{"api_version":"1","generated_at":"2026-04-22T17:45:31+00:00","cve":"CVE-2014-0160","urls":{"html":"https://cve.report/CVE-2014-0160","api":"https://cve.report/api/cve/CVE-2014-0160.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2014-0160","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2014-0160"},"summary":{"title":"CVE-2014-0160","description":"The (1) TLS and (2) DTLS implementations in OpenSSL 1.0.1 before 1.0.1g do not properly handle Heartbeat Extension packets, which allows remote attackers to obtain sensitive information from process memory via crafted packets that trigger a buffer over-read, as demonstrated by reading private keys, related to d1_both.c and t1_lib.c, aka the Heartbleed bug.","state":"PUBLISHED","assigner":"redhat","published_at":"2014-04-07 22:55:03","updated_at":"2026-04-21 20:07:16"},"problem_types":["CWE-125","n/a","CWE-125 CWE-125 Out-of-bounds Read"],"metrics":[{"version":"3.1","source":"nvd@nist.gov","type":"Primary","score":"7.5","severity":"HIGH","vector":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N","data":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N","baseScore":7.5,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"NONE","availabilityImpact":"NONE"}},{"version":"3.1","source":"ADP","type":"DECLARED","score":"7.5","severity":"HIGH","vector":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N","data":{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"NONE","baseScore":7.5,"baseSeverity":"HIGH","confidentialityImpact":"HIGH","integrityImpact":"NONE","privilegesRequired":"NONE","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N","version":"3.1"}},{"version":"3.1","source":"134c704f-9b21-4f2e-91b3-4a467353bcc0","type":"Secondary","score":"7.5","severity":"HIGH","vector":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N","data":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N","baseScore":7.5,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"NONE","availabilityImpact":"NONE"}},{"version":"2.0","source":"nvd@nist.gov","type":"Primary","score":"5","severity":"","vector":"AV:N/AC:L/Au:N/C:P/I:N/A:N","data":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:N/A:N","baseScore":5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"NONE","availabilityImpact":"NONE"}}],"references":[{"url":"http://marc.info/?l=bugtraq&m=139758572430452&w=2","name":"http://marc.info/?l=bugtraq&m=139758572430452&w=2","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Mailing List","Third Party Advisory"],"title":"'[security bulletin] HPSBST03001 rev.1 - HP XP P9500 Disk Array running OpenSSL, Remote Disclosure of' - MARC","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://marc.info/?l=bugtraq&m=139817685517037&w=2","name":"http://marc.info/?l=bugtraq&m=139817685517037&w=2","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Mailing List","Third Party Advisory"],"title":"'[security bulletin] HPSBMU03019 rev.1 - HP Software UCMDB Browser and Configuration Manager running ' - MARC","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://secunia.com/advisories/59347","name":"http://secunia.com/advisories/59347","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Broken Link","Third Party Advisory"],"title":"Security Advisory SA59347 - Innominate mGuard Device Manager OpenSSL Multiple Vulnerabilities - Secunia","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://secunia.com/advisories/57721","name":"http://secunia.com/advisories/57721","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Broken Link","Third Party Advisory"],"title":"Security Advisory SA57721 - Debian update for openssl - Secunia","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://lists.balabit.hu/pipermail/syslog-ng-announce/2014-April/000184.html","name":"https://lists.balabit.hu/pipermail/syslog-ng-announce/2014-April/000184.html","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Mailing List","Third Party Advisory"],"title":"[syslog-ng-announce] syslog-ng Premium Edition 5 LTS (5.0.4a) has been released","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://cert-portal.siemens.com/productcert/pdf/ssa-635659.pdf","name":"https://cert-portal.siemens.com/productcert/pdf/ssa-635659.pdf","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory"],"title":"","mime":"application/pdf","httpstatus":"200","archivestatus":"200"},{"url":"http://marc.info/?l=bugtraq&m=139905295427946&w=2","name":"http://marc.info/?l=bugtraq&m=139905295427946&w=2","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Mailing List","Third Party Advisory"],"title":"'[security bulletin] HPSBMU03033 rev.1 - HP Insight Control Software Components running OpenSSL, Remo' - MARC","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://marc.info/?l=bugtraq&m=139905351928096&w=2","name":"http://marc.info/?l=bugtraq&m=139905351928096&w=2","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Mailing List","Third Party Advisory"],"title":"'[security bulletin] HPSBMU03030 rev.1 - HP Service Pack for ProLiant (SPP) Bundled Software running ' - MARC","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://marc.info/?l=bugtraq&m=139765756720506&w=2","name":"http://marc.info/?l=bugtraq&m=139765756720506&w=2","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Mailing List","Third Party Advisory"],"title":"'[security bulletin] HPSBMU02999 rev.1 - HP Software Autonomy WorkSite Server (On-Premises Software),' - MARC","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://www.mitel.com/en-ca/support/security-advisories/mitel-product-security-advisory-17-0008","name":"https://www.mitel.com/en-ca/support/security-advisories/mitel-product-security-advisory-17-0008","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory"],"title":"Mitel Product Security Advisory 17-0008","mime":"text/html","httpstatus":"403","archivestatus":"200"},{"url":"http://marc.info/?l=bugtraq&m=139869891830365&w=2","name":"http://marc.info/?l=bugtraq&m=139869891830365&w=2","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Mailing List","Third Party Advisory"],"title":"'[security bulletin] HPSBMU03022 rev.1 - HP Systems Insight Manager (SIM) Bundled Software running Op' - MARC","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://marc.info/?l=bugtraq&m=140015787404650&w=2","name":"http://marc.info/?l=bugtraq&m=140015787404650&w=2","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Mailing List","Third Party Advisory"],"title":"'[security bulletin] HPSBMU03040 rev.1 - HP LoadRunner & HP Performance Center, running OpenSSL, Remo' - MARC","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://lists.apache.org/thread.html/rf8e8c091182b45daa50d3557cad9b10bb4198e3f08cf8f1c66a1b08d%40%3Cdev.tomcat.apache.org%3E","name":"https://lists.apache.org/thread.html/rf8e8c091182b45daa50d3557cad9b10bb4198e3f08cf8f1c66a1b08d%40%3Cdev.tomcat.apache.org%3E","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Mailing List","Patch","Third Party Advisory"],"title":"Pony Mail!","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://marc.info/?l=bugtraq&m=139757919027752&w=2","name":"http://marc.info/?l=bugtraq&m=139757919027752&w=2","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Mailing List","Third Party Advisory"],"title":"'[security bulletin] HPSBMU02997 rev.1 - HP Smart Update Manager (SUM) running OpenSSL, Remote Disclo' - MARC","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://seclists.org/fulldisclosure/2014/Apr/190","name":"http://seclists.org/fulldisclosure/2014/Apr/190","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Mailing List","Third Party Advisory"],"title":"Full Disclosure: Re: heartbleed OpenSSL bug CVE-2014-0160","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://marc.info/?l=bugtraq&m=142660345230545&w=2","name":"http://marc.info/?l=bugtraq&m=142660345230545&w=2","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Mailing List","Third Party Advisory"],"title":"'[security bulletin] HPSBHF03293 rev.1 - HP Virtual Connect 8Gb 24-Port FC Module running OpenSSL and' - MARC","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://secunia.com/advisories/57836","name":"http://secunia.com/advisories/57836","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Broken Link","Third Party Advisory"],"title":"About Secunia Research | Flexera","mime":"text/plain","httpstatus":"200","archivestatus":"200"},{"url":"http://www.exploit-db.com/exploits/32764","name":"http://www.exploit-db.com/exploits/32764","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit","Third Party Advisory","VDB Entry"],"title":"OpenSSL 1.0.1f TLS Heartbeat Extension - Memory Disclosure (Multiple SSL/TLS versions)","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://marc.info/?l=bugtraq&m=139757819327350&w=2","name":"http://marc.info/?l=bugtraq&m=139757819327350&w=2","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Mailing List","Third Party Advisory"],"title":"'[security bulletin] HPSBMU02998 rev.1 - HP System Management Homepage (SMH) running OpenSSL on Linux' - MARC","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://marc.info/?l=bugtraq&m=139869720529462&w=2","name":"http://marc.info/?l=bugtraq&m=139869720529462&w=2","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Mailing List","Third Party Advisory"],"title":"'[security bulletin] HPSBMU03025 rev.1 - HP Diagnostics running OpenSSL, Remote Disclosure of Informa' - MARC","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://marc.info/?l=bugtraq&m=140075368411126&w=2","name":"http://marc.info/?l=bugtraq&m=140075368411126&w=2","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Mailing List","Third Party Advisory"],"title":"'[security bulletin] HPSBMU03044 rev.1 - HP Business Process Monitor, running OpenSSL, Remote Disclos' - MARC","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://marc.info/?l=bugtraq&m=139835844111589&w=2","name":"http://marc.info/?l=bugtraq&m=139835844111589&w=2","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Mailing List","Third Party Advisory"],"title":"'[security bulletin] HPSBPI03014 rev.1 - HP LaserJet Pro MFP Printers, HP Color LaserJet Pro MFP Prin' - MARC","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://support.f5.com/kb/en-us/solutions/public/15000/100/sol15159.html?sr=36517217","name":"https://support.f5.com/kb/en-us/solutions/public/15000/100/sol15159.html?sr=36517217","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory"],"title":"SOL15159 - OpenSSL vulnerability CVE-2014-0160","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://marc.info/?l=bugtraq&m=139824993005633&w=2","name":"http://marc.info/?l=bugtraq&m=139824993005633&w=2","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Mailing List","Third Party