Updated: March 01, 2016
Unknown
No statement is currently available from the vendor regarding this vulnerability.
We are not aware of further vendor information regarding this vulnerability.
Updated: March 14, 2016
Unknown
No statement is currently available from the vendor regarding this vulnerability.
We are not aware of further vendor information regarding this vulnerability.
Updated: March 14, 2016
Unknown
No statement is currently available from the vendor regarding this vulnerability.
We are not aware of further vendor information regarding this vulnerability.
Updated: March 14, 2016
Statement Date: March 10, 2016
Affected
"Our version comes with a preferred cipher list which has mitigated SSLv2 issues since march 2015, our latest version 1.9.13.1 was released on 2 march 2016 with Openssl 1.0.2g which has the additional fix(es) for VU#583776."
ECSystems.nl supports NGINX for Windows
Updated: March 01, 2016
Unknown
No statement is currently available from the vendor regarding this vulnerability.
We are not aware of further vendor information regarding this vulnerability.
Updated: March 01, 2016
Unknown
No statement is currently available from the vendor regarding this vulnerability.
We are not aware of further vendor information regarding this vulnerability.
Updated: March 14, 2016
Unknown
No statement is currently available from the vendor regarding this vulnerability.
We are not aware of further vendor information regarding this vulnerability.
nginx may or may be affected depending on what version of OpenSSL it was compiled with. Contact your vendor to determine if your release of nginx is affected.
Updated: March 02, 2016
Affected
No statement is currently available from the vendor regarding this vulnerability.
OpenSSL 1.0.2g and 1.0.1s have been released to address this vulnerability. Please see OpenSSL's security advisory at the URL below. A 3rd-party tool http://testssl.sh/ is available to check for security issues, including this one. Another option for network administrators to determine if a server supports SSLv2 is to use the following command: openssl s_client -connect host:443 -ssl2 If certificate information is returned, then SSLv2 is supported. It has been reported that this command may not work on Ubuntu or Debian systems.
Updated: March 14, 2016
Unknown
No statement is currently available from the vendor regarding this vulnerability.
We are not aware of further vendor information regarding this vulnerability.
Updated: March 01, 2016
Unknown
No statement is currently available from the vendor regarding this vulnerability.
We are not aware of further vendor information regarding this vulnerability.
Updated: March 14, 2016
Unknown
No statement is currently available from the vendor regarding this vulnerability.
We are not aware of further vendor information regarding this vulnerability.
Updated: March 14, 2016
Unknown
No statement is currently available from the vendor regarding this vulnerability.
We are not aware of further vendor information regarding this vulnerability.
Updated: March 14, 2016
Unknown
No statement is currently available from the vendor regarding this vulnerability.
We are not aware of further vendor information regarding this vulnerability.