Vulnerabilities
Vulnerable Software

Vulnerability Details CVE-2010-2263

nginx 0.8 before 0.8.40 and 0.7 before 0.7.66, when running on Windows, allows remote attackers to obtain source code or unparsed content of arbitrary files under the web document root by appending ::$DATA to the URI.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.442
EPSS Ranking 97.4%
CVSS Severity
CVSS v2 Score 5.0
Products affected by CVE-2010-2263
  • F5 » Nginx » Version: 0.7.52
    cpe:2.3:a:f5:nginx:0.7.52
  • F5 » Nginx » Version: 0.7.53
    cpe:2.3:a:f5:nginx:0.7.53
  • F5 » Nginx » Version: 0.7.54
    cpe:2.3:a:f5:nginx:0.7.54
  • F5 » Nginx » Version: 0.7.55
    cpe:2.3:a:f5:nginx:0.7.55
  • F5 » Nginx » Version: 0.7.56
    cpe:2.3:a:f5:nginx:0.7.56
  • F5 » Nginx » Version: 0.7.57
    cpe:2.3:a:f5:nginx:0.7.57
  • F5 » Nginx » Version: 0.7.58
    cpe:2.3:a:f5:nginx:0.7.58
  • F5 » Nginx » Version: 0.7.59
    cpe:2.3:a:f5:nginx:0.7.59
  • F5 » Nginx » Version: 0.7.60
    cpe:2.3:a:f5:nginx:0.7.60
  • F5 » Nginx » Version: 0.7.61
    cpe:2.3:a:f5:nginx:0.7.61
  • F5 » Nginx » Version: 0.7.62
    cpe:2.3:a:f5:nginx:0.7.62
  • F5 » Nginx » Version: 0.7.63
    cpe:2.3:a:f5:nginx:0.7.63
  • F5 » Nginx » Version: 0.7.64
    cpe:2.3:a:f5:nginx:0.7.64
  • F5 » Nginx » Version: 0.7.65
    cpe:2.3:a:f5:nginx:0.7.65
  • F5 » Nginx » Version: 0.8.0
    cpe:2.3:a:f5:nginx:0.8.0
  • F5 » Nginx » Version: 0.8.1
    cpe:2.3:a:f5:nginx:0.8.1
  • F5 » Nginx » Version: 0.8.10
    cpe:2.3:a:f5:nginx:0.8.10
  • F5 » Nginx » Version: 0.8.11
    cpe:2.3:a:f5:nginx:0.8.11
  • F5 » Nginx » Version: 0.8.12
    cpe:2.3:a:f5:nginx:0.8.12
  • F5 » Nginx » Version: 0.8.13
    cpe:2.3:a:f5:nginx:0.8.13
  • F5 » Nginx » Version: 0.8.14
    cpe:2.3:a:f5:nginx:0.8.14
  • F5 » Nginx » Version: 0.8.15
    cpe:2.3:a:f5:nginx:0.8.15
  • F5 » Nginx » Version: 0.8.16
    cpe:2.3:a:f5:nginx:0.8.16
  • F5 » Nginx » Version: 0.8.17
    cpe:2.3:a:f5:nginx:0.8.17
  • F5 » Nginx » Version: 0.8.18
    cpe:2.3:a:f5:nginx:0.8.18
  • F5 » Nginx » Version: 0.8.19
    cpe:2.3:a:f5:nginx:0.8.19
  • F5 » Nginx » Version: 0.8.2
    cpe:2.3:a:f5:nginx:0.8.2
  • F5 » Nginx » Version: 0.8.20
    cpe:2.3:a:f5:nginx:0.8.20
  • F5 » Nginx » Version: 0.8.21
    cpe:2.3:a:f5:nginx:0.8.21
  • F5 » Nginx » Version: 0.8.22
    cpe:2.3:a:f5:nginx:0.8.22
  • F5 » Nginx » Version: 0.8.23
    cpe:2.3:a:f5:nginx:0.8.23
  • F5 » Nginx » Version: 0.8.24
    cpe:2.3:a:f5:nginx:0.8.24
  • F5 » Nginx » Version: 0.8.25
    cpe:2.3:a:f5:nginx:0.8.25
  • F5 » Nginx » Version: 0.8.26
    cpe:2.3:a:f5:nginx:0.8.26
  • F5 » Nginx » Version: 0.8.27
    cpe:2.3:a:f5:nginx:0.8.27
  • F5 » Nginx » Version: 0.8.28
    cpe:2.3:a:f5:nginx:0.8.28
  • F5 » Nginx » Version: 0.8.29
    cpe:2.3:a:f5:nginx:0.8.29
  • F5 » Nginx » Version: 0.8.3
    cpe:2.3:a:f5:nginx:0.8.3
  • F5 » Nginx » Version: 0.8.30
    cpe:2.3:a:f5:nginx:0.8.30
  • F5 » Nginx » Version: 0.8.31
    cpe:2.3:a:f5:nginx:0.8.31
  • F5 » Nginx » Version: 0.8.32
    cpe:2.3:a:f5:nginx:0.8.32
  • F5 » Nginx » Version: 0.8.33
    cpe:2.3:a:f5:nginx:0.8.33
  • F5 » Nginx » Version: 0.8.34
    cpe:2.3:a:f5:nginx:0.8.34
  • F5 » Nginx » Version: 0.8.35
    cpe:2.3:a:f5:nginx:0.8.35
  • F5 » Nginx » Version: 0.8.36
    cpe:2.3:a:f5:nginx:0.8.36
  • F5 » Nginx » Version: 0.8.37
    cpe:2.3:a:f5:nginx:0.8.37
  • F5 » Nginx » Version: 0.8.38
    cpe:2.3:a:f5:nginx:0.8.38
  • F5 » Nginx » Version: 0.8.39
    cpe:2.3:a:f5:nginx:0.8.39
  • F5 » Nginx » Version: 0.8.4
    cpe:2.3:a:f5:nginx:0.8.4
  • F5 » Nginx » Version: 0.8.5
    cpe:2.3:a:f5:nginx:0.8.5
  • F5 » Nginx » Version: 0.8.6
    cpe:2.3:a:f5:nginx:0.8.6
  • F5 » Nginx » Version: 0.8.7
    cpe:2.3:a:f5:nginx:0.8.7
  • F5 » Nginx » Version: 0.8.8
    cpe:2.3:a:f5:nginx:0.8.8
  • F5 » Nginx » Version: 0.8.9
    cpe:2.3:a:f5:nginx:0.8.9
  • Microsoft » Windows » Version: N/A
    cpe:2.3:o:microsoft:windows:-


Contact Us

Shodan ® - All rights reserved