Total vulnerabilities in the database
The default configuration of nginx, possibly 1.3.13 and earlier, uses world-readable permissions for the (1) access.log and (2) error.log files, which allows local users to obtain sensitive information by reading the files.
Software | From | Fixed in |
---|---|---|
f5 / nginx | 1.0.11 | 1.0.11.x |
f5 / nginx | 1.0.12 | 1.0.12.x |
f5 / nginx | 1.0.13 | 1.0.13.x |
f5 / nginx | 1.0.14 | 1.0.14.x |
f5 / nginx | 1.0.0 | 1.0.0.x |
f5 / nginx | 1.0.1 | 1.0.1.x |
f5 / nginx | 1.0.10 | 1.0.10.x |
f5 / nginx | 1.0.5 | 1.0.5.x |
f5 / nginx | 1.0.6 | 1.0.6.x |
f5 / nginx | 1.0.7 | 1.0.7.x |
f5 / nginx | 1.0.8 | 1.0.8.x |
f5 / nginx | 1.0.15 | 1.0.15.x |
f5 / nginx | 1.0.2 | 1.0.2.x |
f5 / nginx | 1.0.3 | 1.0.3.x |
f5 / nginx | 1.0.4 | 1.0.4.x |
f5 / nginx | 1.1.11 | 1.1.11.x |
f5 / nginx | 1.1.12 | 1.1.12.x |
f5 / nginx | 1.1.13 | 1.1.13.x |
f5 / nginx | 1.0.9 | 1.0.9.x |
f5 / nginx | 1.1.0 | 1.1.0.x |
f5 / nginx | 1.1.1 | 1.1.1.x |
f5 / nginx | 1.1.10 | 1.1.10.x |
f5 / nginx | 1.1.2 | 1.1.2.x |
f5 / nginx | 1.1.3 | 1.1.3.x |
f5 / nginx | 1.1.4 | 1.1.4.x |
f5 / nginx | 1.1.9 | 1.1.9.x |
f5 / nginx | 1.1.5 | 1.1.5.x |
f5 / nginx | 1.1.6 | 1.1.6.x |
f5 / nginx | 1.1.7 | 1.1.7.x |
f5 / nginx | 1.1.8 | 1.1.8.x |
f5 / nginx | 1.1.14 | 1.1.14.x |
f5 / nginx | - | 1.3.13.x |
f5 / nginx | 1.1.19 | 1.1.19.x |
f5 / nginx | 1.1.15 | 1.1.15.x |
f5 / nginx | 1.1.16 | 1.1.16.x |
f5 / nginx | 1.1.17 | 1.1.17.x |
f5 / nginx | 1.1.18 | 1.1.18.x |
f5 / nginx | 1.2.0 | 1.2.0.x |
f5 / nginx | 1.3.0 | 1.3.0.x |
f5 / nginx | 1.3.1 | 1.3.1.x |
f5 / nginx | 1.3.2 | 1.3.2.x |
f5 / nginx | 1.3.10 | 1.3.10.x |
f5 / nginx | 1.3.11 | 1.3.11.x |
f5 / nginx | 1.3.12 | 1.3.12.x |
f5 / nginx | 1.3.7 | 1.3.7.x |
f5 / nginx | 1.3.8 | 1.3.8.x |
f5 / nginx | 1.3.9 | 1.3.9.x |
f5 / nginx | 1.3.3 | 1.3.3.x |
f5 / nginx | 1.3.4 | 1.3.4.x |
f5 / nginx | 1.3.5 | 1.3.5.x |
f5 / nginx | 1.3.6 | 1.3.6.x |