Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
f5 nginx 0.7.61 vulnerabilities and exploits
(subscribe to this query)
4.8
CVSSv3
CVE-2011-4968
nginx http proxy module does not verify peer identity of https origin server which could facilitate man-in-the-middle attack (MITM)
F5 Nginx 0.7.61
F5 Nginx 0.7.62
F5 Nginx 0.7.64
F5 Nginx 0.7.65
F5 Nginx 0.7.66
F5 Nginx 0.8.33
F5 Nginx 0.8.35
F5 Nginx 0.8.36
F5 Nginx 0.8.40
F5 Nginx 1.2.6
Debian Debian Linux 8.0
NA
CVE-2009-3898
Directory traversal vulnerability in src/http/modules/ngx_http_dav_module.c in nginx (aka Engine X) prior to 0.7.63, and 0.8.x prior to 0.8.17, allows remote authenticated users to create or overwrite arbitrary files via a .. (dot dot) in the Destination HTTP header for the WebDA...
F5 Nginx 0.3.48
F5 Nginx 0.3.11
F5 Nginx 0.3.10
F5 Nginx 0.2.6
F5 Nginx 0.2.4
F5 Nginx 0.1.45
F5 Nginx 0.1.42
F5 Nginx 0.1.37
F5 Nginx 0.3.43
F5 Nginx 0.3.35
F5 Nginx 0.3.34
F5 Nginx 0.3.26
F5 Nginx 0.3.27
F5 Nginx 0.3.18
F5 Nginx 0.3.19
F5 Nginx 0.3.20
F5 Nginx 0.1.10
F5 Nginx 0.1.9
F5 Nginx 0.1.18
F5 Nginx 0.1.17
F5 Nginx 0.1.24
F5 Nginx 0.1.25
1 EDB exploit
NA
CVE-2009-3896
src/http/ngx_http_parse.c in nginx (aka Engine X) 0.1.0 up to and including 0.4.14, 0.5.x prior to 0.5.38, 0.6.x prior to 0.6.39, 0.7.x prior to 0.7.62, and 0.8.x prior to 0.8.14 allows remote malicious users to cause a denial of service (NULL pointer dereference and worker proce...
F5 Nginx 0.3.13
F5 Nginx 0.3.12
F5 Nginx 0.3.11
F5 Nginx 0.3.0
F5 Nginx 0.1.0
F5 Nginx 0.2.1
F5 Nginx 0.1.44
F5 Nginx 0.1.36
F5 Nginx 0.1.37
F5 Nginx 0.3.41
F5 Nginx 0.3.40
F5 Nginx 0.3.33
F5 Nginx 0.3.32
F5 Nginx 0.3.25
F5 Nginx 0.3.18
F5 Nginx 0.3.17
F5 Nginx 0.1.11
F5 Nginx 0.1.4
F5 Nginx 0.1.19
F5 Nginx 0.1.26
F5 Nginx 0.1.27
F5 Nginx 0.1.34
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-20065
open redirect
CVE-2024-1086
path traversal
CVE-2024-29825
XXE
CVE-2024-29822
CVE-2024-20696
CVE-2024-3564
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started