Advisory"],"title":"'[security bulletin] HPSBMU03013 rev.1 - WMI Mapper for HP Systems Insight Manager running OpenSSL, R' - MARC","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.kerio.com/support/kerio-control/release-history","name":"http://www.kerio.com/support/kerio-control/release-history","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Broken Link","Third Party Advisory"],"title":"Kerio Control small business firewall","mime":"text/html","httpstatus":"200","archivestatus":"403"},{"url":"http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140409-heartbleed","name":"http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140409-heartbleed","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory"],"title":"OpenSSL Heartbeat Extension Vulnerability in Multiple Cisco Products","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.exploit-db.com/exploits/32745","name":"http://www.exploit-db.com/exploits/32745","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit","Third Party Advisory","VDB Entry"],"title":"OpenSSL TLS Heartbeat Extension - Memory Disclosure","mime":"text/x-python","httpstatus":"200","archivestatus":"200"},{"url":"http://marc.info/?l=bugtraq&m=139889295732144&w=2","name":"http://marc.info/?l=bugtraq&m=139889295732144&w=2","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Mailing List","Third Party Advisory"],"title":"'[security bulletin] HPSBPI03031 rev.1 - HP Officejet Pro X Printers, Certain Officejet Pro Printers,' - MARC","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.blackberry.com/btsc/KB35882","name":"http://www.blackberry.com/btsc/KB35882","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Broken Link"],"title":"KB35882-BlackBerry response to OpenSSL “Heartbleed” vulnerability","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://lists.opensuse.org/opensuse-security-announce/2014-04/msg00005.html","name":"http://lists.opensuse.org/opensuse-security-announce/2014-04/msg00005.html","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Mailing List","Third Party Advisory"],"title":"[security-announce] SUSE Security Announcement: openssl \"HeartBleed\" att","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://marc.info/?l=bugtraq&m=139817727317190&w=2","name":"http://marc.info/?l=bugtraq&m=139817727317190&w=2","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Mailing List","Third Party Advisory"],"title":"'[security bulletin] HPSBMU03017 rev.1 - HP Software Connect-IT running OpenSSL, Remote Disclosure of' - MARC","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://www.cert.fi/en/reports/2014/vulnerability788210.html","name":"https://www.cert.fi/en/reports/2014/vulnerability788210.html","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Not Applicable","Third Party Advisory"],"title":"Viestintävirasto - \n\n\n\t \n\t\n\t \n\t\n\t \n\t\n\t \n\tInformation security","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.openssl.org/news/secadv_20140407.txt","name":"http://www.openssl.org/news/secadv_20140407.txt","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Broken Link","Vendor Advisory"],"title":"","mime":"text/plain","httpstatus":"200","archivestatus":"200"},{"url":"http://rhn.redhat.com/errata/RHSA-2014-0377.html","name":"http://rhn.redhat.com/errata/RHSA-2014-0377.html","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory"],"title":"Red Hat Customer Portal","mime":"text/html","httpstatus":"-1","archivestatus":"200"},{"url":"http://rhn.redhat.com/errata/RHSA-2014-0378.html","name":"http://rhn.redhat.com/errata/RHSA-2014-0378.html","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory"],"title":"Red Hat Customer Portal","mime":"text/html","httpstatus":"-1","archivestatus":"200"},{"url":"http://marc.info/?l=bugtraq&m=139774054614965&w=2","name":"http://marc.info/?l=bugtraq&m=139774054614965&w=2","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Mailing List","Third Party Advisory"],"title":"'[security bulletin] HPSBGN03008 rev.1 - HP Software Service Manager, \"HeartBleed\" OpenSSL Vulnerabil' - MARC","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.oracle.com/technetwork/topics/security/opensslheartbleedcve-2014-0160-2188454.html","name":"http://www.oracle.com/technetwork/topics/security/opensslheartbleedcve-2014-0160-2188454.html","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Third Party Advisory"],"title":"OpenSSL Heartbleed Vulnerability CVE-2014-0160","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2014-0160","name":"https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2014-0160","refsource":"134c704f-9b21-4f2e-91b3-4a467353bcc0","tags":["US Government Resource"],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"http://www.getchef.com/blog/2014/04/09/enterprise-chef-11-1-3-release/","name":"http://www.getchef.com/blog/2014/04/09/enterprise-chef-11-1-3-release/","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Release Notes"],"title":"Enterprise Chef 11.1.3 Release | Chef Blog","mime":"text/html","httpstatus":"-1","archivestatus":"200"},{"url":"http://marc.info/?l=bugtraq&m=139905405728262&w=2","name":"http://marc.info/?l=bugtraq&m=139905405728262&w=2","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Mailing List","Third Party Advisory"],"title":"'[security bulletin] HPSBMU03032 rev.1 - HP Virtual Connect Firmware Smart Components Installer Softw' - MARC","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://yunus-shn.medium.com/ricon-industrial-cellular-router-heartbleed-attack-2634221c02bd","name":"https://yunus-shn.medium.com/ricon-industrial-cellular-router-heartbleed-attack-2634221c02bd","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Broken Link","Exploit","Third Party Advisory"],"title":"RICON Industrial Cellular Router Heartbleed Attack - Yunus Şahin - Medium","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://gist.github.com/chapmajs/10473815","name":"https://gist.github.com/chapmajs/10473815","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit"],"title":"Check your system rubies for vulnerable OpenSSL (CVE-2014-0160 \"Heartbleed\")","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://marc.info/?l=bugtraq&m=139889113431619&w=2","name":"http://marc.info/?l=bugtraq&m=139889113431619&w=2","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Mailing List","Third Party Advisory"],"title":"'[security bulletin] HPSBMU03024 rev.1 - HP Insight Control Server Deployment on Linux and Windows ru' - MARC","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://heartbleed.com/","name":"http://heartbleed.com/","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory"],"title":"Heartbleed Bug","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004661","name":"http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004661","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory"],"title":"IBM Security Bulletin: IBM DS8870 Release 7.2 is affected by an additional vulnerability in OpenSSL (CVE-2014-0160) - United States","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://download.schneider-electric.com/files?p_Doc_Ref=SEVD%202014-119-01","name":"http://download.schneider-electric.com/files?p_Doc_Ref=SEVD%202014-119-01","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Broken Link"],"title":"Schneider Electric","mime":"text/html","httpstatus":"404","archivestatus":"401"},{"url":"http://www-01.ibm.com/support/docview.wss?uid=swg21670161","name":"http://www-01.ibm.com/support/docview.wss?uid=swg21670161","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Broken Link"],"title":"IBM Security Bulletin: IBM Endpoint Manager 9.1.1065 – OpenSSL Vulnerability Update (CVE-2014-0160) - United States","mime":"text/html","httpstatus":"404","archivestatus":"200"},{"url":"http://lists.fedoraproject.org/pipermail/package-announce/2014-April/131291.html","name":"http://lists.fedoraproject.org/pipermail/package-announce/2014-April/131291.html","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Broken Link","Third Party Advisory"],"title":"[SECURITY] Fedora 19 Update: openssl-1.0.1e-37.fc19.1","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://secunia.com/advisories/57966","name":"http://secunia.com/advisories/57966","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Broken Link","Third Party Advisory"],"title":"About Secunia Research | Flexera","mime":"text/plain","httpstatus":"200","archivestatus":"200"},{"url":"http://www.splunk.com/view/SP-CAAAMB3","name":"http://www.splunk.com/view/SP-CAAAMB3","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory"],"title":"Splunk 6.0.3 addresses two vulnerabilities - April 10, 2014 | Splunk","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1084875","name":"https://bugzilla.redhat.com/show_bug.cgi?id=1084875","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Issue Tracking","Third Party Advisory"],"title":"Bug 1084875 – CVE-2014-0160 openssl: information disclosure in handling of TLS heartbeat extension packets","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.securitytracker.com/id/1030074","name":"http://www.securitytracker.com/id/1030074","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Broken Link","Third Party Advisory","VDB Entry"],"title":"BlackBerry Link OpenSSL TLS Heartbeat Buffer Overread Lets Remote Users Obtain Potentially Sensitive Information - SecurityTracker","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://git.openssl.org/gitweb/?p=openssl.git%3Ba=commit%3Bh=96db9023b881d7cd9f379b0c154650d6c108e9a3","name":"http://git.openssl.org/gitweb/?p=openssl.git%3Ba=commit%3Bh=96db9023b881d7cd9f379b0c154650d6c108e9a3","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Broken Link"],"title":"git.openssl.org Git - openssl.git/commit","mime":"text/xml","httpstatus":"404","archivestatus":"200"},{"url":"http://lists.opensuse.org/opensuse-updates/2014-04/msg00061.html","name":"http://lists.opensuse.org/opensuse-updates/2014-04/msg00061.html","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Mailing List","Third Party Advisory"],"title":"openSUSE-SU-2014:0560-1: moderate: update for openssl","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://marc.info/?l=bugtraq&m=139836085512508&w=2","name":"http://marc.info/?l=bugtraq&m=139836085512508&w=2","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Mailing List","Third Party Advisory"],"title":"'[security bulletin] HPSBMU03020 rev.1 - HP Version Control Agent (VCA) and Version Control Repositor' - MARC","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://seclists.org/fulldisclosure/2014/Apr/173","name":"http://seclists.org/fulldisclosure/2014/Apr/173","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Mailing List","Third Party Advisory"],"title":"Full Disclosure: MRI Rubies may contain statically linked, vulnerable OpenSSL","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://support.citrix.com/article/CTX140605","name":"http://support.citrix.com/article/CTX140605","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory"],"title":"Citrix Security Advisory for CVE-2014-0160, aka the Heartbleed vulnerability","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://rhn.redhat.com/errata/RHSA-2014-0396.html","name":"http://rhn.redhat.com/errata/RHSA-2014-0396.html","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory"],"title":"Red Hat Customer Portal","mime":"text/html","httpstatus":"-1","archivestatus":"200"},{"url":"http://www.apcmedia.com/salestools/SJHN-7RKGNM/SJHN-7RKGNM_R4_EN.pdf","name":"http://www.apcmedia.com/salestools/SJHN-7RKGNM/SJHN-7RKGNM_R4_EN.pdf","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Broken Link","Third Party Advisory"],"title":"Please wait...","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.securitytracker.com/id/1030082","name":"http://www.securitytracker.com/id/1030082","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Broken Link","Third Party Advisory","VDB Entry"],"title":"Cisco IOS XE OpenSSL TLS Heartbeat Buffer Overread Lets Remote Users Obtain Potentially Sensitive Information - SecurityTracker","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://h20566.www2.hp.com/portal/site/hpsc/template.PAGE/public/kb/docDisplay/?spf_p.tpst=kbDocDisplay&spf_p.prp_kbDocDisplay=wsrp-navigationalState%3DdocId%253Demr_na-c04260637-4%257CdocLocale%253Den_US%257CcalledBy%253DSearch_Result&javax.portlet.begCacheTok=com.vignette.cachetoken&javax.portlet.endCacheTok=com.vignette.cachetoken","name":"https://h20566.www2.hp.com/portal/site/hpsc/template.PAGE/public/kb/docDisplay/?spf_p.tpst=kbDocDisplay&spf_p.prp_kbDocDisplay=wsrp-navigationalState%3DdocId%253Demr_na-c04260637-4%257CdocLocale%253Den_US%257CcalledBy%253DSearch_Result&javax.portlet.begCacheTok=com.vignette.cachetoken&javax.portlet.endCacheTok=com.vignette.cachetoken","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Broken Link"],"title":"HP Support document - HP Support Center","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://public.support.unisys.com/common/public/vulnerability/NVD_Detail_Rpt.aspx?ID=1","name":"http://public.support.unisys.com/common/public/vulnerability/NVD_Detail_Rpt.aspx?ID=1","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory"],"title":"Vulnerability Report - OpenSSL \"Heartbleed\" vulnerability on OS 2200 QProcessor","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.securityfocus.com/archive/1/534161/100/0/threaded","name":"http://www.securityfocus.com/archive/1/534161/100/0/threaded","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Broken Link","Not Applicable","Third Party Advisory","VDB Entry"],"title":"SecurityFocus","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://sku11army.blogspot.com/2020/01/heartbleed-hearts-continue-to-bleed.html","name":"https://sku11army.blogspot.com/2020/01/heartbleed-hearts-continue-to-bleed.html","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit","Permissions Required","Third Party Advisory"],"title":"Skull Army: #Heartbleed; The hearts continue to bleed...","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://public.support.unisys.com/common/public/vulnerability/NVD_Detail_Rpt.aspx?ID=3","name":"http://public.support.unisys.com/common/public/vulnerability/NVD_Detail_Rpt.aspx?ID=3","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Permissions Required","Third Party Advisory"],"title":"Vulnerability Report - \"Heartbleed\" security vulnerability found in certain versions of SAN Datamover used in Unisys MCP Platforms","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://blog.fox-it.com/2014/04/08/openssl-heartbleed-bug-live-blog/","name":"http://blog.fox-it.com/2014/04/08/openssl-heartbleed-bug-live-blog/","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Issue Tracking","Third Party Advisory"],"title":"OpenSSL ‘heartbleed’ bug live blog | Fox-IT International blog","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://marc.info/?l=bugtraq&m=139905653828999&w=2","name":"http://marc.info/?l=bugtraq&m=139905653828999&w=2","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Mailing List","Third Party Advisory"],"title":"'[security bulletin] HPSBST03004 rev.1 - HP IBRIX X9320 Storage running OpenSSL, Remote Disclosure of' - MARC","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html","name":"http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Third Party Advisory"],"title":"Oracle Critical Patch Update - July 2014","mime":"text/html","httpstatus":"-1","archivestatus":"200"},{"url":"http://marc.info/?l=bugtraq&m=139722163017074&w=2","name":"http://marc.info/?l=bugtraq&m=139722163017074&w=2","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Mailing List","Third Party Advisory"],"title":"'[security bulletin] HPSBMU02995 rev.1 - HP Software HP Service Manager, Asset Manager, UCMDB Browser' - MARC","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://marc.info/?l=bugtraq&m=141287864628122&w=2","name":"http://marc.info/?l=bugtraq&m=141287864628122&w=2","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Mailing List","Third Party Advisory"],"title":"'[security bulletin] HPSBHF03136 rev.1 - HP TippingPoint NGFW running OpenSSL, Remote Disclosure of I' - MARC","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.ubuntu.com/usn/USN-2165-1","name":"http://www.ubuntu.com/usn/USN-2165-1","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory"],"title":"USN-2165-1: OpenSSL vulnerabilities | Ubuntu","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://marc.info/?l=bugtraq&m=139905868529690&w=2","name":"http://marc.info/?l=bugtraq&m=139905868529690&w=2","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Mailing List","Third Party Advisory"],"title":"'[security bulletin] HPSBST03027 rev.1 - HP StoreVirtual 4000 Storage and HP P4000 G2 Storage using H' - MARC","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://lists.fedoraproject.org/pipermail/package-announce/2014-August/136473.html","name":"http://lists.fedoraproject.org/pipermail/package-announce/2014-August/136473.html","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Mailing List","Third Party Advisory"],"title":"[SECURITY] Fedora 20 Update: openssl-1.0.1e-39.fc20","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.kb.cert.org/vuls/id/720951","name":"http://www.kb.cert.org/vuls/id/720951","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory","US Government Resource"],"title":"Vulnerability Note VU#720951 - OpenSSL TLS heartbeat extension read overflow discloses sensitive information","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://secunia.com/advisories/59139","name":"http://secunia.com/advisories/59139","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Broken Link","Third Party Advisory"],"title":"Security Advisory SA59139 - Schneider Electric Network Shutdown Module (NSM) OpenSSL Heartbeat Two Vulnerabilities - Secunia","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://secunia.com/advisories/59243","name":"http://secunia.com/advisories/59243","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Broken Link","Third Party Advisory"],"title":"Security Advisory SA59243 - IBM DS8870 OpenSSL TLS/DTLS Heartbeat Two Information Disclosure Vulnerabilities - Secunia","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://blog.torproject.org/blog/openssl-bug-cve-2014-0160","name":"https://blog.torproject.org/blog/openssl-bug-cve-2014-0160","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Issue Tracking"],"title":"OpenSSL bug CVE-2014-0160 | The Tor Blog","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.securitytracker.com/id/1030080","name":"http://www.securitytracker.com/id/1030080","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Broken Link","Third Party Advisory","VDB Entry"],"title":"WebEx Meetings Server OpenSSL TLS Heartbeat Buffer Overread Lets Remote Users Obtain Potentially Sensitive Information - SecurityTracker","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.getchef.com/blog/2014/04/09/chef-server-heartbleed-cve-2014-0160-releases/","name":"http://www.getchef.com/blog/2014/04/09/chef-server-heartbleed-cve-2014-0160-releases/","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory"],"title":"Chef Server Heartbleed (CVE-2014-0160) Releases | Chef Blog","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.securitytracker.com/id/1030079","name":"http://www.securitytracker.com/id/1030079","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Broken Link","Third Party Advisory","VDB Entry"],"title":"Cisco Security Manager OpenSSL TLS Heartbeat Buffer Overread Lets Remote Users Obtain Potentially Sensitive Information - SecurityTracker","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.debian.org/security/2014/dsa-2896","name":"http://www.debian.org/security/2014/dsa-2896","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Mailing List","Third Party Advisory"],"title":"Debian -- Security Information -- DSA-2896-1 openssl","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://lists.apache.org/thread.html/f8e0814e11c7f21f42224b6de111cb3f5e5ab5c15b78924c516d4ec2%40%3Cdev.tomcat.apache.org%3E","name":"https://lists.apache.org/thread.html/f8e0814e11c7f21f42224b6de111cb3f5e5ab5c15b78924c516d4ec2%40%3Cdev.tomcat.apache.org%3E","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Mailing List","Patch","Third Party Advisory"],"title":"Apache Mail Archives","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://marc.info/?l=bugtraq&m=139817782017443&w=2","name":"http://marc.info/?l=bugtraq&m=139817782017443&w=2","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Mailing List","Third Party Advisory"],"title":"'[security bulletin] HPSBMU03018 rev.1 - HP Software Asset Manager running OpenSSL, Remote Disclosure' - MARC","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://marc.info/?l=bugtraq&m=139757726426985&w=2","name":"http://marc.info/?l=bugtraq&m=139757726426985&w=2","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Mailing List","Third Party Advisory"],"title":"'[security bulletin] HPSBMU02994 rev.1 - HP BladeSystem c-Class Onboard Administrator (OA) running Op' - MARC","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://cogentdatahub.com/ReleaseNotes.html","name":"http://cogentdatahub.com/ReleaseNotes.html","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Release Notes"],"title":"Release Notes","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://secunia.com/advisories/57347","name":"http://secunia.com/advisories/57347","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Broken