Search for packages
purl | pkg:deb/debian/nginx@1.22.1-9%2Bdeb12u2 |
Vulnerability | Summary | Fixed by |
---|---|---|
VCID-6y3x-kyj7-aaaf
Aliases: CVE-2023-44487 GHSA-qppj-fm5r-hxr3 VSV00013 |
The HTTP/2 protocol allows a denial of service (server resource consumption) because request cancellation can reset many streams quickly, as exploited in the wild in August through October 2023. |
Affected by 0 other vulnerabilities. Affected by 0 other vulnerabilities. Affected by 0 other vulnerabilities. Affected by 0 other vulnerabilities. Affected by 0 other vulnerabilities. Affected by 0 other vulnerabilities. |
Vulnerability | Summary | Aliases |
---|---|---|
VCID-5m3h-b4yf-63ew | An issue in OpenResty lua-nginx-module v.0.10.26 and before allows a remote attacker to conduct HTTP request smuggling via a crafted HEAD request. |
CVE-2024-33452
|
VCID-6y3x-kyj7-aaaf | The HTTP/2 protocol allows a denial of service (server resource consumption) because request cancellation can reset many streams quickly, as exploited in the wild in August through October 2023. |
CVE-2023-44487
GHSA-qppj-fm5r-hxr3 VSV00013 |
VCID-c9xc-nm4d-aaar | Buffer overread in the ngx_http_mp4_module |
CVE-2024-7347
|
VCID-cza3-95cy-aaaj | ngx_http_lua_module (aka lua-nginx-module) before 0.10.16 in OpenResty allows unsafe characters in an argument when using the API to mutate a URI, or a request or response header. |
CVE-2020-36309
|
Date | Actor | Action | Vulnerability | Source | VulnerableCode Version |
---|---|---|---|---|---|
2025-06-21T23:14:30.024660+00:00 | Debian Importer | Affected by | VCID-6y3x-kyj7-aaaf | https://security-tracker.debian.org/tracker/data/json | 36.1.3 |
2025-06-21T21:14:22.120429+00:00 | Debian Importer | Fixing | VCID-c9xc-nm4d-aaar | https://security-tracker.debian.org/tracker/data/json | 36.1.3 |
2025-06-21T12:33:41.470874+00:00 | Debian Importer | Fixing | VCID-6y3x-kyj7-aaaf | None | 36.1.3 |
2025-06-21T08:59:01.007244+00:00 | Debian Importer | Fixing | VCID-6y3x-kyj7-aaaf | https://security-tracker.debian.org/tracker/data/json | 36.1.3 |
2025-06-21T02:59:37.879611+00:00 | Debian Importer | Fixing | VCID-cza3-95cy-aaaj | https://security-tracker.debian.org/tracker/data/json | 36.1.3 |
2025-06-20T23:35:37.711745+00:00 | Debian Importer | Fixing | VCID-cza3-95cy-aaaj | None | 36.1.3 |
2025-06-20T20:52:26.250222+00:00 | Debian Importer | Fixing | VCID-5m3h-b4yf-63ew | https://security-tracker.debian.org/tracker/data/json | 36.1.3 |
2025-06-05T14:38:05.502080+00:00 | Debian Importer | Fixing | VCID-5m3h-b4yf-63ew | https://security-tracker.debian.org/tracker/data/json | 36.1.0 |
2025-05-17T19:24:36.411574+00:00 | Debian Importer | Fixing | VCID-6y3x-kyj7-aaaf | None | 36.0.0 |
2025-05-17T18:46:31.375024+00:00 | Debian Importer | Fixing | VCID-cza3-95cy-aaaj | https://security-tracker.debian.org/tracker/data/json | 36.0.0 |
2025-05-17T17:25:16.987640+00:00 | Debian Importer | Fixing | VCID-5m3h-b4yf-63ew | https://security-tracker.debian.org/tracker/data/json | 36.0.0 |
2025-05-17T15:16:04.444072+00:00 | Debian Importer | Fixing | VCID-cza3-95cy-aaaj | None | 36.0.0 |
2025-04-23T22:57:23.385300+00:00 | Debian Importer | Fixing | VCID-6y3x-kyj7-aaaf | https://security-tracker.debian.org/tracker/data/json | 36.0.0 |
2025-04-23T03:34:32.768543+00:00 | Debian Importer | Fixing | VCID-c9xc-nm4d-aaar | https://security-tracker.debian.org/tracker/data/json | 36.0.0 |