Action not permitted
Modal body text goes here.
Modal Title
Modal Body
rhsa-2014_0631
Vulnerability from csaf_redhat
Published
2014-06-05 15:27
Modified
2024-11-22 08:02
Summary
Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 6.2.3 security update
Notes
Topic
An update for Red Hat JBoss Enterprise Application Platform 6.2.3 that
fixes one security issue is now available from the Red Hat Customer Portal.
The Red Hat Security Response Team has rated this update as having
Important security impact. A Common Vulnerability Scoring System (CVSS)
base score, which gives a detailed severity rating, is available from the
CVE link in the References section.
Details
Red Hat JBoss Enterprise Application Platform 6 is a platform for Java
applications based on JBoss Application Server 7.
OpenSSL is a toolkit that implements the Secure Sockets Layer (SSL v2/v3)
and Transport Layer Security (TLS v1) protocols, as well as a
full-strength, general purpose cryptography library.
It was found that OpenSSL clients and servers could be forced, via a
specially crafted handshake packet, to use weak keying material for
communication. A man-in-the-middle attacker could use this flaw to decrypt
and modify traffic between a client and a server. (CVE-2014-0224)
Note: In order to exploit this flaw, both the server and the client must be
using a vulnerable version of OpenSSL; the server must be using OpenSSL
version 1.0.1 and above, and the client must be using any version of
OpenSSL. Red Hat JBoss Enterprise Application Platform includes OpenSSL
0.9.8e, so this flaw is only exploitable when OpenSSL in JBoss EAP is used
as a client, communicating with a vulnerable server running OpenSSL version
1.0.1 and above. For more information about this flaw, refer to:
https://access.redhat.com/site/articles/904433
Red Hat would like to thank the OpenSSL project for reporting this issue.
Upstream acknowledges KIKUCHI Masashi of Lepidum as the original reporter
of this issue.
All users of Red Hat JBoss Enterprise Application Platform 6.2.3 as
provided from the Red Hat Customer Portal are advised to apply this update.
The JBoss server process must be restarted for the update to take effect.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ document: { aggregate_severity: { namespace: "https://access.redhat.com/security/updates/classification/", text: "Important", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright © Red Hat, Inc. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "An update for Red Hat JBoss Enterprise Application Platform 6.2.3 that\nfixes one security issue is now available from the Red Hat Customer Portal.\n\nThe Red Hat Security Response Team has rated this update as having\nImportant security impact. A Common Vulnerability Scoring System (CVSS)\nbase score, which gives a detailed severity rating, is available from the\nCVE link in the References section.", title: "Topic", }, { category: "general", text: "Red Hat JBoss Enterprise Application Platform 6 is a platform for Java\napplications based on JBoss Application Server 7.\n\nOpenSSL is a toolkit that implements the Secure Sockets Layer (SSL v2/v3)\nand Transport Layer Security (TLS v1) protocols, as well as a\nfull-strength, general purpose cryptography library.\n\nIt was found that OpenSSL clients and servers could be forced, via a\nspecially crafted handshake packet, to use weak keying material for\ncommunication. A man-in-the-middle attacker could use this flaw to decrypt\nand modify traffic between a client and a server. (CVE-2014-0224)\n\nNote: In order to exploit this flaw, both the server and the client must be\nusing a vulnerable version of OpenSSL; the server must be using OpenSSL\nversion 1.0.1 and above, and the client must be using any version of\nOpenSSL. Red Hat JBoss Enterprise Application Platform includes OpenSSL\n0.9.8e, so this flaw is only exploitable when OpenSSL in JBoss EAP is used\nas a client, communicating with a vulnerable server running OpenSSL version\n1.0.1 and above. For more information about this flaw, refer to:\nhttps://access.redhat.com/site/articles/904433\n\nRed Hat would like to thank the OpenSSL project for reporting this issue.\nUpstream acknowledges KIKUCHI Masashi of Lepidum as the original reporter\nof this issue.\n\nAll users of Red Hat JBoss Enterprise Application Platform 6.2.3 as\nprovided from the Red Hat Customer Portal are advised to apply this update.\nThe JBoss server process must be restarted for the update to take effect.", title: "Details", }, { category: "legal_disclaimer", text: "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", title: "Terms of Use", }, ], publisher: { category: "vendor", contact_details: "https://access.redhat.com/security/team/contact/", issuing_authority: "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", name: "Red Hat Product Security", namespace: "https://www.redhat.com", }, references: [ { category: "self", summary: "https://access.redhat.com/errata/RHSA-2014:0631", url: "https://access.redhat.com/errata/RHSA-2014:0631", }, { category: "external", summary: "https://access.redhat.com/security/updates/classification/#important", url: "https://access.redhat.com/security/updates/classification/#important", }, { category: "external", summary: "https://access.redhat.com/site/articles/904433", url: "https://access.redhat.com/site/articles/904433", }, { category: "external", summary: "https://access.redhat.com/site/solutions/906533", url: "https://access.redhat.com/site/solutions/906533", }, { category: "external", summary: "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?product=appplatform&downloadType=securityPatches&version=6.2.0", url: "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?product=appplatform&downloadType=securityPatches&version=6.2.0", }, { category: "external", summary: "1103586", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1103586", }, { category: "self", summary: "Canonical URL", url: "https://security.access.redhat.com/data/csaf/v2/advisories/2014/rhsa-2014_0631.json", }, ], title: "Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 6.2.3 security update", tracking: { current_release_date: "2024-11-22T08:02:53+00:00", generator: { date: "2024-11-22T08:02:53+00:00", engine: { name: "Red Hat SDEngine", version: "4.2.1", }, }, id: "RHSA-2014:0631", initial_release_date: "2014-06-05T15:27:34+00:00", revision_history: [ { date: "2014-06-05T15:27:34+00:00", number: "1", summary: "Initial version", }, { date: "2019-02-20T12:33:16+00:00", number: "2", summary: "Last updated version", }, { date: "2024-11-22T08:02:53+00:00", number: "3", summary: "Last generated version", }, ], status: "final", version: "3", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_name", name: "Red Hat JBoss Enterprise Application Platform 6.2", product: { name: "Red Hat JBoss Enterprise Application Platform 6.2", product_id: "Red Hat JBoss Enterprise Application Platform 6.2", product_identification_helper: { cpe: "cpe:/a:redhat:jboss_enterprise_application_platform:6.2", }, }, }, ], category: "product_family", name: "Red Hat JBoss Enterprise Application Platform", }, ], category: "vendor", name: "Red Hat", }, ], }, vulnerabilities: [ { acknowledgments: [ { names: [ "OpenSSL project", ], }, { names: [ "KIKUCHI Masashi", ], organization: "Lepidum", summary: "Acknowledged by upstream.", }, ], cve: "CVE-2014-0224", cwe: { id: "CWE-841", name: "Improper Enforcement of Behavioral Workflow", }, discovery_date: "2014-06-02T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1103586", }, ], notes: [ { category: "description", text: "It was found that OpenSSL clients and servers could be forced, via a specially crafted handshake packet, to use weak keying material for communication. A man-in-the-middle attacker could use this flaw to decrypt and modify traffic between a client and a server.", title: "Vulnerability description", }, { category: "summary", text: "openssl: SSL/TLS MITM vulnerability", title: "Vulnerability summary", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "Red Hat JBoss Enterprise Application Platform 6.2", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2014-0224", }, { category: "external", summary: "RHBZ#1103586", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1103586", }, { category: "external", summary: "RHSB-OpenSSL-CCS-Injection", url: "https://access.redhat.com/security/vulnerabilities/OpenSSL-CCS-Injection", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2014-0224", url: "https://www.cve.org/CVERecord?id=CVE-2014-0224", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2014-0224", url: "https://nvd.nist.gov/vuln/detail/CVE-2014-0224", }, { category: "external", summary: "https://access.redhat.com/site/articles/904433", url: "https://access.redhat.com/site/articles/904433", }, { category: "external", summary: "https://access.redhat.com/site/solutions/905793", url: "https://access.redhat.com/site/solutions/905793", }, { category: "external", summary: "https://www.openssl.org/news/secadv_20140605.txt", url: "https://www.openssl.org/news/secadv_20140605.txt", }, ], release_date: "2014-06-05T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2014-06-05T15:27:34+00:00", details: "The References section of this erratum contains a download link (you must\nlog in to download the update). Before applying this update, back up your\nexisting Red Hat JBoss Enterprise Application Platform installation and\ndeployed applications (including all applications and configuration files).", product_ids: [ "Red Hat JBoss Enterprise Application Platform 6.2", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2014:0631", }, ], scores: [ { cvss_v2: { accessComplexity: "MEDIUM", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "NONE", baseScore: 5.8, confidentialityImpact: "PARTIAL", integrityImpact: "PARTIAL", vectorString: "AV:N/AC:M/Au:N/C:P/I:P/A:N", version: "2.0", }, products: [ "Red Hat JBoss Enterprise Application Platform 6.2", ], }, ], threats: [ { category: "impact", details: "Important", }, ], title: "openssl: SSL/TLS MITM vulnerability", }, ], }
cve-2014-0224
Vulnerability from cvelistv5
Published
2014-06-05 21:00
Modified
2024-08-06 09:05
Severity ?
EPSS score ?
Summary
OpenSSL before 0.9.8za, 1.0.0 before 1.0.0m, and 1.0.1 before 1.0.1h does not properly restrict processing of ChangeCipherSpec messages, which allows man-in-the-middle attackers to trigger use of a zero-length master key in certain OpenSSL-to-OpenSSL communications, and consequently hijack sessions or obtain sensitive information, via a crafted TLS handshake, aka the "CCS Injection" vulnerability.