Link","Third Party Advisory"],"title":"About Secunia Research | Flexera","mime":"text/plain","httpstatus":"200","archivestatus":"200"},{"url":"http://www.mandriva.com/security/advisories?name=MDVSA-2015:062","name":"http://www.mandriva.com/security/advisories?name=MDVSA-2015:062","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Broken Link","Third Party Advisory"],"title":"Support / Security / Advisories /  / MDVSA-2015:062 | Mandriva","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://lists.apache.org/thread.html/ba661b0edd913b39ff129a32d855620dd861883ade05fd88a8ce517d%40%3Cdev.tomcat.apache.org%3E","name":"https://lists.apache.org/thread.html/ba661b0edd913b39ff129a32d855620dd861883ade05fd88a8ce517d%40%3Cdev.tomcat.apache.org%3E","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Mailing List","Patch","Third Party Advisory"],"title":"Apache Mail Archives","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://advisories.mageia.org/MGASA-2014-0165.html","name":"http://advisories.mageia.org/MGASA-2014-0165.html","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory"],"title":"Mageia Advisory: MGASA-2014-0165 - Updated openssl package fix two security vulnerabilities","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://seclists.org/fulldisclosure/2014/Apr/91","name":"http://seclists.org/fulldisclosure/2014/Apr/91","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Mailing List","Third Party Advisory"],"title":"Full Disclosure: Re: heartbleed OpenSSL bug CVE-2014-0160","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.securityfocus.com/bid/66690","name":"http://www.securityfocus.com/bid/66690","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Broken Link","Third Party Advisory","VDB Entry"],"title":"OpenSSL TLS 'heartbeat' Extension Multiple Information Disclosure Vulnerabilities","mime":"text/html","httpstatus":"200","archivestatus":"0"},{"url":"http://marc.info/?l=bugtraq&m=139824923705461&w=2","name":"http://marc.info/?l=bugtraq&m=139824923705461&w=2","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Mailing List","Third Party Advisory"],"title":"'[security bulletin] HPSBST03015 rev.1 - HP 3PAR OS running OpenSSL, Remote Disclosure of Information' - MARC","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://marc.info/?l=bugtraq&m=139842151128341&w=2","name":"http://marc.info/?l=bugtraq&m=139842151128341&w=2","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Mailing List","Third Party Advisory"],"title":"'[security bulletin] HPSBST03016 rev.1 - HP P2000 G3 MSA Array Systems, HP MSA 2040 Storage, and HP M' - MARC","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://seclists.org/fulldisclosure/2014/Apr/90","name":"http://seclists.org/fulldisclosure/2014/Apr/90","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Mailing List","Third Party Advisory"],"title":"Full Disclosure: heartbleed OpenSSL bug CVE-2014-0160","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.getchef.com/blog/2014/04/09/chef-server-11-0-12-release/","name":"http://www.getchef.com/blog/2014/04/09/chef-server-11-0-12-release/","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Release Notes"],"title":"Chef Server 11.0.12 Release | Chef Blog","mime":"text/html","httpstatus":"-1","archivestatus":"200"},{"url":"https://support.f5.com/kb/en-us/solutions/public/15000/100/sol15159.html","name":"https://support.f5.com/kb/en-us/solutions/public/15000/100/sol15159.html","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory"],"title":"F5 - Signon","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://lists.opensuse.org/opensuse-security-announce/2014-04/msg00004.html","name":"http://lists.opensuse.org/opensuse-security-announce/2014-04/msg00004.html","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Mailing List","Third Party Advisory"],"title":"[security-announce] openSUSE-SU-2014:0492-1: important: update for opens","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://marc.info/?l=bugtraq&m=139905202427693&w=2","name":"http://marc.info/?l=bugtraq&m=139905202427693&w=2","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Mailing List","Third Party Advisory"],"title":"'[security bulletin] HPSBMU03029 rev.1 - HP Insight Control Server Migration running OpenSSL, Remote ' - MARC","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://marc.info/?l=bugtraq&m=139843768401936&w=2","name":"http://marc.info/?l=bugtraq&m=139843768401936&w=2","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Mailing List","Third Party Advisory"],"title":"'[security bulletin] HPSBMU03023 rev.1 - HP BladeSystem c-Class Virtual Connect Support Utility (VCSU' - MARC","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.securitytracker.com/id/1030078","name":"http://www.securitytracker.com/id/1030078","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Broken Link","Third Party Advisory","VDB Entry"],"title":"Cisco Unified Communications Manager OpenSSL TLS Heartbeat Buffer Overread Lets Remote Users Obtain Potentially Sensitive Information - SecurityTracker","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://marc.info/?l=bugtraq&m=139905458328378&w=2","name":"http://marc.info/?l=bugtraq&m=139905458328378&w=2","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Mailing List","Third Party Advisory"],"title":"'[security bulletin] HPSBMU03009 rev.2 - HP CloudSystem Foundation and Enterprise Software v8.0 runni' - MARC","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.securitytracker.com/id/1030081","name":"http://www.securitytracker.com/id/1030081","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Broken Link","Third Party Advisory","VDB Entry"],"title":"Cisco Mobility Services Engine OpenSSL TLS Heartbeat Buffer Overread Lets Remote Users Obtain Potentially Sensitive Information - SecurityTracker","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://marc.info/?l=bugtraq&m=139835815211508&w=2","name":"http://marc.info/?l=bugtraq&m=139835815211508&w=2","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Mailing List","Third Party Advisory"],"title":"'[security bulletin] HPSBHF03021 rev.1 - HP Thin Client with ThinPro OS or Smart Zero Core Services, ' - MARC","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://lists.fedoraproject.org/pipermail/package-announce/2014-April/131221.html","name":"http://lists.fedoraproject.org/pipermail/package-announce/2014-April/131221.html","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Broken Link","Third Party Advisory"],"title":"[SECURITY] Fedora 20 Update: openssl-1.0.1e-37.fc20.1","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.symantec.com/security_response/securityupdates/detail.jsp?fid=security_advisory&pvid=security_advisory&year=&suid=20160512_00","name":"http://www.symantec.com/security_response/securityupdates/detail.jsp?fid=security_advisory&pvid=security_advisory&year=&suid=20160512_00","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory"],"title":"Security Advisories Relating to Symantec Products - Symantec Messaging Gateway 10.6.x ACE Library Static Link to Vulnerable SSL Version - 2016-05-12T04:00:00 PDT\n\t| Symantec","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.f-secure.com/en/web/labs_global/fsc-2014-1","name":"http://www.f-secure.com/en/web/labs_global/fsc-2014-1","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Broken Link","Third Party Advisory"],"title":"News - Product Security - Security advisories - 2014 - fsc-2014-1 | F-Secure","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://marc.info/?l=bugtraq&m=140752315422991&w=2","name":"http://marc.info/?l=bugtraq&m=140752315422991&w=2","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Mailing List","Third Party Advisory"],"title":"'[security bulletin] HPSBMU03062 rev.1 - HP Insight Control server deployment on Linux and Windows ru' - MARC","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://marc.info/?l=bugtraq&m=139905243827825&w=2","name":"http://marc.info/?l=bugtraq&m=139905243827825&w=2","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Mailing List","Third Party Advisory"],"title":"'[security bulletin] HPSBMU03028 rev.1 - HP Matrix Operating Environment and CloudSystem Matrix Softw' - MARC","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://marc.info/?l=bugtraq&m=139808058921905&w=2","name":"http://marc.info/?l=bugtraq&m=139808058921905&w=2","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Mailing List","Third Party Advisory"],"title":"'[security bulletin] HPSBMU03012 rev.1 - HP Insight Management VCEM Web Client SDK (VCEMSDK) running ' - MARC","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://secunia.com/advisories/57968","name":"http://secunia.com/advisories/57968","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Broken Link","Third Party Advisory"],"title":"About Secunia Research | Flexera","mime":"text/plain","httpstatus":"200","archivestatus":"200"},{"url":"https://lists.apache.org/thread.html/re3b72cbb13e1dfe85c4a06959a3b6ca6d939b407ecca80db12b54220%40%3Cdev.tomcat.apache.org%3E","name":"https://lists.apache.org/thread.html/re3b72cbb13e1dfe85c4a06959a3b6ca6d939b407ecca80db12b54220%40%3Cdev.tomcat.apache.org%3E","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Mailing List","Patch","Third Party Advisory"],"title":"Pony Mail!","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.innominate.com/data/downloads/manuals/mdm_1.5.2.1_Release_Notes.pdf","name":"http://www.innominate.com/data/downloads/manuals/mdm_1.5.2.1_Release_Notes.pdf","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Not Applicable"],"title":"","mime":"application/pdf","httpstatus":"-1","archivestatus":"200"},{"url":"https://filezilla-project.org/versions.php?type=server","name":"https://filezilla-project.org/versions.php?type=server","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Release Notes"],"title":"FileZilla - The free FTP solution","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://marc.info/?l=bugtraq&m=140724451518351&w=2","name":"http://marc.info/?l=bugtraq&m=140724451518351&w=2","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Mailing List","Third Party Advisory"],"title":"'[security bulletin] HPSBMU03037 rev.2 - HP Multimedia Service Environment (MSE), (HP Network Interac' - MARC","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.getchef.com/blog/2014/04/09/enterprise-chef-1-4-9-release/","name":"http://www.getchef.com/blog/2014/04/09/enterprise-chef-1-4-9-release/","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Release Notes"],"title":"Enterprise Chef 1.4.9 Release | Chef