Vulnerabilities
Vulnerable Software

Vulnerability Details CVE-2010-2263

nginx 0.8 before 0.8.40 and 0.7 before 0.7.66, when running on Windows, allows remote attackers to obtain source code or unparsed content of arbitrary files under the web document root by appending ::$DATA to the URI.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.593
EPSS Ranking 98.2%
CVSS Severity
CVSS v2 Score 5.0
Products affected by CVE-2010-2263
  • F5 » Nginx » Version: 0.7.52
    cpe:2.3:a:f5:nginx:0.7.52
  • F5 » Nginx » Version: 0.7.53
    cpe:2.3:a:f5:nginx:0.7.53
  • F5 » Nginx » Version: 0.7.54
    cpe:2.3:a:f5:nginx:0.7.54
  • F5 » Nginx » Version: 0.7.55
    cpe:2.3:a:f5:nginx:0.7.55
  • F5 » Nginx » Version: 0.7.56
    cpe:2.3:a:f5:nginx:0.7.56
  • F5 » Nginx » Version: 0.7.57
    cpe:2.3:a:f5:nginx:0.7.57
  • F5 » Nginx » Version: 0.7.58
    cpe:2.3:a:f5:nginx:0.7.58
  • F5 » Nginx » Version: 0.7.59
    cpe:2.3:a:f5:nginx:0.7.59
  • F5 » Nginx » Version: 0.7.60
    cpe:2.3:a:f5:nginx:0.7.60
  • F5 » Nginx » Version: 0.7.61
    cpe:2.3:a:f5:nginx:0.7.61
  • F5 » Nginx » Version: 0.7.62
    cpe:2.3:a:f5:nginx:0.7.62
  • F5 » Nginx » Version: 0.7.63
    cpe:2.3:a:f5:nginx:0.7.63
  • F5 » Nginx » Version: 0.7.64
    cpe:2.3:a:f5:nginx:0.7.64
  • F5 » Nginx » Version: 0.7.65
    cpe:2.3:a:f5:nginx:0.7.65
  • F5 » Nginx » Version: 0.8.0
    cpe:2.3:a:f5:nginx:0.8.0
  • F5 » Nginx » Version: 0.8.1
    cpe:2.3:a:f5:nginx:0.8.1
  • F5 » Nginx » Version: 0.8.10
    cpe:2.3:a:f5:nginx:0.8.10
  • F5 » Nginx » Version: 0.8.11
    cpe:2.3:a:f5:nginx:0.8.11
  • F5 » Nginx » Version: 0.8.12
    cpe:2.3:a:f5:nginx:0.8.12
  • F5 » Nginx » Version: 0.8.13
    cpe:2.3:a:f5:nginx:0.8.13
  • F5 » Nginx » Version: 0.8.14
    cpe:2.3:a:f5:nginx:0.8.14
  • F5 » Nginx » Version: 0.8.15
    cpe:2.3:a:f5:nginx:0.8.15
  • F5 » Nginx » Version: 0.8.16
    cpe:2.3:a:f5:nginx:0.8.16
  • F5 » Nginx » Version: 0.8.17
    cpe:2.3:a:f5:nginx:0.8.17
  • F5 » Nginx » Version: 0.8.18
    cpe:2.3:a:f5:nginx:0.8.18
  • F5 » Nginx » Version: 0.8.19
    cpe:2.3:a:f5:nginx:0.8.19
  • F5 » Nginx » Version: 0.8.2
    cpe:2.3:a:f5:nginx:0.8.2
  • F5 » Nginx » Version: 0.8.20
    cpe:2.3:a:f5:nginx:0.8.20
  • F5 » Nginx » Version: 0.8.21
    cpe:2.3:a:f5:nginx:0.8.21
  • F5 » Nginx » Version: 0.8.22
    cpe:2.3:a:f5:nginx:0.8.22
  • F5 » Nginx » Version: 0.8.23
    cpe:2.3:a:f5:nginx:0.8.23
  • F5 » Nginx » Version: 0.8.24
    cpe:2.3:a:f5:nginx:0.8.24
  • F5 » Nginx » Version: 0.8.25
    cpe:2.3:a:f5:nginx:0.8.25
  • F5 » Nginx » Version: 0.8.26
    cpe:2.3:a:f5:nginx:0.8.26
  • F5 » Nginx » Version: 0.8.27
    cpe:2.3:a:f5:nginx:0.8.27
  • F5 » Nginx » Version: 0.8.28
    cpe:2.3:a:f5:nginx:0.8.28
  • F5 » Nginx » Version: 0.8.29
    cpe:2.3:a:f5:nginx:0.8.29
  • F5 » Nginx » Version: 0.8.3
    cpe:2.3:a:f5:nginx:0.8.3
  • F5 » Nginx » Version: 0.8.30
    cpe:2.3:a:f5:nginx:0.8.30
  • F5 » Nginx » Version: 0.8.31
    cpe:2.3:a:f5:nginx:0.8.31
  • F5 » Nginx » Version: 0.8.32
    cpe:2.3:a:f5:nginx:0.8.32
  • F5 » Nginx » Version: 0.8.33
    cpe:2.3:a:f5:nginx:0.8.33
  • F5 » Nginx » Version: 0.8.34
    cpe:2.3:a:f5:nginx:0.8.34
  • F5 » Nginx » Version: 0.8.35
    cpe:2.3:a:f5:nginx:0.8.35
  • F5 » Nginx » Version: 0.8.36
    cpe:2.3:a:f5:nginx:0.8.36
  • F5 » Nginx » Version: 0.8.37
    cpe:2.3:a:f5:nginx:0.8.37
  • F5 » Nginx » Version: 0.8.38
    cpe:2.3:a:f5:nginx:0.8.38
  • F5 » Nginx » Version: 0.8.39
    cpe:2.3:a:f5:nginx:0.8.39
  • F5 » Nginx » Version: 0.8.4
    cpe:2.3:a:f5:nginx:0.8.4
  • F5 » Nginx » Version: 0.8.5
    cpe:2.3:a:f5:nginx:0.8.5
  • F5 » Nginx » Version: 0.8.6
    cpe:2.3:a:f5:nginx:0.8.6
  • F5 » Nginx » Version: 0.8.7
    cpe:2.3:a:f5:nginx:0.8.7
  • F5 » Nginx » Version: 0.8.8
    cpe:2.3:a:f5:nginx:0.8.8
  • F5 » Nginx » Version: 0.8.9
    cpe:2.3:a:f5:nginx:0.8.9
  • Microsoft » Windows » Version: N/A
    cpe:2.3:o:microsoft:windows:-


Contact Us

Shodan ® - All rights reserved