References
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-06T09:05:39.462Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "59342", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/59342", }, { name: "59669", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/59669", }, { name: "59525", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/59525", }, { name: "HPSBMU03071", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=140604261522465&w=2", }, { name: "59004", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/59004", }, { name: "59530", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/59530", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21675626", }, { name: "59824", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/59824", }, { name: "59282", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/59282", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.novell.com/support/kb/doc.php?id=7015300", }, { name: "59215", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/59215", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://bugzilla.redhat.com/show_bug.cgi?id=1103586", }, { name: "59990", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/59990", }, { name: "59264", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/59264", }, { name: "59454", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/59454", }, { name: "58492", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/58492", }, { name: "59186", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/59186", }, { name: "59188", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/59188", }, { name: "59126", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/59126", }, { name: "HPSBMU03078", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=140672208601650&w=2", }, { name: "HPSBMU03089", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=140784085708882&w=2", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.novell.com/support/kb/doc.php?id=7015264", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://support.f5.com/kb/en-us/solutions/public/15000/300/sol15325.html", }, { name: "59306", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/59306", }, { name: "RHSA-2014:0627", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "http://rhn.redhat.com/errata/RHSA-2014-0627.html", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.websense.com/support/article/kbarticle/Vulnerabilities-resolved-in-TRITON-APX-Version-8-0", }, { name: "HPSBGN03068", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=140544599631400&w=2", }, { name: "RHSA-2014:0626", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "http://rhn.redhat.com/errata/RHSA-2014-0626.html", }, { name: "59190", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/59190", }, { name: "58639", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/58639", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21678289", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.ibm.com/support/docview.wss?uid=swg21676877", }, { name: "59446", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/59446", }, { name: "59529", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/59529", }, { name: "59445", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/59445", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.vmware.com/security/advisories/VMSA-2014-0012.html", }, { name: "59589", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/59589", }, { name: "59894", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/59894", }, { name: "59325", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/59325", }, { name: "59354", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/59354", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg24037729", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21677131", }, { name: "HPSBUX03046", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=140266410314613&w=2", }, { name: "61254", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/61254", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21678233", }, { name: "59447", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/59447", }, { name: "1031594", tags: [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred", ], url: "http://www.securitytracker.com/id/1031594", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21676655", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www14.software.ibm.com/webapp/set2/subscriptions/pqvcmjd?mode=18&ID=6061&myns=phmc&mync=E", }, { name: "59223", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/59223", }, { name: "58743", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/58743", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html", }, { name: "58719", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/58719", }, { name: "59449", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/59449", }, { name: "59132", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/59132", }, { name: "SSRT101818", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=142350350616251&w=2", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www-01.ibm.com/support/docview.wss?uid=isg400001843", }, { name: "HPSBST03098", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=140870499402361&w=2", }, { name: "HPSBMU03058", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=140386311427810&w=2", }, { name: "59442", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/59442", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05301946", }, { name: "HPSBOV03047", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=140317760000786&w=2", }, { name: "HPSBST03195", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=142805027510172&w=2", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21676879", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg24037761", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21677828", }, { name: "59441", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/59441", }, { name: "HPSBMU03074", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=140621259019789&w=2", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.innominate.com/data/downloads/manuals/mdm_1.5.2.1_Release_Notes.pdf", }, { name: "HPSBMU03094", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=140852757108392&w=2", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://filezilla-project.org/versions.php?type=server", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21676786", }, { name: "60567", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/60567", }, { name: "59189", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/59189", }, { name: "59368", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/59368", }, { name: "MDVSA-2014:106", tags: [ "vendor-advisory", "x_refsource_MANDRIVA", "x_transferred", ], url: "http://www.mandriva.com/security/advisories?name=MDVSA-2014:106", }, { name: "59142", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/59142", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21676478", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21676845", }, { name: "58742", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/58742", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://www.ibm.com/support/docview.wss?uid=ssg1S1004670", }, { name: "RHSA-2014:0624", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "http://rhn.redhat.com/errata/RHSA-2014-0624.html", }, { name: "59602", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/59602", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.kerio.com/support/kerio-control/release-history", }, { name: "59300", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/59300", }, { name: "58930", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/58930", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21677080", }, { name: "61815", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/61815", }, { name: "58667", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/58667", }, { name: "GLSA-201407-05", tags: [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred", ], url: "http://security.gentoo.org/glsa/glsa-201407-05.xml", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21677390", }, { name: "59191", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/59191", }, { name: "59284", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/59284", }, { name: "59444", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/59444", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://www.imperialviolet.org/2014/06/05/earlyccs.html", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.ibm.com/support/docview.wss?uid=swg24037783", }, { name: "59365", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/59365", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21677695", }, { name: "59305", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/59305", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21676529", }, { name: "59483", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/59483", }, { name: "58385", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/58385", }, { name: "20141205 NEW: VMSA-2014-0012 - VMware vSphere product updates address security vulnerabilities", tags: [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred", ], url: "http://www.securityfocus.com/archive/1/534161/100/0/threaded", }, { name: "59495", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/59495", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www-01.ibm.com/support/docview.wss?uid=nas8N1020163", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21676889", }, { name: "FEDORA-2014-9308", tags: [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred", ], url: "http://lists.fedoraproject.org/pipermail/package-announce/2014-August/136473.html", }, { name: "58945", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/58945", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www-01.ibm.com/support/docview.wss?uid=isg400001841", }, { name: "HPSBST03106", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=141025641601169&w=2", }, { name: "59659", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/59659", }, { name: "59440", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/59440", }, { name: "openSUSE-SU-2016:0640", tags: [ "vendor-advisory", "x_refsource_SUSE", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00011.html", }, { name: "59429", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/59429", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html", }, { name: "59655", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/59655", }, { name: "59370", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/59370", }, { name: "59827", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/59827", }, { name: "58660", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/58660", }, { name: "59163", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/59163", }, { name: "58716", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/58716", }, { name: "59055", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/59055", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21676071", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=migr-5095737", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21677836", }, { name: "59437", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/59437", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5095754", }, { name: "60176", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/60176", }, { name: "HPSBPI03107", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=141147110427269&w=2", }, { name: "59101", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/59101", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://esupport.trendmicro.com/solution/en-US/1103813.aspx", }, { name: "59374", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/59374", }, { name: "59063", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/59063", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.vmware.com/security/advisories/VMSA-2014-0006.html", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://discussions.nessus.org/thread/7517", }, { name: "59310", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/59310", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21676501", }, { name: "HPSBMU03216", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=142350350616251&w=2", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21676536", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://aix.software.ibm.com/aix/efixes/security/openssl_advisory9.asc", }, { name: "IV61506", tags: [ "vendor-advisory", "x_refsource_AIXAPAR", "x_transferred", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg1IV61506", }, { name: "59502", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/59502", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.splunk.com/view/SP-CAAAM2D", }, { name: "59878", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/59878", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.fortiguard.com/advisory/FG-IR-14-018/", }, { name: "SUSE-SU-2015:0743", tags: [ "vendor-advisory", "x_refsource_SUSE", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.html", }, { name: "HPSBMU03101", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=140852826008699&w=2", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.ibm.com/support/docview.wss?uid=swg21676793", }, { name: "59214", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/59214", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.ibm.com/support/docview.wss?uid=swg21676356", }, { name: "HPSBHF03088", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=140794476212181&w=2", }, { name: "HPSBMU03057", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=140389274407904&w=2", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://support.citrix.com/article/CTX140876", }, { name: "59167", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/59167", }, { name: "59120", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/59120", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg24037732", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5095757", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www-01.ibm.com/support/docview.wss?uid=nas8N1020172", }, { name: "HPSBMU03053", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=140369637402535&w=2", }, { name: "59380", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/59380", }, { name: "MDVSA-2014:105", tags: [ "vendor-advisory", "x_refsource_MANDRIVA", "x_transferred", ], url: "http://www.mandriva.com/security/advisories?name=MDVSA-2014:105", }, { name: "59460", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/59460", }, { name: "59506", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/59506", }, { name: "58939", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/58939", }, { name: "SSRT101590", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=140266410314613&w=2", }, { name: "59661", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/59661", }, { name: "59514", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/59514", }, { name: "59677", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/59677", }, { name: "RHSA-2014:0630", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "http://rhn.redhat.com/errata/RHSA-2014-0630.html", }, { name: "20140605 Multiple Vulnerabilities in OpenSSL Affecting Cisco Products", tags: [ "vendor-advisory", "x_refsource_CISCO", "x_transferred", ], url: "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140605-openssl", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://kb.juniper.net/InfoCenter/index?page=content&id=KB29195", }, { name: "RHSA-2014:0632", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "http://rhn.redhat.com/errata/RHSA-2014-0632.html", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg24037730", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://kc.mcafee.com/corporate/index?page=content&id=SB10075", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg24037731", }, { name: "58745", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/58745", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21676419", }, { name: "59438", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/59438", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.ibm.com/support/docview.wss?uid=isg3T1020948", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21676496", }, { name: "58714", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/58714", }, { name: "HPSBGN03050", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=140482916501310&w=2", }, { name: "openSUSE-SU-2015:0229", tags: [ "vendor-advisory", "x_refsource_SUSE", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-updates/2015-02/msg00030.html", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "http://ccsinjection.lepidum.co.jp", }, { name: "59435", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/59435", }, { name: "HPSBHF03052", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=141658880509699&w=2", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.openssl.org/news/secadv_20140605.txt", }, { name: "58615", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/58615", }, { name: "HPSBST03265", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=142546741516006&w=2", }, { name: "20141205 NEW: VMSA-2014-0012 - VMware vSphere product updates address security vulnerabilities", tags: [ "mailing-list", "x_refsource_FULLDISC", "x_transferred", ], url: "http://seclists.org/fulldisclosure/2014/Dec/23", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21676644", }, { name: "59231", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/59231", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://www.ibm.com/support/docview.wss?uid=ssg1S1004671", }, { name: "SUSE-SU-2015:0578", tags: [ "vendor-advisory", "x_refsource_SUSE", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00027.html", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://support.apple.com/kb/HT6443", }, { name: "59211", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/59211", }, { name: "58433", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/58433", }, { name: "60066", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/60066", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://dev.mysql.com/doc/relnotes/workbench/en/wb-news-6-1-7.html", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://access.redhat.com/site/blogs/766093/posts/908133", }, { name: "59301", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/59301", }, { name: "60522", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/60522", }, { name: "59784", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/59784", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://kb.bluecoat.com/index?page=content&id=SA80", }, { name: "HPSBST03097", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=141383410222440&w=2", }, { name: "20140607 Re: More OpenSSL issues", tags: [ "mailing-list", "x_refsource_FULLDISC", "x_transferred", ], url: "http://seclists.org/fulldisclosure/2014/Jun/38", }, { name: "HPSBMU03076", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=140904544427729&w=2", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.f-secure.com/en/web/labs_global/fsc-2014-6", }, { name: "59135", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/59135", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10629", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21678167", }, { name: "58759", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/58759", }, { name: "59093", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/59093", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5095740", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://puppetlabs.com/security/cve/cve-2014-0224", }, { name: "59192", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/59192", }, { name: "FEDORA-2014-9301", tags: [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred", ], url: "http://lists.fedoraproject.org/pipermail/package-announce/2014-August/136470.html", }, { name: "HPSBMU03062", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=140752315422991&w=2", }, { name: "58579", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/58579", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://www.intersectalliance.com/wp-content/uploads/release_notes/ReleaseNotes_for_SNARE_for_MSSQL.pdf", }, { name: "59040", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/59040", }, { name: "HPSBMU03056", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=140389355508263&w=2", }, { name: "59175", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/59175", }, { name: "60819", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/60819", }, { name: "HPSBMU03051", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=140448122410568&w=2", }, { name: "59666", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/59666", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.tenable.com/blog/nessus-527-and-pvs-403-are-available-for-download", }, { name: "58128", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/58128", }, { name: "HPSBMU03055", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=140431828824371&w=2", }, { name: "59413", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/59413", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21676334", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21675821", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg24037870", }, { name: "59721", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/59721", }, { name: "HPSBHF03145", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=141383465822787&w=2", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5095756", }, { name: "RHSA-2014:0680", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "http://rhn.redhat.com/errata/RHSA-2014-0680.html", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21676062", }, { name: "59012", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/59012", }, { name: "58713", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/58713", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21673137", }, { name: "59362", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/59362", }, { name: "MDVSA-2015:062", tags: [ "vendor-advisory", "x_refsource_MANDRIVA", "x_transferred", ], url: "http://www.mandriva.com/security/advisories?name=MDVSA-2015:062", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21676035", }, { name: "HPSBMU03070", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=140499864129699&w=2", }, { name: "RHSA-2014:0631", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "http://rhn.redhat.com/errata/RHSA-2014-0631.html", }, { name: "59338", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/59338", }, { name: "59450", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/59450", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://linux.oracle.com/errata/ELSA-2014-1053.html", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html", }, { name: "VU#978508", tags: [ "third-party-advisory", "x_refsource_CERT-VN", "x_transferred", ], url: "http://www.kb.cert.org/vuls/id/978508", }, { name: "1031032", tags: [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred", ], url: "http://www.securitytracker.com/id/1031032", }, { name: "59287", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/59287", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://blogs.oracle.com/sunsecurity/entry/cve_2014_0224_cryptographic_issues1", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21683332", }, { name: "59491", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/59491", }, { name: "59364", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/59364", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://blogs.oracle.com/sunsecurity/entry/cve_2014_0224_cryptographic_issues", }, { name: "59451", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/59451", }, { name: "58977", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/58977", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://www.novell.com/support/kb/doc.php?id=7015271", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21676333", }, { name: "60571", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/60571", }, { name: "59459", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/59459", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21676833", }, { name: "60577", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/60577", }, { name: "59448", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/59448", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commit%3Bh=bc8923b1ec9c467755cd86f7848c50ee8812e441", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://www.intersectalliance.com/wp-content/uploads/release_notes/ReleaseNotes_for_Snare_for_Windows.pdf", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.blackberry.com/btsc/KB36051", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5095755", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-345106.htm", }, { name: "HPSBST03103", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=141164638606214&w=2", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004690", }, { name: "59885", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/59885", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21677527", }, { name: "59202", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/59202", }, { name: "RHSA-2014:0633", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "http://rhn.redhat.com/errata/RHSA-2014-0633.html", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.ibm.com/support/docview.wss?uid=ssg1S1004678", }, { name: "59375", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/59375", }, { name: "HPSBMU03083", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=140983229106599&w=2", }, { name: "59528", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/59528", }, { name: "58337", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/58337", }, { name: "59518", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/59518", }, { name: "59389", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/59389", }, { name: "59162", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/59162", }, { name: "59383", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/59383", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21677567", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://kb.juniper.net/InfoCenter/index?page=content&id=KB29217", }, { name: "59490", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/59490", }, { name: "59916", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/59916", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www14.software.ibm.com/webapp/set2/subscriptions/pqvcmjd?mode=18&ID=6060&myns=phmc&mync=E", }, { name: "HPSBMU03065", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=140491231331543&w=2", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg24037727", }, { name: "IT02314", tags: [ "vendor-advisory", "x_refsource_AIXAPAR", "x_transferred", ], url: "http://www.ibm.com/support/docview.wss?uid=swg1IT02314", }, { name: "59043", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/59043", }, { name: "59347", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/59347", }, { name: "60049", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/60049", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21676615", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://cert-portal.siemens.com/productcert/pdf/ssa-234763.pdf", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://www.arista.com/en/support/advisories-notices/security-advisories/941-security-advisory-0005", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2014-06-05T00:00:00", descriptions: [ { lang: "en", value: "OpenSSL before 0.9.8za, 1.0.0 before 1.0.0m, and 1.0.1 before 1.0.1h does not properly restrict processing of ChangeCipherSpec messages, which allows man-in-the-middle attackers to trigger use of a zero-length master key in certain OpenSSL-to-OpenSSL communications, and consequently hijack sessions or obtain sensitive information, via a crafted TLS handshake, aka the \"CCS Injection\" vulnerability.