nginx:1.20 security update, DDoS attack fi
OS | OS Version | Architecture | Package | Package Version | Filename |
---|---|---|---|---|---|
almalinux | 8 | noarch | nginx-all-modules | 1.20.1-1.module_el8.8.0+3624+abf02be4.1.alma.1 | nginx-all-modules-1.20.1-1.module_el8.8.0+3624+abf02be4.1.alma.1.noarch.rpm |
almalinux | 8 | noarch | nginx-filesystem | 1.20.1-1.module_el8.8.0+3624+abf02be4.1.alma.1 | nginx-filesystem-1.20.1-1.module_el8.8.0+3624+abf02be4.1.alma.1.noarch.rpm |
almalinux | 8 | aarch64 | nginx-mod-http-perl | 1.20.1-1.module_el8.8.0+3624+abf02be4.1.alma.1 | nginx-mod-http-perl-1.20.1-1.module_el8.8.0+3624+abf02be4.1.alma.1.aarch64.rpm |
almalinux | 8 | aarch64 | nginx-mod-devel | 1.20.1-1.module_el8.8.0+3624+abf02be4.1.alma.1 | nginx-mod-devel-1.20.1-1.module_el8.8.0+3624+abf02be4.1.alma.1.aarch64.rpm |
almalinux | 8 | aarch64 | nginx | 1.20.1-1.module_el8.8.0+3624+abf02be4.1.alma.1 | nginx-1.20.1-1.module_el8.8.0+3624+abf02be4.1.alma.1.aarch64.rpm |
almalinux | 8 | aarch64 | nginx-mod-http-xslt-filter | 1.20.1-1.module_el8.8.0+3624+abf02be4.1.alma.1 | nginx-mod-http-xslt-filter-1.20.1-1.module_el8.8.0+3624+abf02be4.1.alma.1.aarch64.rpm |
almalinux | 8 | aarch64 | nginx-mod-mail | 1.20.1-1.module_el8.8.0+3624+abf02be4.1.alma.1 | nginx-mod-mail-1.20.1-1.module_el8.8.0+3624+abf02be4.1.alma.1.aarch64.rpm |
almalinux | 8 | aarch64 | nginx-mod-http-image-filter | 1.20.1-1.module_el8.8.0+3624+abf02be4.1.alma.1 | nginx-mod-http-image-filter-1.20.1-1.module_el8.8.0+3624+abf02be4.1.alma.1.aarch64.rpm |
almalinux | 8 | aarch64 | nginx-mod-stream | 1.20.1-1.module_el8.8.0+3624+abf02be4.1.alma.1 | nginx-mod-stream-1.20.1-1.module_el8.8.0+3624+abf02be4.1.alma.1.aarch64.rpm |
almalinux | 8 | x86_64 | nginx | 1.20.1-1.module_el8.8.0+3624+abf02be4.1.alma.1 | nginx-1.20.1-1.module_el8.8.0+3624+abf02be4.1.alma.1.x86_64.rpm |
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo