy"},{"vulnerability":"VCID-b2p7-cfw2-vyes"},{"vulnerability":"VCID-n1ec-fqnv-y3bp"},{"vulnerability":"VCID-n1ud-hzxn-hfg9"},{"vulnerability":"VCID-t4y3-favr-tken"},{"vulnerability":"VCID-ubpk-9a53-syfb"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:nginx/nginx@1.29.7"}],"aliases":["CVE-2026-28755"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"4.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-kpjx-rrjs-subs"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/358675?format=json","vulnerability_id":"VCID-n1ec-fqnv-y3bp","summary":"HTTP/3 address spoofing","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2026-40460","reference_id":"","reference_type":"","scores":[{"value":"0.0002","scoring_system":"epss","scoring_elements":"0.05641","published_at":"2026-05-14T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2026-40460"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://my.f5.com/manage/s/article/K000161068","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L"},{"value":"6.9","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:L/SC:N/SI:N/SA:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-05-13T15:54:59Z/"}],"url":"https://my.f5.com/manage/s/article/K000161068"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2026-40460","reference_id":"CVE-2026-40460","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/detail/CVE-2026-40460"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1112749?format=json","purl":"pkg:nginx/nginx@1.30.1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:nginx/nginx@1.30.1"},{"url":"http://public2.vulnerablecode.io/api/packages/1112748?format=json","purl":"pkg:nginx/nginx@1.31.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:nginx/nginx@1.31.0"}],"aliases":["CVE-2026-40460"],"risk_score":1.8,"exploitability":"0.5","weighted_severity":"3.5","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-n1ec-fqnv-y3bp"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/358671?format=json","vulnerability_id":"VCID-n1ud-hzxn-hfg9","summary":"Buffer overread in the ngx_http_scgi_module and ngx_http_uwsgi_module","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2026-42946","reference_id":"","reference_type":"","scores":[{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14774","published_at":"2026-05-14T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2026-42946"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-42946","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-42946"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://my.f5.com/manage/s/article/K000161027","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:L"},{"value":"8.3","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:N/VA:L/SC:N/SI:N/SA:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-05-13T15:55:04Z/"}],"url":"https://my.f5.com/manage/s/article/K000161027"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2026-42946","reference_id":"CVE-2026-42946","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/detail/CVE-2026-42946"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1112749?format=json","purl":"pkg:nginx/nginx@1.30.1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:nginx/nginx@1.30.1"},{"url":"http://public2.vulnerablecode.io/api/packages/1112748?format=json","purl":"pkg:nginx/nginx@1.31.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:nginx/nginx@1.31.0"}],"aliases":["CVE-2026-42946"],"risk_score":2.1,"exploitability":"0.5","weighted_severity":"4.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-n1ud-hzxn-hfg9"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/43?format=json","vulnerability_id":"VCID-sxf9-qr1j-u3et","summary":"Buffer overflow in the ngx_http_mp4_module","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-27784.json","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-27784.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2026-27784","reference_id":"","reference_type":"","scores":[{"value":"0.00011","scoring_system":"epss","scoring_elements":"0.01445","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00011","scoring_system":"epss","scoring_elements":"0.0136","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00011","scoring_system":"epss","scoring_elements":"0.01368","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00011","scoring_system":"epss","scoring_elements":"0.01462","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00011","scoring_system":"epss","scoring_elements":"0.0147","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00011","scoring_system":"epss","scoring_elements":"0.01461","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00011","scoring_system":"epss","scoring_elements":"0.01455","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00011","scoring_system":"epss","scoring_elements":"0.01449","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01817","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01799","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01797","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01786","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01784","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01788","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.018","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01803","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.0181","published_at":"2026-04-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2026-27784"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-27784","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-27784"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://my.f5.com/manage/s/article/K000160364","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"8.5","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-03-25T03:55:53Z/"}],"url":"https://my.f5.com/manage/s/article/K000160364"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2450785","reference_id":"2450785","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2450785"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2026-27784","reference_id":"CVE-2026-27784","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/detail/CVE-2026-27784"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:10065","reference_id":"RHSA-2026:10065","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:10065"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:13634","reference_id":"RHSA-2026:13634","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:13634"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:13680","reference_id":"RHSA-2026:13680","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:13680"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:13839","reference_id":"RHSA-2026:13839","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:13839"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:14836","reference_id":"RHSA-2026:14836","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:14836"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:15942","reference_id":"RHSA-2026:15942","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:15942"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:15943","reference_id":"RHSA-2026:15943","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:15943"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:15945","reference_id":"RHSA-2026:15945","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:15945"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:15966","reference_id":"RHSA-2026:15966","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:15966"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:6906","reference_id":"RHSA-2026:6906","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:6906"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:6907","reference_id":"RHSA-2026:6907","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:6907"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:6923","reference_id":"RHSA-2026:6923","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:6923"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:7002","reference_id":"RHSA-2026:7002","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:7002"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:7343","reference_id":"RHSA-2026:7343","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:7343"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:8346","reference_id":"RHSA-2026:8346","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:8346"},{"reference_url":"https://usn.ubuntu.com/8210-1/","reference_id":"USN-8210-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8210-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/22?format=json","purl":"pkg:nginx/nginx@1.29.7","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-6aam-phq6-tqgy"},{"vulnerability":"VCID-b2p7-cfw2-vyes"},{"vulnerability":"VCID-n1ec-fqnv-y3bp"},{"vulnerability":"VCID-n1ud-hzxn-hfg9"},{"vulnerability":"VCID-t4y3-favr-tken"},{"vulnerability":"VCID-ubpk-9a53-syfb"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:nginx/nginx@1.29.7"}],"aliases":["CVE-2026-27784"],"risk_score":3.4,"exploitability":"0.5","weighted_severity":"6.