Direct Vulnerabilities

Known vulnerabilities in the nginx package. This does not include vulnerabilities belonging to this package’s dependencies.

Fix vulnerabilities automatically

Snyk's AI Trust Platform automatically finds the best upgrade path and integrates with your development workflows. Secure your code at zero cost.

Fix for free
VulnerabilityVulnerable Version
  • L
CRLF Injection

*
  • L
Incorrect Authorization

*
  • L
Integer Overflow or Wraparound

*
  • L
NULL Pointer Dereference

*
  • L
Out-of-bounds Read

*
  • L
Heap-based Buffer Overflow

*
  • M
Insufficient Verification of Data Authenticity

<1.26.3-3+deb13u2
  • L
Out-of-bounds Read

<1.26.3-3+deb13u1
  • L
CVE-2024-33452

<1.22.0-3
  • L
Incorrect Authorization

<1.26.3-2
  • M
Out-of-bounds Read

<1.26.0-2
  • L
NULL Pointer Dereference

<1.26.0-2
  • L
NULL Pointer Dereference

<1.26.0-1
  • L
Out-of-bounds Write

<1.26.0-2
  • L
Use After Free

<1.26.0-1
  • L
Use After Free

<1.26.0-2
  • L
Out-of-bounds Write

<1.26.0-2
  • L
CVE-2023-44487

<1.24.0-2
  • H
Out-of-bounds Write

<1.22.1-1
  • H
Out-of-bounds Write

<1.22.1-1
  • H
Improper Certificate Validation

<1.20.2-2
  • C
Integer Overflow or Wraparound

<1.13.6-1
  • H
Off-by-one Error

<1.18.0-6.1
  • M
CVE-2020-36309

<1.22.0-3
  • H
HTTP Request Smuggling

<1.18.0-5
  • L
HTTP Request Smuggling

<1.16.1-3
  • H
CVE-2019-9513

<1.14.2-3
  • M
Allocation of Resources Without Limits or Throttling

<1.14.2-3
  • H
Allocation of Resources Without Limits or Throttling

<1.14.2-3
  • H
Resource Exhaustion

<1.14.1-1
  • H
Resource Exhaustion

<1.14.1-1
  • M
Resource Exhaustion

<1.14.1-1
  • L
Improper Input Validation

<1.9.1-1
  • H
Integer Overflow or Wraparound

<1.13.3-1
  • H
Link Following

<1.10.2-1
  • H
NULL Pointer Dereference

<1.10.1-1
  • C
Use After Free

<1.9.10-1
  • M
Resource Exhaustion

<1.9.10-1
  • H
NULL Pointer Dereference

<1.9.10-1
  • M
Arbitrary Command Injection

<1.6.1-1
  • M
Insufficient Session Expiration

<1.6.2-1
  • L
Out-of-bounds Write

<1.4.7-1
  • H
Improper Encoding or Escaping of Output

<1.4.4-1
  • L
Access Restriction Bypass

*
  • M
CVE-2013-2070

<1.4.1-1
  • L
Cryptographic Issues

<1.2.1-2.2
  • M
Directory Traversal

<1.2.1-2
  • M
Buffer Overflow

<1.1.19-1
  • M
Use After Free

<1.1.17-1
  • L
Out-of-bounds Write

<1.1.8-1
  • L
CVE-2009-4487

*
  • M
Out-of-Bounds

<0.7.62-1
  • L
Directory Traversal

<0.7.63-1
  • M
Cryptographic Issues

<0.7.64-1
  • M
Out-of-bounds Write

<0.7.61-3