Blog","mime":"text/html","httpstatus":"-1","archivestatus":"200"},{"url":"http://secunia.com/advisories/57483","name":"http://secunia.com/advisories/57483","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Broken Link","Third Party Advisory"],"title":"About Secunia Research | Flexera","mime":"text/plain","httpstatus":"200","archivestatus":"200"},{"url":"http://marc.info/?l=bugtraq&m=139774703817488&w=2","name":"http://marc.info/?l=bugtraq&m=139774703817488&w=2","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Mailing List","Third Party Advisory"],"title":"'[security bulletin] HPSBGN03010 rev.1 - HP Software Server Automation, \"HeartBleed\" OpenSSL Vulnerab' - MARC","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://seclists.org/fulldisclosure/2014/Dec/23","name":"http://seclists.org/fulldisclosure/2014/Dec/23","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Mailing List","Third Party Advisory"],"title":"Full Disclosure: NEW: VMSA-2014-0012 - VMware vSphere product updates address security vulnerabilities","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://seclists.org/fulldisclosure/2014/Apr/109","name":"http://seclists.org/fulldisclosure/2014/Apr/109","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Mailing List","Third Party Advisory"],"title":"Full Disclosure: Re: heartbleed OpenSSL bug CVE-2014-0160","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.securitytracker.com/id/1030077","name":"http://www.securitytracker.com/id/1030077","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Broken Link","Third Party Advisory","VDB Entry"],"title":"Splunk OpenSSL TLS Heartbeat Buffer Overread Lets Remote Users Obtain Potentially Sensitive Information - SecurityTracker","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://code.google.com/p/mod-spdy/issues/detail?id=85","name":"https://code.google.com/p/mod-spdy/issues/detail?id=85","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Issue Tracking"],"title":"Issue 85 - \n mod-spdy -\n \n CVE-2014-0160 fix needed - \n Apache SPDY module - Google Project Hosting","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.us-cert.gov/ncas/alerts/TA14-098A","name":"http://www.us-cert.gov/ncas/alerts/TA14-098A","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory","US Government Resource"],"title":"OpenSSL 'Heartbleed' vulnerability (CVE-2014-0160) | US-CERT","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://rhn.redhat.com/errata/RHSA-2014-0376.html","name":"http://rhn.redhat.com/errata/RHSA-2014-0376.html","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory"],"title":"Red Hat Customer Portal","mime":"text/html","httpstatus":"-1","archivestatus":"200"},{"url":"http://www-01.ibm.com/support/docview.wss?uid=isg400001843","name":"http://www-01.ibm.com/support/docview.wss?uid=isg400001843","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory"],"title":"IBM Tivoli Composite Application Manager for Transactions Internet Service Monitoring 7.3.0.1 Interim Fix 29 README Tivoli Composite Application Manager for Transactions 7.3.0.1 7.3.0.1-TIV-CAMIS-IF0029 Readme - United States","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www-01.ibm.com/support/docview.wss?uid=isg400001841","name":"http://www-01.ibm.com/support/docview.wss?uid=isg400001841","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory"],"title":"IBM Tivoli Composite Application Manager for Transactions Internet Service Monitoring 7.4 Interim Fix 13 README Tivoli Composite Application Manager for Transactions 7.4.0.0 7.4.0.0-TIV-CAMIS-IF0013 Readme - United States","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://marc.info/?l=bugtraq&m=139833395230364&w=2","name":"http://marc.info/?l=bugtraq&m=139833395230364&w=2","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Mailing List","Third Party Advisory"],"title":"'[security bulletin] HPSBGN03011 rev.1 - HP IceWall MCRP running OpenSSL on Red Hat Enterprise Linux ' - MARC","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.vmware.com/security/advisories/VMSA-2014-0012.html","name":"http://www.vmware.com/security/advisories/VMSA-2014-0012.html","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Broken Link"],"title":"VMSA-2014-0012 | United States","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.securitytracker.com/id/1030026","name":"http://www.securitytracker.com/id/1030026","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Broken Link","Third Party Advisory","VDB Entry"],"title":"OpenSSL TLS Heartbeat Buffer Overread Lets Remote Users Obtain Potentially Sensitive Information - SecurityTracker","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.websense.com/support/article/kbarticle/Vulnerabilities-resolved-in-TRITON-APX-Version-8-0","name":"http://www.websense.com/support/article/kbarticle/Vulnerabilities-resolved-in-TRITON-APX-Version-8-0","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Broken Link"],"title":"Vulnerabilities resolved in TRITON APX Version 8.0","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://git.openssl.org/gitweb/?p=openssl.git;a=commit;h=96db9023b881d7cd9f379b0c154650d6c108e9a3","name":"CONFIRM:http://git.openssl.org/gitweb/?p=openssl.git;a=commit;h=96db9023b881d7cd9f379b0c154650d6c108e9a3","refsource":"MITRE","tags":[],"title":"git.openssl.org Git - openssl.git/commit","mime":"text/xml","httpstatus":"200","archivestatus":"200"},{"url":"https://lists.apache.org/thread.html/ba661b0edd913b39ff129a32d855620dd861883ade05fd88a8ce517d@%3Cdev.tomcat.apache.org%3E","name":"MLIST:[tomcat-dev] 20190319 svn commit: r1855831 [26/30] - in /tomcat/site/trunk: ./ docs/ xdocs/","refsource":"MITRE","tags":[],"title":"Apache Mail Archives","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://lists.apache.org/thread.html/f8e0814e11c7f21f42224b6de111cb3f5e5ab5c15b78924c516d4ec2@%3Cdev.tomcat.apache.org%3E","name":"MLIST:[tomcat-dev] 20190325 svn commit: r1856174 [26/29] - in /tomcat/site/trunk: docs/ xdocs/ xdocs/stylesheets/","refsource":"MITRE","tags":[],"title":"Apache Mail Archives","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://lists.apache.org/thread.html/rf8e8c091182b45daa50d3557cad9b10bb4198e3f08cf8f1c66a1b08d@%3Cdev.tomcat.apache.org%3E","name":"MLIST:[tomcat-dev] 20200203 svn commit: r1873527 [26/30] - /tomcat/site/trunk/docs/","refsource":"MITRE","tags":[],"title":"Pony Mail!","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://lists.apache.org/thread.html/re3b72cbb13e1dfe85c4a06959a3b6ca6d939b407ecca80db12b54220@%3Cdev.tomcat.apache.org%3E","name":"MLIST:[tomcat-dev] 20200213 svn commit: r1873980 [31/34] - /tomcat/site/trunk/docs/","refsource":"MITRE","tags":[],"title":"Pony Mail!","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://www.cve.org/CVERecord?id=CVE-2014-0160","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2014-0160","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[{"source":"CNA","vendor":"n/a","product":"n/a","version":"affected n/a","platforms":[]}],"timeline":[{"source":"ADP","time":"2022-05-04T00:00:00.000Z","lang":"en","value":"CVE-2014-0160 added to CISA KEV"}],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2014","cve_id":"160","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"broadcom","cpe5":"symantec_messaging_gateway","cpe6":"10.6.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"160","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"broadcom","cpe5":"symantec_messaging_gateway","cpe6":"10.6.1","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"160","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"canonical","cpe5":"ubuntu_linux","cpe6":"12.04","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"esm","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"160","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"canonical","cpe5":"ubuntu_linux","cpe6":"12.10","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"160","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"canonical","cpe5":"ubuntu_linux","cpe6":"13.10","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"160","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"debian","cpe5":"debian_linux","cpe6":"6.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"160","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"debian","cpe5":"debian_linux","cpe6":"7.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"160","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"debian","cpe5":"debian_linux","cpe6":"8.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"160","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"fedoraproject","cpe5":"fedora","cpe6":"19","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"160","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"fedoraproject","cpe5":"fedora","cpe6":"20","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"160","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"filezilla-project","cpe5":"filezilla_server","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"160","vulnerable":"0","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"h","cpe4":"intellian","cpe5":"v100","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"160","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"intellian","cpe5":"v100_firmware","cpe6":"1.20","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"160","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"intellian","cpe5":"v100_firmware","cpe6":"1.21","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"160","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"intellian","cpe5":"v100_firmware","cpe6":"1.24","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"160","vulnerable":"0","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"h","cpe4":"intellian","cpe5":"v60","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"160","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"intellian","cpe5":"v60_firmware","cpe6":"1.15","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"160","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"intellian","cpe5":"v60_firmware","cpe6":"1.25","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"160","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"mitel","cpe5":"micollab","cpe6":"6.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"160","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"mitel","cpe5":"micollab","cpe6":"7.