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-sxf9-qr1j-u3et"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/358673?format=json","vulnerability_id":"VCID-t4y3-favr-tken","summary":"HTTP/2 request injection in the ngx_http_proxy_module","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2026-42926","reference_id":"","reference_type":"","scores":[{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04118","published_at":"2026-05-14T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2026-42926"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://my.f5.com/manage/s/article/K000161131","reference_id":"","reference_type":"","scores":[{"value":"5.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N"},{"value":"6.3","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:N/SC:N/SI:L/SA:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-05-13T15:54:52Z/"}],"url":"https://my.f5.com/manage/s/article/K000161131"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2026-42926","reference_id":"CVE-2026-42926","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/detail/CVE-2026-42926"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1112749?format=json","purl":"pkg:nginx/nginx@1.30.1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:nginx/nginx@1.30.1"},{"url":"http://public2.vulnerablecode.io/api/packages/1112748?format=json","purl":"pkg:nginx/nginx@1.31.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:nginx/nginx@1.31.0"}],"aliases":["CVE-2026-42926"],"risk_score":1.6,"exploitability":"0.5","weighted_severity":"3.1","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-t4y3-favr-tken"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/358670?format=json","vulnerability_id":"VCID-ubpk-9a53-syfb","summary":"Buffer overread in the ngx_http_charset_module","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2026-42934","reference_id":"","reference_type":"","scores":[{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10405","published_at":"2026-05-14T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2026-42934"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-42934","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-42934"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://my.f5.com/manage/s/article/K000161028","reference_id":"","reference_type":"","scores":[{"value":"4.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L"},{"value":"6.3","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:N/VA:L/SC:N/SI:N/SA:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-05-13T15:55:18Z/"}],"url":"https://my.f5.com/manage/s/article/K000161028"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2026-42934","reference_id":"CVE-2026-42934","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/detail/CVE-2026-42934"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1112749?format=json","purl":"pkg:nginx/nginx@1.30.1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:nginx/nginx@1.30.1"},{"url":"http://public2.vulnerablecode.io/api/packages/1112748?format=json","purl":"pkg:nginx/nginx@1.31.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:nginx/nginx@1.31.0"}],"aliases":["CVE-2026-42934"],"risk_score":1.6,"exploitability":"0.5","weighted_severity":"3.1","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ubpk-9a53-syfb"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/11?format=json","vulnerability_id":"VCID-z3xb-4krg-rbae","summary":"Buffer overflow in the ngx_http_mp4_module","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-32647.json","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-32647.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2026-32647","reference_id":"","reference_type":"","scores":[{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02083","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02093","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02088","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02084","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02108","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02107","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02091","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02085","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02087","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02104","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02081","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02066","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02062","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02037","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.0205","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.01975","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.0196","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02105","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02132","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2026-32647"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-32647","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-32647"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://my.f5.com/manage/s/article/K000160366","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"8.5","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-03-24T14:51:04Z/"}],"url":"https://my.f5.com/manage/s/article/K000160366"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2449598","reference_id":"2449598","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2449598"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2026-32647","reference_id":"CVE-2026-32647","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/detail/CVE-2026-32647"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:10065","reference_id":"RHSA-2026:10065","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:10065"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:13634","reference_id":"RHSA-2026:13634","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:13634"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:13680","reference_id":"RHSA-2026:13680","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:13680"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:13839","reference_id":"RHSA-2026:13839","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:13839"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:14836","reference_id":"RHSA-2026:14836","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:14836"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:15942","reference_id":"RHSA-2026:15942","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:15942"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:15943","reference_id":"RHSA-2026:15943","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:15943"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:15945","reference_id":"RHSA-2026:15945","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:15945"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:15966","reference_id":"RHSA-2026:15966","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:15966"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:6906","reference_id":"RHSA-2026:6906","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:6906"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:6907","reference_id":"RHSA-2026:6907","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:6907"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:6923","reference_id":"RHSA-2026:6923","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:6923"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:7002","reference_id":"RHSA-2026:7002","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:7002"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:7343","reference_id":"RHSA-2026:7343","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:7343"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:8346","reference_id":"RHSA-2026:8346","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:8346"},{"reference_url":"https://usn.ubuntu.com/8210-1/","reference_id":"USN-8210-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8210-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/22?format=json","purl":"pkg:nginx/nginx@1.29.7","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-6aam-phq6-tqgy"},{"vulnerability":"VCID-b2p7-cfw2-vyes"},{"vulnerability":"VCID-n1ec-fqnv-y3bp"},{"vulnerability":"VCID-n1ud-hzxn-hfg9"},{"vulnerability":"VCID-t4y3-favr-tken"},{"vulnerability":"VCID-ubpk-9a53-syfb"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:nginx/nginx@1.29.7"}],"aliases":["CVE-2026-32647"],"risk_score":3.5,"exploitability":"0.5","weighted_severity":"7.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-z3xb-4krg-rbae"}],"fixing_vulnerabilities":[],"risk_score":"3.7","resource_url":"http://public2.vulnerablecode.io/packages/pkg:nginx/nginx@1.29.6"}