Search for packages
purl | pkg:deb/debian/nginx@1.22.1-9%2Bdeb12u2 |
Vulnerability | Summary | Fixed by |
---|---|---|
VCID-c4d1-jsqh-hban
Aliases: CVE-2023-44487 GHSA-qppj-fm5r-hxr3 VSV00013 |
The HTTP/2 protocol allows a denial of service (server resource consumption) because request cancellation can reset many streams quickly, as exploited in the wild in August through October 2023. |
Affected by 0 other vulnerabilities. |
Vulnerability | Summary | Aliases |
---|---|---|
VCID-2tuc-3v8j-xudn | ngx_http_lua_module (aka lua-nginx-module) before 0.10.16 in OpenResty allows unsafe characters in an argument when using the API to mutate a URI, or a request or response header. |
CVE-2020-36309
|
VCID-4bgm-zbwp-qbab | SSL session reuse vulnerability |
CVE-2025-23419
|
VCID-nzr2-bv2u-v7hr | NGINX Open Source and NGINX Plus have a vulnerability in the ngx_http_mp4_module, which might allow an attacker to over-read NGINX worker memory resulting in its termination, using a specially crafted mp4 file. The issue only affects NGINX if it is built with the ngx_http_mp4_module and the mp4 directive is used in the configuration file. Additionally, the attack is possible only if an attacker can trigger the processing of a specially crafted mp4 file with the ngx_http_mp4_module. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated. |
CVE-2024-7347
|
VCID-xa13-bcwk-wycb | lua-nginx-module: HTTP request smuggling via a crafted HEAD request |
CVE-2024-33452
|