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"160","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"mitel","cpe5":"micollab","cpe6":"7.1","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"160","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"mitel","cpe5":"micollab","cpe6":"7.2","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"160","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"mitel","cpe5":"micollab","cpe6":"7.3","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"160","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"mitel","cpe5":"micollab","cpe6":"7.3.0.104","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"160","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"mitel","cpe5":"mivoice","cpe6":"1.1.2.5","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"lync","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"160","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"mitel","cpe5":"mivoice","cpe6":"1.1.3.3","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"skype_for_business","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"160","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"mitel","cpe5":"mivoice","cpe6":"1.2.0.11","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"skype_for_business","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"160","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"mitel","cpe5":"mivoice","cpe6":"1.3.2.2","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"skype_for_business","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"160","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"mitel","cpe5":"mivoice","cpe6":"1.4.0.102","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"skype_for_business","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"160","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"openssl","cpe5":"openssl","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"160","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"opensuse","cpe5":"opensuse","cpe6":"12.3","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"160","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"opensuse","cpe5":"opensuse","cpe6":"13.1","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"160","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"redhat","cpe5":"enterprise_linux_desktop","cpe6":"6.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"160","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"redhat","cpe5":"enterprise_linux_server","cpe6":"6.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"160","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"redhat","cpe5":"enterprise_linux_server_aus","cpe6":"6.5","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"160","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"redhat","cpe5":"enterprise_linux_server_eus","cpe6":"6.5","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"160","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"redhat","cpe5":"enterprise_linux_server_tus","cpe6":"6.5","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"160","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"redhat","cpe5":"enterprise_linux_workstation","cpe6":"6.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"160","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"redhat","cpe5":"gluster_storage","cpe6":"2.1","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"160","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"redhat","cpe5":"storage","cpe6":"2.1","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"160","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"redhat","cpe5":"virtualization","cpe6":"6.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"160","vulnerable":"0","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"h","cpe4":"ricon","cpe5":"s9922l","cpe6":"1.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"160","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"ricon","cpe5":"s9922l_firmware","cpe6":"16.10.3\\(3794\\)","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"160","vulnerable":"0","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"h","cpe4":"siemens","cpe5":"application_processing_engine","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"160","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"siemens","cpe5":"application_processing_engine_firmware","cpe6":"2.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"160","vulnerable":"0","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"h","cpe4":"siemens","cpe5":"cp_1543-1","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"160","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"siemens","cpe5":"cp_1543-1_firmware","cpe6":"1.1","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"160","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"siemens","cpe5":"elan-8.2","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"160","vulnerable":"0","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"h","cpe4":"siemens","cpe5":"simatic_s7-1500","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"160","vulnerable":"0","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"h","cpe4":"siemens","cpe5":"simatic_s7-1500t","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"160","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"siemens","cpe5":"simatic_s7-1500t_firmware","cpe6":"1.5","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"160","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"siemens","cpe5":"simatic_s7-1500_firmware","cpe6":"1.5","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"160","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"siemens","cpe5":"wincc_open_architecture","cpe6":"3.12","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"160","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"splunk","cpe5":"splunk","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"enterprise","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":{"cve_year":"2014","cve_id":"160","cve":"CVE-2014-0160","vendorProject":"OpenSSL","product":"OpenSSL","vulnerabilityName":"OpenSSL Information Disclosure Vulnerability","dateAdded":"2022-05-04","shortDescription":"The TLS and DTLS implementations in OpenSSL do not properly handle Heartbeat Extension packets, which allows remote attackers to obtain sensitive information.","requiredAction":"Apply updates per vendor instructions.","dueDate":"2022-05-25","knownRansomwareCampaignUse":"Unknown","notes":"https://nvd.nist.gov/vuln/detail/CVE-2014-0160","cwes":"CWE-125","catalogVersion":"2026.04.21","updated_at":"2026-04-21 13:32:18"},"epss":{"cve_year":"2014","cve_id":"160","cve":"CVE-2014-0160","epss":"0.944640000","percentile":"0.999950000","score_date":"2026-04-21","updated_at":"2026-04-22 00:07:39"},"legacy_qids":[{"cve":"CVE-2014-0160","qid":"390226","title":"Oracle Managed Virtualization (VM) Server for x86 Security Update for Open Secure Sockets Layer (OpenSSL) (OVMSA-2021-0011)"},{"cve":"CVE-2014-0160","qid":"390284","title":"Oracle Managed Virtualization (VM) Server for x86 Security Update for Open Secure Sockets Layer (OpenSSL) (OVMSA-2023-0013)"},{"cve":"CVE-2014-0160","qid":"690308","title":"Free Berkeley Software Distribution (FreeBSD) Security Update for Open Secure Sockets Layer (OpenSSL) (5631ae98-be9e-11e3-b5e3-c80aa9043978)"}]},"source_records":{"cve_program":{"containers":{"adp":[{"providerMetadata":{"dateUpdated":"2024-08-06T09:05:39.056Z","orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE"},"references":[{"tags":["x_transferred"],"url":"https://support.f5.com/kb/en-us/solutions/public/15000/100/sol15159.html?sr=36517217"},{"name":"1030077","tags":["vdb-entry","x_transferred"],"url":"http://www.securitytracker.com/id/1030077"},{"name":"20140408 heartbleed OpenSSL bug CVE-2014-0160","tags":["mailing-list","x_transferred"],"url":"http://seclists.org/fulldisclosure/2014/Apr/90"},{"tags":["x_transferred"],"url":"http://www.getchef.com/blog/2014/04/09/chef-server-heartbleed-cve-2014-0160-releases/"},{"name":"DSA-2896","tags":["vendor-advisory","x_transferred"],"url":"http://www.debian.org/security/2014/dsa-2896"},{"name":"HPSBGN03008","tags":["vendor-advisory","x_transferred"],"url":"http://marc.info/?l=bugtraq&m=139774054614965&w=2"},{"name":"HPSBMU03024","tags":["vendor-advisory","x_transferred"],"url":"http://marc.info/?l=bugtraq&m=139889113431619&w=2"},{"name":"RHSA-2014:0396","tags":["vendor-advisory","x_transferred"],"url":"http://rhn.redhat.com/errata/RHSA-2014-0396.html"},{"name":"HPSBHF03021","tags":["vendor-advisory","x_transferred"],"url":"http://marc.info/?l=bugtraq&m=139835815211508&w=2"},{"name":"HPSBHF03136","tags":["vendor-advisory","x_transferred"],"url":"http://marc.info/?l=bugtraq&m=141287864628122&w=2"},{"name":"VU#720951","tags":["third-party-advisory","x_transferred"],"url":"http://www.kb.cert.org/vuls/id/720951"},{"tags":["x_transferred"],"url":"http://www.splunk.com/view/SP-CAAAMB3"},{"name":"HPSBMU03033","tags":["vendor-advisory","x_transferred"],"url":"http://marc.info/?l=bugtraq&m=139905295427946&w=2"},{"tags":["x_transferred"],"url":"http://www.websense.com/support/article/kbarticle/Vulnerabilities-resolved-in-TRITON-APX-Version-8-0"},{"tags":["x_transferred"],"url":"http://www.apcmedia.com/salestools/SJHN-7RKGNM/SJHN-7RKGNM_R4_EN.pdf"},{"name":"HPSBGN03011","tags":["vendor-advisory","x_transferred"],"url":"http://marc.info/?l=bugtraq&m=139833395230364&w=2"},{"tags":["x_transferred"],"url":"http://www-01.ibm.com/support/docview.wss?uid=swg21670161"},{"tags":["x_transferred"],"url":"http://www.vmware.com/security/advisories/VMSA-2014-0012.html"},{"name":"openSUSE-SU-2014:0492","tags":["vendor-advisory","x_transferred"],"url":"http://lists.opensuse.org/opensuse-security-announce/2014-04/msg00004.html"},{"name":"SSRT101846","tags":["vendor-advisory","x_transferred"],"url":"http://marc.info/?l=bugtraq&m=142660345230545&w=2"},{"name":"20140409 Re: heartbleed OpenSSL bug CVE-2014-0160","tags":["mailing-list","x_transferred"],"url":"http://seclists.org/fulldisclosure/2014/Apr/109"},{"name":"HPSBMU03037","tags":["vendor-advisory","x_transferred"],"url":"http://marc.info/?l=bugtraq&m=140724451518351&w=2"},{"name":"1030080","tags":["vdb-entry","x_transferred"],"url":"http://www.securitytracker.com/id/1030080"},{"name":"57836","tags":["third-party-advisory","x_transferred"],"url":"http://secunia.com/advisories/57836"},{"tags":["x_transferred"],"url":"http://www-01.ibm.com/support/docview.wss?uid=isg400001843"},{"name":"HPSBMU03012","tags":["vendor-advisory","x_transferred"],"url":"http://marc.info/?l=bugtraq&m=139808058921905&w=2"},{"name":"HPSBST03001","tags":["vendor-advisory","x_transferred"],"url":"http://marc.info/?l=bugtraq&m=139758572430452&w=2"},{"name":"66690","tags":["vdb-entry","x_transferred"],"url":"http://www.securityfocus.com/bid/66690"},{"tags":["x_transferred"],"url":"http://www.innominate.com/data/downloads/manuals/mdm_1.5.2.1_Release_Notes.pdf"},{"tags":["x_transferred"],"url":"https://filezilla-project.org/versions.php?type=server"},{"name":"HPSBMU03023","tags":["vendor-advisory","x_transferred"],"url":"http://marc.info/?l=bugtraq&m=139843768401936&w=2"},{"name":"57483","tags":["third-party-advisory","x_transferred"],"url":"http://secunia.com/advisories/57483"},{"name":"20140409 