Vulnerabilities
Vulnerable Software

Vulnerability Details CVE-2010-2266

nginx 0.8.36 allows remote attackers to cause a denial of service (crash) via certain encoded directory traversal sequences that trigger memory corruption, as demonstrated using the "%c0.%c0." sequence.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.068
EPSS Ranking 90.9%
CVSS Severity
CVSS v2 Score 5.0
Products affected by CVE-2010-2266
  • F5 » Nginx » Version: 0.7.52
    cpe:2.3:a:f5:nginx:0.7.52
  • F5 » Nginx » Version: 0.7.53
    cpe:2.3:a:f5:nginx:0.7.53
  • F5 » Nginx » Version: 0.7.54
    cpe:2.3:a:f5:nginx:0.7.54
  • F5 » Nginx » Version: 0.7.55
    cpe:2.3:a:f5:nginx:0.7.55
  • F5 » Nginx » Version: 0.7.56
    cpe:2.3:a:f5:nginx:0.7.56
  • F5 » Nginx » Version: 0.7.57
    cpe:2.3:a:f5:nginx:0.7.57
  • F5 » Nginx » Version: 0.7.58
    cpe:2.3:a:f5:nginx:0.7.58
  • F5 » Nginx » Version: 0.7.59
    cpe:2.3:a:f5:nginx:0.7.59
  • F5 » Nginx » Version: 0.7.60
    cpe:2.3:a:f5:nginx:0.7.60
  • F5 » Nginx » Version: 0.7.61
    cpe:2.3:a:f5:nginx:0.7.61
  • F5 » Nginx » Version: 0.7.62
    cpe:2.3:a:f5:nginx:0.7.62
  • F5 » Nginx » Version: 0.7.63
    cpe:2.3:a:f5:nginx:0.7.63
  • F5 » Nginx » Version: 0.7.64
    cpe:2.3:a:f5:nginx:0.7.64
  • F5 » Nginx » Version: 0.7.65
    cpe:2.3:a:f5:nginx:0.7.65
  • F5 » Nginx » Version: 0.7.66
    cpe:2.3:a:f5:nginx:0.7.66
  • F5 » Nginx » Version: 0.8.0
    cpe:2.3:a:f5:nginx:0.8.0
  • F5 » Nginx » Version: 0.8.1
    cpe:2.3:a:f5:nginx:0.8.1
  • F5 » Nginx » Version: 0.8.10
    cpe:2.3:a:f5:nginx:0.8.10
  • F5 » Nginx » Version: 0.8.11
    cpe:2.3:a:f5:nginx:0.8.11
  • F5 » Nginx » Version: 0.8.12
    cpe:2.3:a:f5:nginx:0.8.12
  • F5 » Nginx » Version: 0.8.13
    cpe:2.3:a:f5:nginx:0.8.13
  • F5 » Nginx » Version: 0.8.14
    cpe:2.3:a:f5:nginx:0.8.14
  • F5 » Nginx » Version: 0.8.15
    cpe:2.3:a:f5:nginx:0.8.15
  • F5 » Nginx » Version: 0.8.16
    cpe:2.3:a:f5:nginx:0.8.16
  • F5 » Nginx » Version: 0.8.17
    cpe:2.3:a:f5:nginx:0.8.17
  • F5 » Nginx » Version: 0.8.18
    cpe:2.3:a:f5:nginx:0.8.18
  • F5 » Nginx » Version: 0.8.19
    cpe:2.3:a:f5:nginx:0.8.19
  • F5 » Nginx » Version: 0.8.2
    cpe:2.3:a:f5:nginx:0.8.2
  • F5 » Nginx » Version: 0.8.20
    cpe:2.3:a:f5:nginx:0.8.20
  • F5 » Nginx » Version: 0.8.21
    cpe:2.3:a:f5:nginx:0.8.21
  • F5 » Nginx » Version: 0.8.22
    cpe:2.3:a:f5:nginx:0.8.22
  • F5 » Nginx » Version: 0.8.23
    cpe:2.3:a:f5:nginx:0.8.23
  • F5 » Nginx » Version: 0.8.24
    cpe:2.3:a:f5:nginx:0.8.24
  • F5 » Nginx » Version: 0.8.25
    cpe:2.3:a:f5:nginx:0.8.25
  • F5 » Nginx » Version: 0.8.26
    cpe:2.3:a:f5:nginx:0.8.26
  • F5 » Nginx » Version: 0.8.27
    cpe:2.3:a:f5:nginx:0.8.27
  • F5 » Nginx » Version: 0.8.28
    cpe:2.3:a:f5:nginx:0.8.28
  • F5 » Nginx » Version: 0.8.29
    cpe:2.3:a:f5:nginx:0.8.29
  • F5 » Nginx » Version: 0.8.3
    cpe:2.3:a:f5:nginx:0.8.3
  • F5 » Nginx » Version: 0.8.30
    cpe:2.3:a:f5:nginx:0.8.30
  • F5 » Nginx » Version: 0.8.31
    cpe:2.3:a:f5:nginx:0.8.31
  • F5 » Nginx » Version: 0.8.32
    cpe:2.3:a:f5:nginx:0.8.32
  • F5 » Nginx » Version: 0.8.33
    cpe:2.3:a:f5:nginx:0.8.33
  • F5 » Nginx » Version: 0.8.34
    cpe:2.3:a:f5:nginx:0.8.34
  • F5 » Nginx » Version: 0.8.35
    cpe:2.3:a:f5:nginx:0.8.35
  • F5 » Nginx » Version: 0.8.36
    cpe:2.3:a:f5:nginx:0.8.36
  • F5 » Nginx » Version: 0.8.37
    cpe:2.3:a:f5:nginx:0.8.37
  • F5 » Nginx » Version: 0.8.38
    cpe:2.3:a:f5:nginx:0.8.38
  • F5 » Nginx » Version: 0.8.39
    cpe:2.3:a:f5:nginx:0.8.39
  • F5 » Nginx » Version: 0.8.4
    cpe:2.3:a:f5:nginx:0.8.4
  • F5 » Nginx » Version: 0.8.40
    cpe:2.3:a:f5:nginx:0.8.40
  • F5 » Nginx » Version: 0.8.5
    cpe:2.3:a:f5:nginx:0.8.5
  • F5 » Nginx » Version: 0.8.6
    cpe:2.3:a:f5:nginx:0.8.6
  • F5 » Nginx » Version: 0.8.7
    cpe:2.3:a:f5:nginx:0.8.7
  • F5 » Nginx » Version: 0.8.8
    cpe:2.3:a:f5:nginx:0.8.8
  • F5 » Nginx » Version: 0.8.9
    cpe:2.3:a:f5:nginx:0.8.9


Contact Us

Shodan ® - All rights reserved