Search for packages
Package details: pkg:nginx/nginx@1.1.8
purl pkg:nginx/nginx@1.1.8
Next non-vulnerable version 1.29.1
Latest non-vulnerable version 1.29.1
Risk 1.6
Vulnerabilities affecting this package (3)
Vulnerability Summary Fixed by
VCID-bk4t-p8kr-5ufj
Aliases:
CVE-2025-53859
NGINX Open Source and NGINX Plus have a vulnerability in the ngx_mail_smtp_module that might allow an unauthenticated attacker to over-read NGINX SMTP authentication process memory; as a result, the server side may leak arbitrary bytes sent in a request to the authentication server. This issue happens during the NGINX SMTP authentication process and requires the attacker to make preparations against the target system to extract the leaked data. The issue affects NGINX only if (1) it is built with the ngx_mail_smtp_module, (2) the smtp_auth directive is configured with method "none," and (3) the authentication server returns the "Auth-Wait" response header. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.
1.29.1
Affected by 0 other vulnerabilities.
VCID-bvk8-3444-5fev
Aliases:
CVE-2012-1180
Memory disclosure with specially crafted backend responses
1.1.17
Affected by 2 other vulnerabilities.
VCID-ds13-tr1a-cbh5
Aliases:
CVE-2012-2089
Buffer overflow in the ngx_http_mp4_module
1.1.19
Affected by 1 other vulnerability.
Vulnerabilities fixed by this package (1)
Vulnerability Summary Aliases
VCID-w2r6-grxr-d7dm Buffer overflow in resolver CVE-2011-4315

Date Actor Action Vulnerability Source VulnerableCode Version
2025-08-14T09:02:44.366984+00:00 Nginx Importer Affected by VCID-bk4t-p8kr-5ufj https://nginx.org/en/security_advisories.html 37.0.0
2025-07-31T08:11:49.409552+00:00 Nginx Importer Affected by VCID-ds13-tr1a-cbh5 https://nginx.org/en/security_advisories.html 37.0.0
2025-07-31T08:11:45.936341+00:00 Nginx Importer Affected by VCID-bvk8-3444-5fev https://nginx.org/en/security_advisories.html 37.0.0
2025-07-31T08:03:12.324500+00:00 Nginx Importer Fixing VCID-w2r6-grxr-d7dm https://nginx.org/en/security_advisories.html 37.0.0