OpenSSL Heartbeat Extension Vulnerability in Multiple Cisco Products","tags":["vendor-advisory","x_transferred"],"url":"http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140409-heartbleed"},{"tags":["x_transferred"],"url":"http://www.kerio.com/support/kerio-control/release-history"},{"tags":["x_transferred"],"url":"http://advisories.mageia.org/MGASA-2014-0165.html"},{"tags":["x_transferred"],"url":"http://www.blackberry.com/btsc/KB35882"},{"name":"HPSBHF03293","tags":["vendor-advisory","x_transferred"],"url":"http://marc.info/?l=bugtraq&m=142660345230545&w=2"},{"name":"HPSBMU03044","tags":["vendor-advisory","x_transferred"],"url":"http://marc.info/?l=bugtraq&m=140075368411126&w=2"},{"name":"HPSBMU03030","tags":["vendor-advisory","x_transferred"],"url":"http://marc.info/?l=bugtraq&m=139905351928096&w=2"},{"name":"1030081","tags":["vdb-entry","x_transferred"],"url":"http://www.securitytracker.com/id/1030081"},{"name":"FEDORA-2014-4879","tags":["vendor-advisory","x_transferred"],"url":"http://lists.fedoraproject.org/pipermail/package-announce/2014-April/131221.html"},{"name":"20141205 NEW: VMSA-2014-0012 - VMware vSphere product updates address security vulnerabilities","tags":["mailing-list","x_transferred"],"url":"http://www.securityfocus.com/archive/1/534161/100/0/threaded"},{"name":"FEDORA-2014-4910","tags":["vendor-advisory","x_transferred"],"url":"http://lists.fedoraproject.org/pipermail/package-announce/2014-April/131291.html"},{"tags":["x_transferred"],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1084875"},{"name":"FEDORA-2014-9308","tags":["vendor-advisory","x_transferred"],"url":"http://lists.fedoraproject.org/pipermail/package-announce/2014-August/136473.html"},{"tags":["x_transferred"],"url":"http://www-01.ibm.com/support/docview.wss?uid=isg400001841"},{"name":"HPSBMU03013","tags":["vendor-advisory","x_transferred"],"url":"http://marc.info/?l=bugtraq&m=139824993005633&w=2"},{"name":"1030079","tags":["vdb-entry","x_transferred"],"url":"http://www.securitytracker.com/id/1030079"},{"name":"RHSA-2014:0377","tags":["vendor-advisory","x_transferred"],"url":"http://rhn.redhat.com/errata/RHSA-2014-0377.html"},{"name":"HPSBMU02995","tags":["vendor-advisory","x_transferred"],"url":"http://marc.info/?l=bugtraq&m=139722163017074&w=2"},{"name":"HPSBPI03031","tags":["vendor-advisory","x_transferred"],"url":"http://marc.info/?l=bugtraq&m=139889295732144&w=2"},{"tags":["x_transferred"],"url":"https://code.google.com/p/mod-spdy/issues/detail?id=85"},{"name":"HPSBMU02999","tags":["vendor-advisory","x_transferred"],"url":"http://marc.info/?l=bugtraq&m=139765756720506&w=2"},{"name":"HPSBGN03010","tags":["vendor-advisory","x_transferred"],"url":"http://marc.info/?l=bugtraq&m=139774703817488&w=2"},{"name":"HPSBMU03029","tags":["vendor-advisory","x_transferred"],"url":"http://marc.info/?l=bugtraq&m=139905202427693&w=2"},{"tags":["x_transferred"],"url":"http://www.getchef.com/blog/2014/04/09/chef-server-11-0-12-release/"},{"tags":["x_transferred"],"url":"http://heartbleed.com/"},{"name":"HPSBMU03018","tags":["vendor-advisory","x_transferred"],"url":"http://marc.info/?l=bugtraq&m=139817782017443&w=2"},{"tags":["x_transferred"],"url":"http://download.schneider-electric.com/files?p_Doc_Ref=SEVD%202014-119-01"},{"name":"HPSBMU03040","tags":["vendor-advisory","x_transferred"],"url":"http://marc.info/?l=bugtraq&m=140015787404650&w=2"},{"tags":["x_transferred"],"url":"http://cogentdatahub.com/ReleaseNotes.html"},{"name":"HPSBMU03025","tags":["vendor-advisory","x_transferred"],"url":"http://marc.info/?l=bugtraq&m=139869720529462&w=2"},{"name":"HPSBST03016","tags":["vendor-advisory","x_transferred"],"url":"http://marc.info/?l=bugtraq&m=139842151128341&w=2"},{"name":"HPSBMU03028","tags":["vendor-advisory","x_transferred"],"url":"http://marc.info/?l=bugtraq&m=139905243827825&w=2"},{"name":"HPSBMU03009","tags":["vendor-advisory","x_transferred"],"url":"http://marc.info/?l=bugtraq&m=139905458328378&w=2"},{"tags":["x_transferred"],"url":"http://www.f-secure.com/en/web/labs_global/fsc-2014-1"},{"name":"TA14-098A","tags":["third-party-advisory","x_transferred"],"url":"http://www.us-cert.gov/ncas/alerts/TA14-098A"},{"name":"57347","tags":["third-party-advisory","x_transferred"],"url":"http://secunia.com/advisories/57347"},{"name":"[syslog-ng-announce] 20140411 syslog-ng Premium Edition 5 LTS (5.0.4a) has been released","tags":["mailing-list","x_transferred"],"url":"https://lists.balabit.hu/pipermail/syslog-ng-announce/2014-April/000184.html"},{"name":"20140411 MRI Rubies may contain statically linked, vulnerable OpenSSL","tags":["mailing-list","x_transferred"],"url":"http://seclists.org/fulldisclosure/2014/Apr/173"},{"tags":["x_transferred"],"url":"https://blog.torproject.org/blog/openssl-bug-cve-2014-0160"},{"tags":["x_transferred"],"url":"http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html"},{"tags":["x_transferred"],"url":"http://www.oracle.com/technetwork/topics/security/opensslheartbleedcve-2014-0160-2188454.html"},{"tags":["x_transferred"],"url":"https://support.f5.com/kb/en-us/solutions/public/15000/100/sol15159.html"},{"tags":["x_transferred"],"url":"http://git.openssl.org/gitweb/?p=openssl.git%3Ba=commit%3Bh=96db9023b881d7cd9f379b0c154650d6c108e9a3"},{"name":"HPSBST03000","tags":["vendor-advisory","x_transferred"],"url":"https://h20566.www2.hp.com/portal/site/hpsc/template.PAGE/public/kb/docDisplay/?spf_p.tpst=kbDocDisplay&spf_p.prp_kbDocDisplay=wsrp-navigationalState%3DdocId%253Demr_na-c04260637-4%257CdocLocale%253Den_US%257CcalledBy%253DSearch_Result&javax.portlet.begCacheTok=com.vignette.cachetoken&javax.portlet.endCacheTok=com.vignette.cachetoken"},{"name":"20141205 NEW: VMSA-2014-0012 - VMware vSphere product updates address security vulnerabilities","tags":["mailing-list","x_transferred"],"url":"http://seclists.org/fulldisclosure/2014/Dec/23"},{"name":"HPSBST03004","tags":["vendor-advisory","x_transferred"],"url":"http://marc.info/?l=bugtraq&m=139905653828999&w=2"},{"name":"USN-2165-1","tags":["vendor-advisory","x_transferred"],"url":"http://www.ubuntu.com/usn/USN-2165-1"},{"name":"RHSA-2014:0378","tags":["vendor-advisory","x_transferred"],"url":"http://rhn.redhat.com/errata/RHSA-2014-0378.html"},{"name":"HPSBMU02997","tags":["vendor-advisory","x_transferred"],"url":"http://marc.info/?l=bugtraq&m=139757919027752&w=2"},{"name":"SUSE-SA:2014:002","tags":["vendor-advisory","x_transferred"],"url":"http://lists.opensuse.org/opensuse-security-announce/2014-04/msg00005.html"},{"name":"32764","tags":["exploit","x_transferred"],"url":"http://www.exploit-db.com/exploits/32764"},{"name":"HPSBMU02994","tags":["vendor-advisory","x_transferred"],"url":"http://marc.info/?l=bugtraq&m=139757726426985&w=2"},{"tags":["x_transferred"],"url":"http://www.symantec.com/security_response/securityupdates/detail.jsp?fid=security_advisory&pvid=security_advisory&year=&suid=20160512_00"},{"name":"HPSBMU03022","tags":["vendor-advisory","x_transferred"],"url":"http://marc.info/?l=bugtraq&m=139869891830365&w=2"},{"name":"HPSBST03027","tags":["vendor-advisory","x_transferred"],"url":"http://marc.info/?l=bugtraq&m=139905868529690&w=2"},{"name":"HPSBMU03019","tags":["vendor-advisory","x_transferred"],"url":"http://marc.info/?l=bugtraq&m=139817685517037&w=2"},{"name":"HPSBMU03062","tags":["vendor-advisory","x_transferred"],"url":"http://marc.info/?l=bugtraq&m=140752315422991&w=2"},{"name":"20140408 Re: heartbleed OpenSSL bug CVE-2014-0160","tags":["mailing-list","x_transferred"],"url":"http://seclists.org/fulldisclosure/2014/Apr/91"},{"name":"1030078","tags":["vdb-entry","x_transferred"],"url":"http://www.securitytracker.com/id/1030078"},{"name":"59243","tags":["third-party-advisory","x_transferred"],"url":"http://secunia.com/advisories/59243"},{"tags":["x_transferred"],"url":"http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004661"},{"name":"HPSBMU03020","tags":["vendor-advisory","x_transferred"],"url":"http://marc.info/?l=bugtraq&m=139836085512508&w=2"},{"name":"HPSBST03015","tags":["vendor-advisory","x_transferred"],"url":"http://marc.info/?l=bugtraq&m=139824923705461&w=2"},{"name":"RHSA-2014:0376","tags":["vendor-advisory","x_transferred"],"url":"http://rhn.redhat.com/errata/RHSA-2014-0376.html"},{"name":"HPSBPI03014","tags":["vendor-advisory","x_transferred"],"url":"http://marc.info/?l=bugtraq&m=139835844111589&w=2"},{"name":"MDVSA-2015:062","tags":["vendor-advisory","x_transferred"],"url":"http://www.mandriva.com/security/advisories?name=MDVSA-2015:062"},{"tags":["x_transferred"],"url":"https://www.cert.fi/en/reports/2014/vulnerability788210.html"},{"name":"57721","tags":["third-party-advisory","x_transferred"],"url":"http://secunia.com/advisories/57721"},{"name":"57968","tags":["third-party-advisory","x_transferred"],"url":"http://secunia.com/advisories/57968"},{"tags":["x_transferred"],"url":"http://blog.fox-it.com/2014/04/08/openssl-heartbleed-bug-live-blog/"},{"tags":["x_transferred"],"url":"http://public.support.unisys.com/common/public/vulnerability/NVD_Detail_Rpt.aspx?ID=3"},{"name":"openSUSE-SU-2014:0560","tags":["vendor-advisory","x_transferred"],"url":"http://lists.opensuse.org/opensuse-updates/2014-04/msg00061.html"},{"name":"HPSBMU03032","tags":["vendor-advisory","x_transferred"],"url":"http://marc.info/?l=bugtraq&m=139905405728262&w=2"},{"name":"1030082","tags":["vdb-entry","x_transferred"],"url":"http://www.securitytracker.com/id/1030082"},{"name":"HPSBMU02998","tags":["vendor-advisory","x_transferred"],"url":"http://marc.info/?l=bugtraq&m=139757819327350&w=2"},{"name":"32745","tags":["exploit","x_transferred"],"url":"http://www.exploit-db.com/exploits/32745"},{"name":"20140412 Re: heartbleed OpenSSL bug CVE-2014-0160","tags":["mailing-list","x_transferred"],"url":"http://seclists.org/fulldisclosure/2014/Apr/190"},{"tags":["x_transferred"],"url":"http://www.getchef.com/blog/2014/04/09/enterprise-chef-11-1-3-release/"},{"name":"HPSBMU03017","tags":["vendor-advisory","x_transferred"],"url":"http://marc.info/?l=bugtraq&m=139817727317190&w=2"},{"tags":["x_transferred"],"url":"https://www.mitel.com/en-ca/support/security-advisories/mitel-product-security-advisory-17-0008"},{"tags":["x_transferred"],"url":"http://www.openssl.org/news/secadv_20140407.txt"},{"tags":["x_transferred"],"url":"https://gist.github.com/chapmajs/10473815"},{"tags":["x_transferred"],"url":"http://public.support.unisys.com/common/public/vulnerability/NVD_Detail_Rpt.aspx?ID=1"},{"name":"1030074","tags":["vdb-entry","x_transferred"],"url":"http://www.securitytracker.com/id/1030074"},{"tags":["x_transferred"],"url":"http://support.citrix.com/article/CTX140605"},{"name":"59139","tags":["third-party-advisory","x_transferred"],"url":"http://secunia.com/advisories/59139"},{"tags":["x_transferred"],"url":"http://www.getchef.com/blog/2014/04/09/enterprise-chef-1-4-9-release/"},{"name":"57966","tags":["third-party-advisory","x_transferred"],"url":"http://secunia.com/advisories/57966"},{"name":"1030026","tags":["vdb-entry","x_transferred"],"url":"http://www.securitytracker.com/id/1030026"},{"name":"59347","tags":["third-party-advisory","x_transferred"],"url":"http://secunia.com/advisories/59347"},{"name":"[tomcat-dev] 