Added |
CVSS V2 |
|
NIST (AV:N/AC:M/Au:N/C:P/I:P/A:P)
|
Removed |
CVSS V2 |
NIST (AV:N/AC:M/Au:N/C:P/I:N/A:N)
|
|
Changed |
CPE Configuration |
OR
*cpe:2.3:a:nginx:nginx:1.5.0:*:*:*:*:*:*:*
*cpe:2.3:a:nginx:nginx:1.5.1:*:*:*:*:*:*:*
*cpe:2.3:a:nginx:nginx:1.5.2:*:*:*:*:*:*:*
*cpe:2.3:a:nginx:nginx:1.5.3:*:*:*:*:*:*:*
*cpe:2.3:a:nginx:nginx:1.5.4:*:*:*:*:*:*:*
*cpe:2.3:a:nginx:nginx:1.5.5:*:*:*:*:*:*:*
*cpe:2.3:a:nginx:nginx:1.5.6:*:*:*:*:*:*:*
*cpe:2.3:a:nginx:nginx:1.5.7:*:*:*:*:*:*:*
*cpe:2.3:a:nginx:nginx:1.5.8:*:*:*:*:*:*:*
*cpe:2.3:a:nginx:nginx:1.5.9:*:*:*:*:*:*:*
*cpe:2.3:a:nginx:nginx:1.5.10:*:*:*:*:*:*:*
*cpe:2.3:a:nginx:nginx:1.5.11:*:*:*:*:*:*:*
*cpe:2.3:a:nginx:nginx:1.5.12:*:*:*:*:*:*:*
*cpe:2.3:a:nginx:nginx:1.6.0:*:*:*:*:*:*:*
*cpe:2.3:a:nginx:nginx:1.6.1:*:*:*:*:*:*:*
*cpe:2.3:a:nginx:nginx:1.7.0:*:*:*:*:*:*:*
*cpe:2.3:a:nginx:nginx:1.7.1:*:*:*:*:*:*:*
*cpe:2.3:a:nginx:nginx:1.7.2:*:*:*:*:*:*:*
*cpe:2.3:a:nginx:nginx:1.7.3:*:*:*:*:*:*:*
|
OR
*cpe:2.3:a:nginx:nginx:*:*:*:*:*:*:*:* versions from (including) 1.5.6 up to (excluding) 1.6.1
*cpe:2.3:a:nginx:nginx:*:*:*:*:*:*:*:* versions from (including) 1.7.0 up to (excluding) 1.7.4
|
Changed |
Reference Type |
http://marc.info/?l=bugtraq&m=142103967620673&w=2 No Types Assigned
|
http://marc.info/?l=bugtraq&m=142103967620673&w=2 Issue Tracking, Third Party Advisory
|
Changed |
Reference Type |
http://nginx.org/download/patch.2014.starttls.txt No Types Assigned
|
http://nginx.org/download/patch.2014.starttls.txt Patch, Vendor Advisory
|
Changed |
Reference Type |
https://bugzilla.redhat.com/show_bug.cgi?id=1126891 No Types Assigned
|
https://bugzilla.redhat.com/show_bug.cgi?id=1126891 Issue Tracking, Third Party Advisory
|
Removed |
CVSS V2 Metadata |
Victim must voluntarily interact with attack mechanism
|
|