Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
f5 nginx 0.7.61 vulnerabilities and exploits
(subscribe to this query)
4.8
CVSSv3
CVE-2011-4968
nginx http proxy module does not verify peer identity of https origin server which could facilitate man-in-the-middle attack (MITM)
F5 Nginx 0.7.61
F5 Nginx 0.7.62
F5 Nginx 0.7.64
F5 Nginx 0.7.65
F5 Nginx 0.7.66
F5 Nginx 0.8.33
F5 Nginx 0.8.35
F5 Nginx 0.8.36
F5 Nginx 0.8.40
F5 Nginx 1.2.6
Debian Debian Linux 8.0
NA
CVE-2009-3898
Directory traversal vulnerability in src/http/modules/ngx_http_dav_module.c in nginx (aka Engine X) prior to 0.7.63, and 0.8.x prior to 0.8.17, allows remote authenticated users to create or overwrite arbitrary files via a .. (dot dot) in the Destination HTTP header for the WebDA...
F5 Nginx 0.3.48
F5 Nginx 0.3.11
F5 Nginx 0.3.10
F5 Nginx 0.2.6
F5 Nginx 0.2.4
F5 Nginx 0.1.45
F5 Nginx 0.1.42
F5 Nginx 0.1.37
F5 Nginx 0.3.43
F5 Nginx 0.3.35
F5 Nginx 0.3.34
F5 Nginx 0.3.26
F5 Nginx 0.3.27
F5 Nginx 0.3.18
F5 Nginx 0.3.19
F5 Nginx 0.3.20
F5 Nginx 0.1.10
F5 Nginx 0.1.9
F5 Nginx 0.1.18
F5 Nginx 0.1.17
F5 Nginx 0.1.24
F5 Nginx 0.1.25
1 EDB exploit
NA
CVE-2009-3896
src/http/ngx_http_parse.c in nginx (aka Engine X) 0.1.0 up to and including 0.4.14, 0.5.x prior to 0.5.38, 0.6.x prior to 0.6.39, 0.7.x prior to 0.7.62, and 0.8.x prior to 0.8.14 allows remote malicious users to cause a denial of service (NULL pointer dereference and worker proce...
F5 Nginx 0.3.13
F5 Nginx 0.3.12
F5 Nginx 0.3.11
F5 Nginx 0.3.0
F5 Nginx 0.1.0
F5 Nginx 0.2.1
F5 Nginx 0.1.44
F5 Nginx 0.1.36
F5 Nginx 0.1.37
F5 Nginx 0.3.41
F5 Nginx 0.3.40
F5 Nginx 0.3.33
F5 Nginx 0.3.32
F5 Nginx 0.3.25
F5 Nginx 0.3.18
F5 Nginx 0.3.17
F5 Nginx 0.1.11
F5 Nginx 0.1.4
F5 Nginx 0.1.19
F5 Nginx 0.1.26
F5 Nginx 0.1.27
F5 Nginx 0.1.34
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-4367
CVE-2024-35977
CVE-2023-49335
man-in-the-middle
CVE-2024-4947
CVE-2024-31714
memory leak
SQL
CVE-2024-35994
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started