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2021-11-05T16:47:29", orgId: "53f830b8-0a3f-465b-8143-3b8a9948e749", shortName: "redhat", }, references: [ { name: "59342", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/59342", }, { name: "59669", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/59669", }, { name: "59525", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/59525", }, { name: "HPSBMU03071", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=140604261522465&w=2", }, { name: "59004", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/59004", }, { name: "59530", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/59530", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21675626", }, { name: "59824", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/59824", }, { name: "59282", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/59282", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www.novell.com/support/kb/doc.php?id=7015300", }, { name: "59215", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/59215", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://bugzilla.redhat.com/show_bug.cgi?id=1103586", }, { name: "59990", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/59990", }, { name: "59264", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/59264", }, { name: "59454", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/59454", }, { name: "58492", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/58492", }, { name: "59186", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/59186", }, { name: "59188", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/59188", }, { name: "59126", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/59126", }, { name: "HPSBMU03078", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=140672208601650&w=2", }, { name: "HPSBMU03089", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=140784085708882&w=2", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www.novell.com/support/kb/doc.php?id=7015264", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://support.f5.com/kb/en-us/solutions/public/15000/300/sol15325.html", }, { name: "59306", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/59306", }, { name: "RHSA-2014:0627", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "http://rhn.redhat.com/errata/RHSA-2014-0627.html", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www.websense.com/support/article/kbarticle/Vulnerabilities-resolved-in-TRITON-APX-Version-8-0", }, { name: "HPSBGN03068", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=140544599631400&w=2", }, { name: "RHSA-2014:0626", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "http://rhn.redhat.com/errata/RHSA-2014-0626.html", }, { name: "59190", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/59190", }, { name: "58639", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/58639", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21678289", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www.ibm.com/support/docview.wss?uid=swg21676877", }, { name: "59446", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/59446", }, { name: "59529", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/59529", }, { name: "59445", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/59445", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www.vmware.com/security/advisories/VMSA-2014-0012.html", }, { name: "59589", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/59589", }, { name: "59894", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/59894", }, { name: "59325", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/59325", }, { name: "59354", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/59354", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg24037729", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21677131", }, { name: "HPSBUX03046", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=140266410314613&w=2", }, { name: "61254", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/61254", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21678233", }, { name: "59447", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/59447", }, { name: "1031594", tags: [ "vdb-entry", "x_refsource_SECTRACK", ], url: "http://www.securitytracker.com/id/1031594", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21676655", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www14.software.ibm.com/webapp/set2/subscriptions/pqvcmjd?mode=18&ID=6061&myns=phmc&mync=E", }, { name: "59223", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/59223", }, { name: "58743", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/58743", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html", }, { name: "58719", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/58719", }, { name: "59449", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/59449", }, { name: "59132", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/59132", }, { name: "SSRT101818", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=142350350616251&w=2", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www-01.ibm.com/support/docview.wss?uid=isg400001843", }, { name: "HPSBST03098", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=140870499402361&w=2", }, { name: "HPSBMU03058", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=140386311427810&w=2", }, { name: "59442", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/59442", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05301946", }, { name: "HPSBOV03047", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=140317760000786&w=2", }, { name: "HPSBST03195", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=142805027510172&w=2", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21676879", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg24037761", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21677828", }, { name: "59441", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/59441", }, { name: "HPSBMU03074", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=140621259019789&w=2", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www.innominate.com/data/downloads/manuals/mdm_1.5.2.1_Release_Notes.pdf", }, { name: "HPSBMU03094", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=140852757108392&w=2", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://filezilla-project.org/versions.php?type=server", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21676786", }, { name: "60567", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/60567", }, { name: "59189", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/59189", }, { name: "59368", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/59368", }, { name: "MDVSA-2014:106", tags: [ "vendor-advisory", "x_refsource_MANDRIVA", ], url: "http://www.mandriva.com/security/advisories?name=MDVSA-2014:106", }, { name: "59142", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/59142", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21676478", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21676845", }, { name: "58742", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/58742", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://www.ibm.com/support/docview.wss?uid=ssg1S1004670", }, { name: "RHSA-2014:0624", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "http://rhn.redhat.com/errata/RHSA-2014-0624.html", }, { name: "59602", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/59602", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www.kerio.com/support/kerio-control/release-history", }, { name: "59300", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/59300", }, { name: "58930", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/58930", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21677080", }, { name: "61815", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/61815", }, { name: "58667", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/58667", }, { name: "GLSA-201407-05", tags: [ "vendor-advisory", "x_refsource_GENTOO", ], url: "http://security.gentoo.org/glsa/glsa-201407-05.xml", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21677390", }, { name: "59191", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/59191", }, { name: "59284", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/59284", }, { name: "59444", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/59444", }, { tags: [ "x_refsource_MISC", ], url: "https://www.imperialviolet.org/2014/06/05/earlyccs.html", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www.ibm.com/support/docview.wss?uid=swg24037783", }, { name: "59365", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/59365", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21677695", }, { name: "59305", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/59305", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21676529", }, { name: "59483", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/59483", }, { name: "58385", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/58385", }, { name: "20141205 NEW: VMSA-2014-0012 - VMware vSphere product updates address security vulnerabilities", tags: [ "mailing-list", "x_refsource_BUGTRAQ", ], url: "http://www.securityfocus.com/archive/1/534161/100/0/threaded", }, { name: "59495", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/59495", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www-01.ibm.com/support/docview.wss?uid=nas8N1020163", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21676889", }, { name: "FEDORA-2014-9308", tags: [ "vendor-advisory", "x_refsource_FEDORA", ], url: "http://lists.fedoraproject.org/pipermail/package-announce/2014-August/136473.html", }, { name: "58945", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/58945", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www-01.ibm.com/support/docview.wss?uid=isg400001841", }, { name: "HPSBST03106", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=141025641601169&w=2", }, { name: "59659", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/59659", }, { name: "59440", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/59440", }, { name: "openSUSE-SU-2016:0640", tags: [ "vendor-advisory", "x_refsource_SUSE", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00011.html", }, { name: "59429", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/59429", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html", }, { name: "59655", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/59655", }, { name: "59370", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/59370", }, { name: "59827", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/59827", }, { name: "58660", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/58660", }, { name: "59163", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/59163", }, { name: "58716", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/58716", }, { name: "59055", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/59055", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21676071", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=migr-5095737", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21677836", }, { name: "59437", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/59437", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5095754", }, { name: "60176", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/60176", }, { name: "HPSBPI03107", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=141147110427269&w=2", }, { name: "59101", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/59101", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://esupport.trendmicro.com/solution/en-US/1103813.aspx", }, { name: "59374", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/59374", }, { name: "59063", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/59063", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www.vmware.com/security/advisories/VMSA-2014-0006.html", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://discussions.nessus.org/thread/7517", }, { name: "59310", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/59310", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21676501", }, { name: "HPSBMU03216", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=142350350616251&w=2", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21676536", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://aix.software.ibm.com/aix/efixes/security/openssl_advisory9.asc", }, { name: "IV61506", tags: [ "vendor-advisory", "x_refsource_AIXAPAR", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg1IV61506", }, { name: "59502", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/59502", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www.splunk.com/view/SP-CAAAM2D", }, { name: "59878", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/59878", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www.fortiguard.com/advisory/FG-IR-14-018/", }, { name: "SUSE-SU-2015:0743", tags: [ "vendor-advisory", "x_refsource_SUSE", ], url: "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.html", }, { name: "HPSBMU03101", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=140852826008699&w=2", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www.ibm.com/support/docview.wss?uid=swg21676793", }, { name: "59214", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/59214", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www.ibm.com/support/docview.wss?uid=swg21676356", }, { name: "HPSBHF03088", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=140794476212181&w=2", }, { name: "HPSBMU03057", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=140389274407904&w=2", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://support.citrix.com/article/CTX140876", }, { name: "59167", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/59167", }, { name: "59120", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/59120", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg24037732", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5095757", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www-01.ibm.com/support/docview.wss?uid=nas8N1020172", }, { name: "HPSBMU03053", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=140369637402535&w=2", }, { name: "59380", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/59380", }, { name: "MDVSA-2014:105", tags: [ "vendor-advisory", "x_refsource_MANDRIVA", ], url: "http://www.mandriva.com/security/advisories?name=MDVSA-2014:105", }, { name: "59460", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/59460", }, { name: "59506", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/59506", }, { name: "58939", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/58939", }, { name: "SSRT101590", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=140266410314613&w=2", }, { name: "59661", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/59661", }, { name: "59514", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/59514", }, { name: "59677", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/59677", }, { name: "RHSA-2014:0630", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "http://rhn.redhat.com/errata/RHSA-2014-0630.html", }, { name: "20140605 Multiple Vulnerabilities in OpenSSL Affecting Cisco Products", tags: [ "vendor-advisory", "x_refsource_CISCO", ], url: "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140605-openssl", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://kb.juniper.net/InfoCenter/index?page=content&id=KB29195", }, { name: "RHSA-2014:0632", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "http://rhn.redhat.com/errata/RHSA-2014-0632.html", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg24037730", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://kc.mcafee.com/corporate/index?page=content&id=SB10075", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg24037731", }, { name: "58745", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/58745", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21676419", }, { name: "59438", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/59438", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www.ibm.com/support/docview.wss?uid=isg3T1020948", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21676496", }, { name: "58714", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/58714", }, { name: "HPSBGN03050", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=140482916501310&w=2", }, { name: "openSUSE-SU-2015:0229", tags: [ "vendor-advisory", "x_refsource_SUSE", ], url: "http://lists.opensuse.org/opensuse-updates/2015-02/msg00030.html", }, { tags: [ "x_refsource_MISC", ], url: "http://ccsinjection.lepidum.co.jp", }, { name: "59435", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/59435", }, { name: "HPSBHF03052", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=141658880509699&w=2", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www.openssl.org/news/secadv_20140605.txt", }, { name: "58615", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/58615", }, { name: "HPSBST03265", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=142546741516006&w=2", }, { name: "20141205 NEW: VMSA-2014-0012 - VMware vSphere product updates address security vulnerabilities", tags: [ "mailing-list", "x_refsource_FULLDISC", ], url: "http://seclists.org/fulldisclosure/2014/Dec/23", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21676644", }, { name: "59231", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/59231", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://www.ibm.com/support/docview.wss?uid=ssg1S1004671", }, { name: "SUSE-SU-2015:0578", tags: [ "vendor-advisory", "x_refsource_SUSE", ], url: "http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00027.html", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://support.apple.com/kb/HT6443", }, { name: "59211", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/59211", }, { name: "58433", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/58433", }, { name: "60066", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/60066", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://dev.mysql.com/doc/relnotes/workbench/en/wb-news-6-1-7.html", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://access.redhat.com/site/blogs/766093/posts/908133", }, { name: "59301", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/59301", }, { name: "60522", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/60522", }, { name: "59784", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/59784", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://kb.bluecoat.com/index?page=content&id=SA80", }, { name: "HPSBST03097", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=141383410222440&w=2", }, { name: "20140607 Re: More OpenSSL issues", tags: [ "mailing-list", "x_refsource_FULLDISC", ], url: "http://seclists.org/fulldisclosure/2014/Jun/38", }, { name: "HPSBMU03076", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=140904544427729&w=2", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www.f-secure.com/en/web/labs_global/fsc-2014-6", }, { name: "59135", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/59135", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10629", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21678167", }, { name: "58759", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/58759", }, { name: "59093", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/59093", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5095740", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://puppetlabs.com/security/cve/cve-2014-0224", }, { name: "59192", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/59192", }, { name: "FEDORA-2014-9301", tags: [ "vendor-advisory", "x_refsource_FEDORA", ], url: "http://lists.fedoraproject.org/pipermail/package-announce/2014-August/136470.html", }, { name: "HPSBMU03062", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=140752315422991&w=2", }, { name: "58579", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/58579", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://www.intersectalliance.com/wp-content/uploads/release_notes/ReleaseNotes_for_SNARE_for_MSSQL.pdf", }, { name: "59040", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/59040", }, { name: "HPSBMU03056", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=140389355508263&w=2", }, { name: "59175", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/59175", }, { name: "60819", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/60819", }, { name: "HPSBMU03051", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=140448122410568&w=2", }, { name: "59666", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/59666", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www.tenable.com/blog/nessus-527-and-pvs-403-are-available-for-download", }, { name: "58128", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/58128", }, { name: "HPSBMU03055", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=140431828824371&w=2", }, { name: "59413", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/59413", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21676334", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21675821", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg24037870", }, { name: "59721", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/59721", }, { name: "HPSBHF03145", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=141383465822787&w=2", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5095756", }, { name: "RHSA-2014:0680", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "http://rhn.redhat.com/errata/RHSA-2014-0680.html", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21676062", }, { name: "59012", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/59012", }, { name: "58713", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/58713", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21673137", }, { name: "59362", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/59362", }, { name: "MDVSA-2015:062", tags: [ "vendor-advisory", "x_refsource_MANDRIVA", ], url: "http://www.mandriva.com/security/advisories?name=MDVSA-2015:062", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21676035", }, { name: "HPSBMU03070", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=140499864129699&w=2", }, { name: "RHSA-2014:0631", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "http://rhn.redhat.com/errata/RHSA-2014-0631.html", }, { name: "59338", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/59338", }, { name: "59450", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/59450", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://linux.oracle.com/errata/ELSA-2014-1053.html", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html", }, { name: "VU#978508", tags: [ "third-party-advisory", "x_refsource_CERT-VN", ], url: "http://www.kb.cert.org/vuls/id/978508", }, { name: "1031032", tags: [ "vdb-entry", "x_refsource_SECTRACK", ], url: "http://www.securitytracker.com/id/1031032", }, { name: "59287", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/59287", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://blogs.oracle.com/sunsecurity/entry/cve_2014_0224_cryptographic_issues1", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21683332", }, { name: "59491", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/59491", }, { name: "59364", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/59364", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://blogs.oracle.com/sunsecurity/entry/cve_2014_0224_cryptographic_issues", }, { name: "59451", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/59451", }, { name: "58977", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/58977", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://www.novell.com/support/kb/doc.php?id=7015271", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21676333", }, { name: "60571", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/60571", }, { name: "59459", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/59459", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21676833", }, { name: "60577", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/60577", }, { name: "59448", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/59448", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commit%3Bh=bc8923b1ec9c467755cd86f7848c50ee8812e441", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://www.intersectalliance.com/wp-content/uploads/release_notes/ReleaseNotes_for_Snare_for_Windows.pdf", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www.blackberry.com/btsc/KB36051", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5095755", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-345106.htm", }, { name: "HPSBST03103", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=141164638606214&w=2", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004690", }, { name: "59885", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/59885", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21677527", }, { name: "59202", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/59202", }, { name: "RHSA-2014:0633", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "http://rhn.redhat.com/errata/RHSA-2014-0633.html", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www.ibm.com/support/docview.wss?uid=ssg1S1004678", }, { name: "59375", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/59375", }, { name: "HPSBMU03083", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=140983229106599&w=2", }, { name: "59528", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/59528", }, { name: "58337", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/58337", }, { name: "59518", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/59518", }, { name: "59389", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/59389", }, { name: "59162", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/59162", }, { name: "59383", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/59383", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21677567", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://kb.juniper.net/InfoCenter/index?page=content&id=KB29217", }, { name: "59490", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/59490", }, { name: "59916", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/59916", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www14.software.ibm.com/webapp/set2/subscriptions/pqvcmjd?mode=18&ID=6060&myns=phmc&mync=E", }, { name: "HPSBMU03065", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=140491231331543&w=2", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg24037727", }, { name: "IT02314", tags: [ "vendor-advisory", "x_refsource_AIXAPAR", ], url: "http://www.ibm.com/support/docview.wss?uid=swg1IT02314", }, { name: "59043", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/59043", }, { name: "59347", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/59347", }, { name: "60049", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/60049", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21676615", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://cert-portal.siemens.com/productcert/pdf/ssa-234763.pdf", }, { tags: [ "x_refsource_MISC", ], url: "https://www.arista.com/en/support/advisories-notices/security-advisories/941-security-advisory-0005", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "secalert@redhat.com", ID: "CVE-2014-0224", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "n/a", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "OpenSSL before 0.9.8za, 1.0.0 before 1.0.0m, and 1.0.1 before 1.0.1h does not properly restrict processing of ChangeCipherSpec messages, which allows man-in-the-middle attackers to trigger use of a zero-length master key in certain OpenSSL-to-OpenSSL communications, and consequently hijack sessions or obtain sensitive information, via a crafted TLS handshake, aka the \"CCS Injection\" vulnerability.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "n/a", }, ], }, ], }, references: { reference_data: [ { name: "59342", refsource: "SECUNIA", url: "http://secunia.com/advisories/59342", }, { name: "59669", refsource: "SECUNIA", url: "http://secunia.com/advisories/59669", }, { name: "59525", refsource: "SECUNIA", url: "http://secunia.com/advisories/59525", }, { name: "HPSBMU03071", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=140604261522465&w=2", }, { name: "59004", refsource: "SECUNIA", url: "http://secunia.com/advisories/59004", }, { name: "59530", refsource: "SECUNIA", url: "http://secunia.com/advisories/59530", }, { name: "http://www-01.ibm.com/support/docview.wss?uid=swg21675626", refsource: "CONFIRM", url: "http://www-01.ibm.com/support/docview.wss?uid=swg21675626", }, { name: "59824", refsource: "SECUNIA", url: "http://secunia.com/advisories/59824", }, { name: "59282", refsource: "SECUNIA", url: "http://secunia.com/advisories/59282", }, { name: "http://www.novell.com/support/kb/doc.php?id=7015300", refsource: "CONFIRM", url: "http://www.novell.com/support/kb/doc.php?id=7015300", }, { name: "59215", refsource: "SECUNIA", url: "http://secunia.com/advisories/59215", }, { name: "https://bugzilla.redhat.com/show_bug.cgi?id=1103586", refsource: "CONFIRM", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1103586", }, { name: "59990", refsource: "SECUNIA", url: "http://secunia.com/advisories/59990", }, { name: "59264", refsource: "SECUNIA", url: "http://secunia.com/advisories/59264", }, { name: "59454", refsource: "SECUNIA", url: "http://secunia.com/advisories/59454", }, { name: "58492", refsource: "SECUNIA", url: "http://secunia.com/advisories/58492", }, { name: "59186", refsource: "SECUNIA", url: "http://secunia.com/advisories/59186", }, { name: "59188", refsource: "SECUNIA", url: "http://secunia.com/advisories/59188", }, { name: "59126", refsource: "SECUNIA", url: "http://secunia.com/advisories/59126", }, { name: "HPSBMU03078", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=140672208601650&w=2", }, { name: "HPSBMU03089", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=140784085708882&w=2", }, { name: "http://www.novell.com/support/kb/doc.php?id=7015264", refsource: "CONFIRM", url: "http://www.novell.com/support/kb/doc.php?id=7015264", }, { name: "http://support.f5.com/kb/en-us/solutions/public/15000/300/sol15325.html", refsource: "CONFIRM", url: "http://support.f5.com/kb/en-us/solutions/public/15000/300/sol15325.html", }, { name: "59306", refsource: "SECUNIA", url: "http://secunia.com/advisories/59306", }, { name: "RHSA-2014:0627", refsource: "REDHAT", url: "http://rhn.redhat.com/errata/RHSA-2014-0627.html", }, { name: "http://www.websense.com/support/article/kbarticle/Vulnerabilities-resolved-in-TRITON-APX-Version-8-0", refsource: "CONFIRM", url: "http://www.websense.com/support/article/kbarticle/Vulnerabilities-resolved-in-TRITON-APX-Version-8-0", }, { name: "HPSBGN03068", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=140544599631400&w=2", }, { name: "RHSA-2014:0626", refsource: "REDHAT", url: "http://rhn.redhat.com/errata/RHSA-2014-0626.html", }, { name: "59190", refsource: "SECUNIA", url: "http://secunia.com/advisories/59190", }, { name: "58639", refsource: "SECUNIA", url: "http://secunia.com/advisories/58639", }, { name: "http://www-01.ibm.com/support/docview.wss?uid=swg21678289", refsource: "CONFIRM", url: "http://www-01.ibm.com/support/docview.wss?uid=swg21678289", }, { name: "http://www.ibm.com/support/docview.wss?uid=swg21676877", refsource: "CONFIRM", url: "http://www.ibm.com/support/docview.wss?uid=swg21676877", }, { name: "59446", refsource: "SECUNIA", url: "http://secunia.com/advisories/59446", }, { name: "59529", refsource: "SECUNIA", url: "http://secunia.com/advisories/59529", }, { name: "59445", refsource: "SECUNIA", url: "http://secunia.com/advisories/59445", }, { name: "http://www.vmware.com/security/advisories/VMSA-2014-0012.html", refsource: "CONFIRM", url: "http://www.vmware.com/security/advisories/VMSA-2014-0012.html", }, { name: "59589", refsource: "SECUNIA", url: "http://secunia.com/advisories/59589", }, { name: "59894", refsource: "SECUNIA", url: "http://secunia.com/advisories/59894", }, { name: "59325", refsource: "SECUNIA", url: "http://secunia.com/advisories/59325", }, { name: "59354", refsource: "SECUNIA", url: "http://secunia.com/advisories/59354", }, { name: "http://www-01.ibm.com/support/docview.wss?uid=swg24037729", refsource: "CONFIRM", url: "http://www-01.ibm.com/support/docview.wss?uid=swg24037729", }, { name: "http://www-01.ibm.com/support/docview.wss?uid=swg21677131", refsource: "CONFIRM", url: "http://www-01.ibm.com/support/docview.wss?uid=swg21677131", }, { name: "HPSBUX03046", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=140266410314613&w=2", }, { name: "61254", refsource: "SECUNIA", url: "http://secunia.com/advisories/61254", }, { name: "http://www-01.ibm.com/support/docview.wss?uid=swg21678233", refsource: "CONFIRM", url: "http://www-01.ibm.com/support/docview.wss?uid=swg21678233", }, { name: "59447", refsource: "SECUNIA", url: "http://secunia.com/advisories/59447", }, { name: "1031594", refsource: "SECTRACK", url: "http://www.securitytracker.com/id/1031594", }, { name: "http://www-01.ibm.com/support/docview.wss?uid=swg21676655", refsource: "CONFIRM", url: "http://www-01.ibm.com/support/docview.wss?uid=swg21676655", }, { name: "http://www14.software.ibm.com/webapp/set2/subscriptions/pqvcmjd?mode=18&ID=6061&myns=phmc&mync=E", refsource: "CONFIRM", url: "http://www14.software.ibm.com/webapp/set2/subscriptions/pqvcmjd?mode=18&ID=6061&myns=phmc&mync=E", }, { name: "59223", refsource: "SECUNIA", url: "http://secunia.com/advisories/59223", }, { name: "58743", refsource: "SECUNIA", url: "http://secunia.com/advisories/58743", }, { name: "http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html", refsource: "CONFIRM", url: "http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html", }, { name: "58719", refsource: "SECUNIA", url: "http://secunia.com/advisories/58719", }, { name: "59449", refsource: "SECUNIA", url: "http://secunia.com/advisories/59449", }, { name: "59132", refsource: "SECUNIA", url: "http://secunia.com/advisories/59132", }, { name: "SSRT101818", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=142350350616251&w=2", }, { name: "http://www-01.ibm.com/support/docview.wss?uid=isg400001843", refsource: "CONFIRM", url: "http://www-01.ibm.com/support/docview.wss?uid=isg400001843", }, { name: "HPSBST03098", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=140870499402361&w=2", }, { name: "HPSBMU03058", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=140386311427810&w=2", }, { name: "59442", refsource: "SECUNIA", url: "http://secunia.com/advisories/59442", }, { name: "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05301946", refsource: "CONFIRM", url: "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05301946", }, { name: "HPSBOV03047", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=140317760000786&w=2", }, { name: "HPSBST03195", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=142805027510172&w=2", }, { name: "http://www-01.ibm.com/support/docview.wss?uid=swg21676879", refsource: "CONFIRM", url: "http://www-01.ibm.com/support/docview.wss?uid=swg21676879", }, { name: "http://www-01.ibm.com/support/docview.wss?uid=swg24037761", refsource: "CONFIRM", url: "http://www-01.ibm.com/support/docview.wss?uid=swg24037761", }, { name: "http://www-01.ibm.com/support/docview.wss?uid=swg21677828", refsource: "CONFIRM", url: "http://www-01.ibm.com/support/docview.wss?uid=swg21677828", }, { name: "59441", refsource: "SECUNIA", url: "http://secunia.com/advisories/59441", }, { name: "HPSBMU03074", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=140621259019789&w=2", }, { name: "http://www.innominate.com/data/downloads/manuals/mdm_1.5.2.1_Release_Notes.pdf", refsource: "CONFIRM", url: "http://www.innominate.com/data/downloads/manuals/mdm_1.5.2.1_Release_Notes.pdf", }, { name: "HPSBMU03094", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=140852757108392&w=2", }, { name: "https://filezilla-project.org/versions.php?type=server", refsource: "CONFIRM", url: "https://filezilla-project.org/versions.php?type=server", }, { name: "http://www-01.ibm.com/support/docview.wss?uid=swg21676786", refsource: "CONFIRM", url: "http://www-01.ibm.com/support/docview.wss?uid=swg21676786", }, { name: "60567", refsource: "SECUNIA", url: "http://secunia.com/advisories/60567", }, { name: "59189", refsource: "SECUNIA", url: "http://secunia.com/advisories/59189", }, { name: "59368", refsource: "SECUNIA", url: "http://secunia.com/advisories/59368", }, { name: "MDVSA-2014:106", refsource: "MANDRIVA", url: "http://www.mandriva.com/security/advisories?name=MDVSA-2014:106", }, { name: "59142", refsource: "SECUNIA", url: "http://secunia.com/advisories/59142", }, { name: "http://www-01.ibm.com/support/docview.wss?uid=swg21676478", refsource: "CONFIRM", url: "http://www-01.ibm.com/support/docview.wss?uid=swg21676478", }, { name: "http://www-01.ibm.com/support/docview.wss?uid=swg21676845", refsource: "CONFIRM", url: "http://www-01.ibm.com/support/docview.wss?uid=swg21676845", }, { name: "58742", refsource: "SECUNIA", url: "http://secunia.com/advisories/58742", }, { name: "https://www.ibm.com/support/docview.wss?uid=ssg1S1004670", refsource: "CONFIRM", url: "https://www.ibm.com/support/docview.wss?uid=ssg1S1004670", }, { name: "RHSA-2014:0624", refsource: "REDHAT", url: "http://rhn.redhat.com/errata/RHSA-2014-0624.html", }, { name: "59602", refsource: "SECUNIA", url: "http://secunia.com/advisories/59602", }, { name: "http://www.kerio.com/support/kerio-control/release-history", refsource: "CONFIRM", url: "http://www.kerio.com/support/kerio-control/release-history", }, { name: "59300", refsource: "SECUNIA", url: "http://secunia.com/advisories/59300", }, { name: "58930", refsource: "SECUNIA", url: "http://secunia.com/advisories/58930", }, { name: "http://www-01.ibm.com/support/docview.wss?uid=swg21677080", refsource: "CONFIRM", url: "http://www-01.ibm.com/support/docview.wss?uid=swg21677080", }, { name: "61815", refsource: "SECUNIA", url: "http://secunia.com/advisories/61815", }, { name: "58667", refsource: "SECUNIA", url: "http://secunia.com/advisories/58667", }, { name: "GLSA-201407-05", refsource: "GENTOO", url: "http://security.gentoo.org/glsa/glsa-201407-05.xml", }, { name: "http://www-01.ibm.com/support/docview.wss?uid=swg21677390", refsource: "CONFIRM", url: "http://www-01.ibm.com/support/docview.wss?uid=swg21677390", }, { name: "59191", refsource: "SECUNIA", url: "http://secunia.com/advisories/59191", }, { name: "59284", refsource: "SECUNIA", url: "http://secunia.com/advisories/59284", }, { name: "59444", refsource: "SECUNIA", url: "http://secunia.com/advisories/59444", }, { name: "https://www.imperialviolet.org/2014/06/05/earlyccs.html", refsource: "MISC", url: "https://www.imperialviolet.org/2014/06/05/earlyccs.html", }, { name: "http://www.ibm.com/support/docview.wss?uid=swg24037783", refsource: "CONFIRM", url: "http://www.ibm.com/support/docview.wss?uid=swg24037783", }, { name: "59365", refsource: "SECUNIA", url: "http://secunia.com/advisories/59365", }, { name: "http://www-01.ibm.com/support/docview.wss?uid=swg21677695", refsource: "CONFIRM", url: "http://www-01.ibm.com/support/docview.wss?uid=swg21677695", }, { name: "59305", refsource: "SECUNIA", url: "http://secunia.com/advisories/59305", }, { name: "http://www-01.ibm.com/support/docview.wss?uid=swg21676529", refsource: "CONFIRM", url: "http://www-01.ibm.com/support/docview.wss?uid=swg21676529", }, { name: "59483", refsource: "SECUNIA", url: "http://secunia.com/advisories/59483", }, { name: "58385", refsource: "SECUNIA", url: "http://secunia.com/advisories/58385", }, { name: "20141205 NEW: VMSA-2014-0012 - VMware vSphere product updates address security vulnerabilities", refsource: "BUGTRAQ", url: "http://www.securityfocus.com/archive/1/534161/100/0/threaded", }, { name: "59495", refsource: "SECUNIA", url: "http://secunia.com/advisories/59495", }, { name: "http://www-01.ibm.com/support/docview.wss?uid=nas8N1020163", refsource: "CONFIRM", url: "http://www-01.ibm.com/support/docview.wss?uid=nas8N1020163", }, { name: "http://www-01.ibm.com/support/docview.wss?uid=swg21676889", refsource: "CONFIRM", url: "http://www-01.ibm.com/support/docview.wss?uid=swg21676889", }, { name: "FEDORA-2014-9308", refsource: "FEDORA", url: "http://lists.fedoraproject.org/pipermail/package-announce/2014-August/136473.html", }, { name: "58945", refsource: "SECUNIA", url: "http://secunia.com/advisories/58945", }, { name: "http://www-01.ibm.com/support/docview.wss?uid=isg400001841", refsource: "CONFIRM", url: "http://www-01.ibm.com/support/docview.wss?uid=isg400001841", }, { name: "HPSBST03106", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=141025641601169&w=2", }, { name: "59659", refsource: "SECUNIA", url: "http://secunia.com/advisories/59659", }, { name: "59440", refsource: "SECUNIA", url: "http://secunia.com/advisories/59440", }, { name: "openSUSE-SU-2016:0640", refsource: "SUSE", url: "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00011.html", }, { name: "59429", refsource: "SECUNIA", url: "http://secunia.com/advisories/59429", }, { name: "http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html", refsource: "CONFIRM", url: "http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html", }, { name: "http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html", refsource: "CONFIRM", url: "http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html", }, { name: "59655", refsource: "SECUNIA", url: "http://secunia.com/advisories/59655", }, { name: "59370", refsource: "SECUNIA", url: "http://secunia.com/advisories/59370", }, { name: "59827", refsource: "SECUNIA", url: "http://secunia.com/advisories/59827", }, { name: "58660", refsource: "SECUNIA", url: "http://secunia.com/advisories/58660", }, { name: "59163", refsource: "SECUNIA", url: "http://secunia.com/advisories/59163", }, { name: "58716", refsource: "SECUNIA", url: "http://secunia.com/advisories/58716", }, { name: "59055", refsource: "SECUNIA", url: "http://secunia.com/advisories/59055", }, { name: "http://www-01.ibm.com/support/docview.wss?uid=swg21676071", refsource: "CONFIRM", url: "http://www-01.ibm.com/support/docview.wss?uid=swg21676071", }, { name: "http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=migr-5095737", refsource: "CONFIRM", url: "http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=migr-5095737", }, { name: "http://www-01.ibm.com/support/docview.wss?uid=swg21677836", refsource: "CONFIRM", url: "http://www-01.ibm.com/support/docview.wss?uid=swg21677836", }, { name: "59437", refsource: "SECUNIA", url: "http://secunia.com/advisories/59437", }, { name: "http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5095754", refsource: "CONFIRM", url: "http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5095754", }, { name: "60176", refsource: "SECUNIA", url: "http://secunia.com/advisories/60176", }, { name: "HPSBPI03107", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=141147110427269&w=2", }, { name: "59101", refsource: "SECUNIA", url: "http://secunia.com/advisories/59101", }, { name: "http://esupport.trendmicro.com/solution/en-US/1103813.aspx", refsource: "CONFIRM", url: "http://esupport.trendmicro.com/solution/en-US/1103813.aspx", }, { name: "59374", refsource: "SECUNIA", url: "http://secunia.com/advisories/59374", }, { name: "59063", refsource: "SECUNIA", url: "http://secunia.com/advisories/59063", }, { name: "http://www.vmware.com/security/advisories/VMSA-2014-0006.html", refsource: "CONFIRM", url: "http://www.vmware.com/security/advisories/VMSA-2014-0006.html", }, { name: "https://discussions.nessus.org/thread/7517", refsource: "CONFIRM", url: "https://discussions.nessus.org/thread/7517", }, { name: "59310", refsource: "SECUNIA", url: "http://secunia.com/advisories/59310", }, { name: "http://www-01.ibm.com/support/docview.wss?uid=swg21676501", refsource: "CONFIRM", url: "http://www-01.ibm.com/support/docview.wss?uid=swg21676501", }, { name: "HPSBMU03216", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=142350350616251&w=2", }, { name: "http://www-01.ibm.com/support/docview.wss?uid=swg21676536", refsource: "CONFIRM", url: "http://www-01.ibm.com/support/docview.wss?uid=swg21676536", }, { name: "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html", refsource: "CONFIRM", url: "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html", }, { name: "http://aix.software.ibm.com/aix/efixes/security/openssl_advisory9.asc", refsource: "CONFIRM", url: "http://aix.software.ibm.com/aix/efixes/security/openssl_advisory9.asc", }, { name: "IV61506", refsource: "AIXAPAR", url: "http://www-01.ibm.com/support/docview.wss?uid=swg1IV61506", }, { name: "59502", refsource: "SECUNIA", url: "http://secunia.com/advisories/59502", }, { name: "http://www.splunk.com/view/SP-CAAAM2D", refsource: "CONFIRM", url: "http://www.splunk.com/view/SP-CAAAM2D", }, { name: "59878", refsource: "SECUNIA", url: "http://secunia.com/advisories/59878", }, { name: "http://www.fortiguard.com/advisory/FG-IR-14-018/", refsource: "CONFIRM", url: "http://www.fortiguard.com/advisory/FG-IR-14-018/", }, { name: "SUSE-SU-2015:0743", refsource: "SUSE", url: "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.html", }, { name: "HPSBMU03101", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=140852826008699&w=2", }, { name: "http://www.ibm.com/support/docview.wss?uid=swg21676793", refsource: "CONFIRM", url: "http://www.ibm.com/support/docview.wss?uid=swg21676793", }, { name: "59214", refsource: "SECUNIA", url: "http://secunia.com/advisories/59214", }, { name: "http://www.ibm.com/support/docview.wss?uid=swg21676356", refsource: "CONFIRM", url: "http://www.ibm.com/support/docview.wss?uid=swg21676356", }, { name: "HPSBHF03088", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=140794476212181&w=2", }, { name: "HPSBMU03057", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=140389274407904&w=2", }, { name: "http://support.citrix.com/article/CTX140876", refsource: "CONFIRM", url: "http://support.citrix.com/article/CTX140876", }, { name: "59167", refsource: "SECUNIA", url: "http://secunia.com/advisories/59167", }, { name: "59120", refsource: "SECUNIA", url: "http://secunia.com/advisories/59120", }, { name: "http://www-01.ibm.com/support/docview.wss?uid=swg24037732", refsource: "CONFIRM", url: "http://www-01.ibm.com/support/docview.wss?uid=swg24037732", }, { name: "http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5095757", refsource: "CONFIRM", url: "http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5095757", }, { name: "http://www-01.ibm.com/support/docview.wss?uid=nas8N1020172", refsource: "CONFIRM", url: "http://www-01.ibm.com/support/docview.wss?uid=nas8N1020172", }, { name: "HPSBMU03053", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=140369637402535&w=2", }, { name: "59380", refsource: "SECUNIA", url: "http://secunia.com/advisories/59380", }, { name: "MDVSA-2014:105", refsource: "MANDRIVA", url: "http://www.mandriva.com/security/advisories?name=MDVSA-2014:105", }, { name: "59460", refsource: "SECUNIA", url: "http://secunia.com/advisories/59460", }, { name: "59506", refsource: "SECUNIA", url: "http://secunia.com/advisories/59506", }, { name: "58939", refsource: "SECUNIA", url: "http://secunia.com/advisories/58939", }, { name: "SSRT101590", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=140266410314613&w=2", }, { name: "59661", refsource: "SECUNIA", url: "http://secunia.com/advisories/59661", }, { name: "59514", refsource: "SECUNIA", url: "http://secunia.com/advisories/59514", }, { name: "59677", refsource: "SECUNIA", url: "http://secunia.com/advisories/59677", }, { name: "RHSA-2014:0630", refsource: "REDHAT", url: "http://rhn.redhat.com/errata/RHSA-2014-0630.html", }, { name: "20140605 Multiple Vulnerabilities in OpenSSL Affecting Cisco Products", refsource: "CISCO", url: "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140605-openssl", }, { name: "http://kb.juniper.net/InfoCenter/index?page=content&id=KB29195", refsource: "CONFIRM", url: "http://kb.juniper.net/InfoCenter/index?page=content&id=KB29195", }, { name: "RHSA-2014:0632", refsource: "REDHAT", url: "http://rhn.redhat.com/errata/RHSA-2014-0632.html", }, { name: "http://www-01.ibm.com/support/docview.wss?uid=swg24037730", refsource: "CONFIRM", url: "http://www-01.ibm.com/support/docview.wss?uid=swg24037730", }, { name: "https://kc.mcafee.com/corporate/index?page=content&id=SB10075", refsource: "CONFIRM", url: "https://kc.mcafee.com/corporate/index?page=content&id=SB10075", }, { name: "http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html", refsource: "CONFIRM", url: "http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html", }, { name: "http://www-01.ibm.com/support/docview.wss?uid=swg24037731", refsource: "CONFIRM", url: "http://www-01.ibm.com/support/docview.wss?uid=swg24037731", }, { name: "58745", refsource: "SECUNIA", url: "http://secunia.com/advisories/58745", }, { name: "http://www-01.ibm.com/support/docview.wss?uid=swg21676419", refsource: "CONFIRM", url: "http://www-01.ibm.com/support/docview.wss?uid=swg21676419", }, { name: "59438", refsource: "SECUNIA", url: "http://secunia.com/advisories/59438", }, { name: "http://www.ibm.com/support/docview.wss?uid=isg3T1020948", refsource: "CONFIRM", url: "http://www.ibm.com/support/docview.wss?uid=isg3T1020948", }, { name: "http://www-01.ibm.com/support/docview.wss?uid=swg21676496", refsource: "CONFIRM", url: "http://www-01.ibm.com/support/docview.wss?uid=swg21676496", }, { name: "58714", refsource: "SECUNIA", url: "http://secunia.com/advisories/58714", }, { name: "HPSBGN03050", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=140482916501310&w=2", }, { name: "openSUSE-SU-2015:0229", refsource: "SUSE", url: "http://lists.opensuse.org/opensuse-updates/2015-02/msg00030.html", }, { name: "http://ccsinjection.lepidum.co.jp", refsource: "MISC", url: "http://ccsinjection.lepidum.co.jp", }, { name: "59435", refsource: "SECUNIA", url: "http://secunia.com/advisories/59435", }, { name: "HPSBHF03052", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=141658880509699&w=2", }, { name: "http://www.openssl.org/news/secadv_20140605.txt", refsource: "CONFIRM", url: "http://www.openssl.org/news/secadv_20140605.txt", }, { name: "58615", refsource: "SECUNIA", url: "http://secunia.com/advisories/58615", }, { name: "HPSBST03265", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=142546741516006&w=2", }, { name: "20141205 NEW: VMSA-2014-0012 - VMware vSphere product updates address security vulnerabilities", refsource: "FULLDISC", url: "http://seclists.org/fulldisclosure/2014/Dec/23", }, { name: "http://www-01.ibm.com/support/docview.wss?uid=swg21676644", refsource: "CONFIRM", url: "http://www-01.ibm.com/support/docview.wss?uid=swg21676644", }, { name: "59231", refsource: "SECUNIA", url: "http://secunia.com/advisories/59231", }, { name: "https://www.ibm.com/support/docview.wss?uid=ssg1S1004671", refsource: "CONFIRM", url: "https://www.ibm.com/support/docview.wss?uid=ssg1S1004671", }, { name: "SUSE-SU-2015:0578", refsource: "SUSE", url: "http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00027.html", }, { name: "http://support.apple.com/kb/HT6443", refsource: "CONFIRM", url: "http://support.apple.com/kb/HT6443", }, { name: "59211", refsource: "SECUNIA", url: "http://secunia.com/advisories/59211", }, { name: "58433", refsource: "SECUNIA", url: "http://secunia.com/advisories/58433", }, { name: "60066", refsource: "SECUNIA", url: "http://secunia.com/advisories/60066", }, { name: "http://dev.mysql.com/doc/relnotes/workbench/en/wb-news-6-1-7.html", refsource: "CONFIRM", url: "http://dev.mysql.com/doc/relnotes/workbench/en/wb-news-6-1-7.html", }, { name: "https://access.redhat.com/site/blogs/766093/posts/908133", refsource: "CONFIRM", url: "https://access.redhat.com/site/blogs/766093/posts/908133", }, { name: "59301", refsource: "SECUNIA", url: "http://secunia.com/advisories/59301", }, { name: "60522", refsource: "SECUNIA", url: "http://secunia.com/advisories/60522", }, { name: "59784", refsource: "SECUNIA", url: "http://secunia.com/advisories/59784", }, { name: "https://kb.bluecoat.com/index?page=content&id=SA80", refsource: "CONFIRM", url: "https://kb.bluecoat.com/index?page=content&id=SA80", }, { name: "HPSBST03097", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=141383410222440&w=2", }, { name: "20140607 Re: More OpenSSL issues", refsource: "FULLDISC", url: "http://seclists.org/fulldisclosure/2014/Jun/38", }, { name: "HPSBMU03076", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=140904544427729&w=2", }, { name: "http://www.f-secure.com/en/web/labs_global/fsc-2014-6", refsource: "CONFIRM", url: "http://www.f-secure.com/en/web/labs_global/fsc-2014-6", }, { name: "59135", refsource: "SECUNIA", url: "http://secunia.com/advisories/59135", }, { name: "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10629", refsource: "CONFIRM", url: "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10629", }, { name: "http://www-01.ibm.com/support/docview.wss?uid=swg21678167", refsource: "CONFIRM", url: "http://www-01.ibm.com/support/docview.wss?uid=swg21678167", }, { name: "58759", refsource: "SECUNIA", url: "http://secunia.com/advisories/58759", }, { name: "59093", refsource: "SECUNIA", url: "http://secunia.com/advisories/59093", }, { name: "http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5095740", refsource: "CONFIRM", url: "http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5095740", }, { name: "http://puppetlabs.com/security/cve/cve-2014-0224", refsource: "CONFIRM", url: "http://puppetlabs.com/security/cve/cve-2014-0224", }, { name: "59192", refsource: "SECUNIA", url: "http://secunia.com/advisories/59192", }, { name: "FEDORA-2014-9301", refsource: "FEDORA", url: "http://lists.fedoraproject.org/pipermail/package-announce/2014-August/136470.html", }, { name: "HPSBMU03062", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=140752315422991&w=2", }, { name: "58579", refsource: "SECUNIA", url: "http://secunia.com/advisories/58579", }, { name: "https://www.intersectalliance.com/wp-content/uploads/release_notes/ReleaseNotes_for_SNARE_for_MSSQL.pdf", refsource: "CONFIRM", url: "https://www.intersectalliance.com/wp-content/uploads/release_notes/ReleaseNotes_for_SNARE_for_MSSQL.pdf", }, { name: "59040", refsource: "SECUNIA", url: "http://secunia.com/advisories/59040", }, { name: "HPSBMU03056", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=140389355508263&w=2", }, { name: "59175", refsource: "SECUNIA", url: "http://secunia.com/advisories/59175", }, { name: "60819", refsource: "SECUNIA", url: "http://secunia.com/advisories/60819", }, { name: "HPSBMU03051", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=140448122410568&w=2", }, { name: "59666", refsource: "SECUNIA", url: "http://secunia.com/advisories/59666", }, { name: "http://www.tenable.com/blog/nessus-527-and-pvs-403-are-available-for-download", refsource: "CONFIRM", url: "http://www.tenable.com/blog/nessus-527-and-pvs-403-are-available-for-download", }, { name: "58128", refsource: "SECUNIA", url: "http://secunia.com/advisories/58128", }, { name: "HPSBMU03055", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=140431828824371&w=2", }, { name: "59413", refsource: "SECUNIA", url: "http://secunia.com/advisories/59413", }, { name: "http://www-01.ibm.com/support/docview.wss?uid=swg21676334", refsource: "CONFIRM", url: "http://www-01.ibm.com/support/docview.wss?uid=swg21676334", }, { name: "http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html", refsource: "CONFIRM", url: "http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html", }, { name: "http://www-01.ibm.com/support/docview.wss?uid=swg21675821", refsource: "CONFIRM", url: "http://www-01.ibm.com/support/docview.wss?uid=swg21675821", }, { name: "http://www-01.ibm.com/support/docview.wss?uid=swg24037870", refsource: "CONFIRM", url: "http://www-01.ibm.com/support/docview.wss?uid=swg24037870", }, { name: "59721", refsource: "SECUNIA", url: "http://secunia.com/advisories/59721", }, { name: "HPSBHF03145", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=141383465822787&w=2", }, { name: "http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5095756", refsource: "CONFIRM", url: "http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5095756", }, { name: "RHSA-2014:0680", refsource: "REDHAT", url: "http://rhn.redhat.com/errata/RHSA-2014-0680.html", }, { name: "http://www-01.ibm.com/support/docview.wss?uid=swg21676062", refsource: "CONFIRM", url: "http://www-01.ibm.com/support/docview.wss?uid=swg21676062", }, { name: "59012", refsource: "SECUNIA", url: "http://secunia.com/advisories/59012", }, { name: "58713", refsource: "SECUNIA", url: "http://secunia.com/advisories/58713", }, { name: "http://www-01.ibm.com/support/docview.wss?uid=swg21673137", refsource: "CONFIRM", url: "http://www-01.ibm.com/support/docview.wss?uid=swg21673137", }, { name: "59362", refsource: "SECUNIA", url: "http://secunia.com/advisories/59362", }, { name: "MDVSA-2015:062", refsource: "MANDRIVA", url: "http://www.mandriva.com/security/advisories?name=MDVSA-2015:062", }, { name: "http://www-01.ibm.com/support/docview.wss?uid=swg21676035", refsource: "CONFIRM", url: "http://www-01.ibm.com/support/docview.wss?uid=swg21676035", }, { name: "HPSBMU03070", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=140499864129699&w=2", }, { name: "RHSA-2014:0631", refsource: "REDHAT", url: "http://rhn.redhat.com/errata/RHSA-2014-0631.html", }, { name: "59338", refsource: "SECUNIA", url: "http://secunia.com/advisories/59338", }, { name: "59450", refsource: "SECUNIA", url: "http://secunia.com/advisories/59450", }, { name: "http://linux.oracle.com/errata/ELSA-2014-1053.html", refsource: "CONFIRM", url: "http://linux.oracle.com/errata/ELSA-2014-1053.html", }, { name: "http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html", refsource: "CONFIRM", url: "http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html", }, { name: "VU#978508", refsource: "CERT-VN", url: "http://www.kb.cert.org/vuls/id/978508", }, { name: "1031032", refsource: "SECTRACK", url: "http://www.securitytracker.com/id/1031032", }, { name: "59287", refsource: "SECUNIA", url: "http://secunia.com/advisories/59287", }, { name: "https://blogs.oracle.com/sunsecurity/entry/cve_2014_0224_cryptographic_issues1", refsource: "CONFIRM", url: "https://blogs.oracle.com/sunsecurity/entry/cve_2014_0224_cryptographic_issues1", }, { name: "http://www-01.ibm.com/support/docview.wss?uid=swg21683332", refsource: "CONFIRM", url: "http://www-01.ibm.com/support/docview.wss?uid=swg21683332", }, { name: "59491", refsource: "SECUNIA", url: "http://secunia.com/advisories/59491", }, { name: "59364", refsource: "SECUNIA", url: "http://secunia.com/advisories/59364", }, { name: "https://blogs.oracle.com/sunsecurity/entry/cve_2014_0224_cryptographic_issues", refsource: "CONFIRM", url: "https://blogs.oracle.com/sunsecurity/entry/cve_2014_0224_cryptographic_issues", }, { name: "59451", refsource: "SECUNIA", url: "http://secunia.com/advisories/59451", }, { name: "58977", refsource: "SECUNIA", url: "http://secunia.com/advisories/58977", }, { name: "https://www.novell.com/support/kb/doc.php?id=7015271", refsource: "CONFIRM", url: "https://www.novell.com/support/kb/doc.php?id=7015271", }, { name: "http://www-01.ibm.com/support/docview.wss?uid=swg21676333", refsource: "CONFIRM", url: "http://www-01.ibm.com/support/docview.wss?uid=swg21676333", }, { name: "60571", refsource: "SECUNIA", url: "http://secunia.com/advisories/60571", }, { name: "59459", refsource: "SECUNIA", url: "http://secunia.com/advisories/59459", }, { name: "http://www-01.ibm.com/support/docview.wss?uid=swg21676833", refsource: "CONFIRM", url: "http://www-01.ibm.com/support/docview.wss?uid=swg21676833", }, { name: "60577", refsource: "SECUNIA", url: "http://secunia.com/advisories/60577", }, { name: "59448", refsource: "SECUNIA", url: "http://secunia.com/advisories/59448", }, { name: "https://git.openssl.org/gitweb/?p=openssl.git;a=commit;h=bc8923b1ec9c467755cd86f7848c50ee8812e441", refsource: "CONFIRM", url: "https://git.openssl.org/gitweb/?p=openssl.git;a=commit;h=bc8923b1ec9c467755cd86f7848c50ee8812e441", }, { name: "https://www.intersectalliance.com/wp-content/uploads/release_notes/ReleaseNotes_for_Snare_for_Windows.pdf", refsource: "CONFIRM", url: "https://www.intersectalliance.com/wp-content/uploads/release_notes/ReleaseNotes_for_Snare_for_Windows.pdf", }, { name: "http://www.blackberry.com/btsc/KB36051", refsource: "CONFIRM", url: "http://www.blackberry.com/btsc/KB36051", }, { name: "http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5095755", refsource: "CONFIRM", url: "http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5095755", }, { name: "http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-345106.htm", refsource: "CONFIRM", url: "http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-345106.htm", }, { name: "HPSBST03103", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=141164638606214&w=2", }, { name: "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004690", refsource: "CONFIRM", url: "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004690", }, { name: "59885", refsource: "SECUNIA", url: "http://secunia.com/advisories/59885", }, { name: "http://www-01.ibm.com/support/docview.wss?uid=swg21677527", refsource: "CONFIRM", url: "http://www-01.ibm.com/support/docview.wss?uid=swg21677527", }, { name: "59202", refsource: "SECUNIA", url: "http://secunia.com/advisories/59202", }, { name: "RHSA-2014:0633", refsource: "REDHAT", url: "http://rhn.redhat.com/errata/RHSA-2014-0633.html", }, { name: "http://www.ibm.com/support/docview.wss?uid=ssg1S1004678", refsource: "CONFIRM", url: "http://www.ibm.com/support/docview.wss?uid=ssg1S1004678", }, { name: "59375", refsource: "SECUNIA", url: "http://secunia.com/advisories/59375", }, { name: "HPSBMU03083", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=140983229106599&w=2", }, { name: "59528", refsource: "SECUNIA", url: "http://secunia.com/advisories/59528", }, { name: "58337", refsource: "SECUNIA", url: "http://secunia.com/advisories/58337", }, { name: "59518", refsource: "SECUNIA", url: "http://secunia.com/advisories/59518", }, { name: "59389", refsource: "SECUNIA", url: "http://secunia.com/advisories/59389", }, { name: "59162", refsource: "SECUNIA", url: "http://secunia.com/advisories/59162", }, { name: "59383", refsource: "SECUNIA", url: "http://secunia.com/advisories/59383", }, { name: "http://www-01.ibm.com/support/docview.wss?uid=swg21677567", refsource: "CONFIRM", url: "http://www-01.ibm.com/support/docview.wss?uid=swg21677567", }, { name: "http://kb.juniper.net/InfoCenter/index?page=content&id=KB29217", refsource: "CONFIRM", url: "http://kb.juniper.net/InfoCenter/index?page=content&id=KB29217", }, { name: "59490", refsource: "SECUNIA", url: "http://secunia.com/advisories/59490", }, { name: "59916", refsource: "SECUNIA", url: "http://secunia.com/advisories/59916", }, { name: "http://www14.software.ibm.com/webapp/set2/subscriptions/pqvcmjd?mode=18&ID=6060&myns=phmc&mync=E", refsource: "CONFIRM", url: "http://www14.software.ibm.com/webapp/set2/subscriptions/pqvcmjd?mode=18&ID=6060&myns=phmc&mync=E", }, { name: "HPSBMU03065", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=140491231331543&w=2", }, { name: "http://www-01.ibm.com/support/docview.wss?uid=swg24037727", refsource: "CONFIRM", url: "http://www-01.ibm.com/support/docview.wss?uid=swg24037727", }, { name: "IT02314", refsource: "AIXAPAR", url: "http://www.ibm.com/support/docview.wss?uid=swg1IT02314", }, { name: "59043", refsource: "SECUNIA", url: "http://secunia.com/advisories/59043", }, { name: "59347", refsource: "SECUNIA", url: "http://secunia.com/advisories/59347", }, { name: "60049", refsource: "SECUNIA", url: "http://secunia.com/advisories/60049", }, { name: "http://www-01.ibm.com/support/docview.wss?uid=swg21676615", refsource: "CONFIRM", url: "http://www-01.ibm.com/support/docview.wss?uid=swg21676615", }, { name: "https://cert-portal.siemens.com/productcert/pdf/ssa-234763.pdf", refsource: "CONFIRM", url: "https://cert-portal.siemens.com/productcert/pdf/ssa-234763.pdf", }, { name: "https://www.arista.com/en/support/advisories-notices/security-advisories/941-security-advisory-0005", refsource: "MISC", url: "https://www.arista.com/en/support/advisories-notices/security-advisories/941-security-advisory-0005", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "53f830b8-0a3f-465b-8143-3b8a9948e749", assignerShortName: "redhat", cveId: "CVE-2014-0224", datePublished: "2014-06-05T21:00:00", dateReserved: "2013-12-03T00:00:00", dateUpdated: "2024-08-06T09:05:39.462Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
Log in or create an account to share your comment.
Security Advisory comment format.
This schema specifies the format of a comment related to a security advisory.
UUIDv4 of the comment
UUIDv4 of the vulnerability lookup instance
When the comment was created originally
When the comment was last updated
Title of the comment
Description of the comment
The identifier of the vulnerability (CVE ID, GHSA-ID, PYSEC ID, etc.).
Loading…
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.