20190319 svn commit: r1855831 [26/30] - in /tomcat/site/trunk: ./ docs/ xdocs/","tags":["mailing-list","x_transferred"],"url":"https://lists.apache.org/thread.html/ba661b0edd913b39ff129a32d855620dd861883ade05fd88a8ce517d%40%3Cdev.tomcat.apache.org%3E"},{"name":"[tomcat-dev] 20190325 svn commit: r1856174 [26/29] - in /tomcat/site/trunk: docs/ xdocs/ xdocs/stylesheets/","tags":["mailing-list","x_transferred"],"url":"https://lists.apache.org/thread.html/f8e0814e11c7f21f42224b6de111cb3f5e5ab5c15b78924c516d4ec2%40%3Cdev.tomcat.apache.org%3E"},{"tags":["x_transferred"],"url":"https://sku11army.blogspot.com/2020/01/heartbleed-hearts-continue-to-bleed.html"},{"name":"[tomcat-dev] 20200203 svn commit: r1873527 [26/30] - /tomcat/site/trunk/docs/","tags":["mailing-list","x_transferred"],"url":"https://lists.apache.org/thread.html/rf8e8c091182b45daa50d3557cad9b10bb4198e3f08cf8f1c66a1b08d%40%3Cdev.tomcat.apache.org%3E"},{"tags":["x_transferred"],"url":"https://cert-portal.siemens.com/productcert/pdf/ssa-635659.pdf"},{"name":"[tomcat-dev] 20200213 svn commit: r1873980 [31/34] - /tomcat/site/trunk/docs/","tags":["mailing-list","x_transferred"],"url":"https://lists.apache.org/thread.html/re3b72cbb13e1dfe85c4a06959a3b6ca6d939b407ecca80db12b54220%40%3Cdev.tomcat.apache.org%3E"},{"tags":["x_transferred"],"url":"https://yunus-shn.medium.com/ricon-industrial-cellular-router-heartbleed-attack-2634221c02bd"}],"title":"CVE Program Container"},{"metrics":[{"cvssV3_1":{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"NONE","baseScore":7.5,"baseSeverity":"HIGH","confidentialityImpact":"HIGH","integrityImpact":"NONE","privilegesRequired":"NONE","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N","version":"3.1"}},{"other":{"content":{"id":"CVE-2014-0160","options":[{"Exploitation":"active"},{"Automatable":"yes"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","timestamp":"2025-02-07T13:32:34.600181Z","version":"2.0.3"},"type":"ssvc"}},{"other":{"content":{"dateAdded":"2022-05-04","reference":"https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2014-0160"},"type":"kev"}}],"problemTypes":[{"descriptions":[{"cweId":"CWE-125","description":"CWE-125 Out-of-bounds Read","lang":"en","type":"CWE"}]}],"providerMetadata":{"dateUpdated":"2025-10-22T00:05:38.217Z","orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP"},"references":[{"tags":["government-resource"],"url":"https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2014-0160"}],"timeline":[{"lang":"en","time":"2022-05-04T00:00:00.000Z","value":"CVE-2014-0160 added to CISA KEV"}],"title":"CISA ADP Vulnrichment"}],"cna":{"affected":[{"product":"n/a","vendor":"n/a","versions":[{"status":"affected","version":"n/a"}]}],"datePublic":"2014-04-07T00:00:00.000Z","descriptions":[{"lang":"en","value":"The (1) TLS and (2) DTLS implementations in OpenSSL 1.0.1 before 1.0.1g do not properly handle Heartbeat Extension packets, which allows remote attackers to obtain sensitive information from process memory via crafted packets that trigger a buffer over-read, as demonstrated by reading private keys, related to d1_both.c and t1_lib.c, aka the Heartbleed bug."}],"problemTypes":[{"descriptions":[{"description":"n/a","lang":"en","type":"text"}]}],"providerMetadata":{"dateUpdated":"2022-11-15T00:00:00.000Z","orgId":"53f830b8-0a3f-465b-8143-3b8a9948e749","shortName":"redhat"},"references":[{"url":"https://support.f5.com/kb/en-us/solutions/public/15000/100/sol15159.html?sr=36517217"},{"name":"1030077","tags":["vdb-entry"],"url":"http://www.securitytracker.com/id/1030077"},{"name":"20140408 heartbleed OpenSSL bug CVE-2014-0160","tags":["mailing-list"],"url":"http://seclists.org/fulldisclosure/2014/Apr/90"},{"url":"http://www.getchef.com/blog/2014/04/09/chef-server-heartbleed-cve-2014-0160-releases/"},{"name":"DSA-2896","tags":["vendor-advisory"],"url":"http://www.debian.org/security/2014/dsa-2896"},{"name":"HPSBGN03008","tags":["vendor-advisory"],"url":"http://marc.info/?l=bugtraq&m=139774054614965&w=2"},{"name":"HPSBMU03024","tags":["vendor-advisory"],"url":"http://marc.info/?l=bugtraq&m=139889113431619&w=2"},{"name":"RHSA-2014:0396","tags":["vendor-advisory"],"url":"http://rhn.redhat.com/errata/RHSA-2014-0396.html"},{"name":"HPSBHF03021","tags":["vendor-advisory"],"url":"http://marc.info/?l=bugtraq&m=139835815211508&w=2"},{"name":"HPSBHF03136","tags":["vendor-advisory"],"url":"http://marc.info/?l=bugtraq&m=141287864628122&w=2"},{"name":"VU#720951","tags":["third-party-advisory"],"url":"http://www.kb.cert.org/vuls/id/720951"},{"url":"http://www.splunk.com/view/SP-CAAAMB3"},{"name":"HPSBMU03033","tags":["vendor-advisory"],"url":"http://marc.info/?l=bugtraq&m=139905295427946&w=2"},{"url":"http://www.websense.com/support/article/kbarticle/Vulnerabilities-resolved-in-TRITON-APX-Version-8-0"},{"url":"http://www.apcmedia.com/salestools/SJHN-7RKGNM/SJHN-7RKGNM_R4_EN.pdf"},{"name":"HPSBGN03011","tags":["vendor-advisory"],"url":"http://marc.info/?l=bugtraq&m=139833395230364&w=2"},{"url":"http://www-01.ibm.com/support/docview.wss?uid=swg21670161"},{"url":"http://www.vmware.com/security/advisories/VMSA-2014-0012.html"},{"name":"openSUSE-SU-2014:0492","tags":["vendor-advisory"],"url":"http://lists.opensuse.org/opensuse-security-announce/2014-04/msg00004.html"},{"name":"SSRT101846","tags":["vendor-advisory"],"url":"http://marc.info/?l=bugtraq&m=142660345230545&w=2"},{"name":"20140409 Re: heartbleed OpenSSL bug CVE-2014-0160","tags":["mailing-list"],"url":"http://seclists.org/fulldisclosure/2014/Apr/109"},{"name":"HPSBMU03037","tags":["vendor-advisory"],"url":"http://marc.info/?l=bugtraq&m=140724451518351&w=2"},{"name":"1030080","tags":["vdb-entry"],"url":"http://www.securitytracker.com/id/1030080"},{"name":"57836","tags":["third-party-advisory"],"url":"http://secunia.com/advisories/57836"},{"url":"http://www-01.ibm.com/support/docview.wss?uid=isg400001843"},{"name":"HPSBMU03012","tags":["vendor-advisory"],"url":"http://marc.info/?l=bugtraq&m=139808058921905&w=2"},{"name":"HPSBST03001","tags":["vendor-advisory"],"url":"http://marc.info/?l=bugtraq&m=139758572430452&w=2"},{"name":"66690","tags":["vdb-entry"],"url":"http://www.securityfocus.com/bid/66690"},{"url":"http://www.innominate.com/data/downloads/manuals/mdm_1.5.2.1_Release_Notes.pdf"},{"url":"https://filezilla-project.org/versions.php?type=server"},{"name":"HPSBMU03023","tags":["vendor-advisory"],"url":"http://marc.info/?l=bugtraq&m=139843768401936&w=2"},{"name":"57483","tags":["third-party-advisory"],"url":"http://secunia.com/advisories/57483"},{"name":"20140409 OpenSSL Heartbeat Extension Vulnerability in Multiple Cisco Products","tags":["vendor-advisory"],"url":"http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140409-heartbleed"},{"url":"http://www.kerio.com/support/kerio-control/release-history"},{"url":"http://advisories.mageia.org/MGASA-2014-0165.html"},{"url":"http://www.blackberry.com/btsc/KB35882"},{"name":"HPSBHF03293","tags":["vendor-advisory"],"url":"http://marc.info/?l=bugtraq&m=142660345230545&w=2"},{"name":"HPSBMU03044","tags":["vendor-advisory"],"url":"http://marc.info/?l=bugtraq&m=140075368411126&w=2"},{"name":"HPSBMU03030","tags":["vendor-advisory"],"url":"http://marc.info/?l=bugtraq&m=139905351928096&w=2"},{"name":"1030081","tags":["vdb-entry"],"url":"http://www.securitytracker.com/id/1030081"},{"name":"FEDORA-2014-4879","tags":["vendor-advisory"],"url":"http://lists.fedoraproject.org/pipermail/package-announce/2014-April/131221.html"},{"name":"20141205 NEW: VMSA-2014-0012 - VMware vSphere product updates address security vulnerabilities","tags":["mailing-list"],"url":"http://www.securityfocus.com/archive/1/534161/100/0/threaded"},{"name":"FEDORA-2014-4910","tags":["vendor-advisory"],"url":"http://lists.fedoraproject.org/pipermail/package-announce/2014-April/131291.html"},{"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1084875"},{"name":"FEDORA-2014-9308","tags":["vendor-advisory"],"url":"http://lists.fedoraproject.org/pipermail/package-announce/2014-August/136473.html"},{"url":"http://www-01.ibm.com/support/docview.wss?uid=isg400001841"},{"name":"HPSBMU03013","tags":["vendor-advisory"],"url":"http://marc.info/?l=bugtraq&m=139824993005633&w=2"},{"name":"1030079","tags":["vdb-entry"],"url":"http://www.securitytracker.com/id/1030079"},{"name":"RHSA-2014:0377","tags":["vendor-advisory"],"url":"http://rhn.redhat.com/errata/RHSA-2014-0377.html"},{"name":"HPSBMU02995","tags":["vendor-advisory"],"url":"http://marc.info/?l=bugtraq&m=139722163017074&w=2"},{"name":"HPSBPI03031","tags":["vendor-advisory"],"url":"http://marc.info/?l=bugtraq&m=139889295732144&w=2"},{"url":"https://code.google.com/p/mod-spdy/issues/detail?id=85"},{"name":"HPSBMU02999","tags":["vendor-advisory"],"url":"http://marc.info/?l=bugtraq&m=139765756720506&w=2"},{"name":"HPSBGN03010","tags":["vendor-advisory"],"url":"http://marc.info/?l=bugtraq&m=139774703817488&w=2"},{"name":"HPSBMU03029","tags":["vendor-advisory"],"url":"http://marc.info/?l=bugtraq&m=139905202427693&w=2"},{"url":"http://www.getchef.com/blog/2014/04/09/chef-server-11-0-12-release/"},{"url":"http://heartbleed.com/"},{"name":"HPSBMU03018","tags":["vendor-advisory"],"url":"http://marc.info/?l=bugtraq&m=139817782017443&w=2"},{"url":"http://download.schneider-electric.com/files?p_Doc_Ref=SEVD%202014-119-01"},{"name":"HPSBMU03040","tags":["vendor-advisory"],"url":"http://marc.info/?l=bugtraq&m=140015787404650&w=2"},{"url":"http://cogentdatahub.com/ReleaseNotes.html"},{"name":"HPSBMU03025","tags":["vendor-advisory"],"url":"http://marc.info/?l=bugtraq&m=139869720529462&w=2"},{"name":"HPSBST03016","tags":["vendor-advisory"],"url":"http://marc.info/?l=bugtraq&m=139842151128341&w=2"},{"name":"HPSBMU03028","tags":["vendor-advisory"],"url":"http://marc.info/?l=bugtraq&m=139905243827825&w=2"},{"name":"HPSBMU03009","tags":["vendor-advisory"],"url":"http://marc.info/?l=bugtraq&m=139905458328378&w=2"},{"url":"http://www.f-secure.com/en/web/labs_global/fsc-2014-1"},{"name":"TA14-098A","tags":["third-party-advisory"],"url":"http://www.us-cert.gov/ncas/alerts/TA14-098A"},{"name":"57347","tags":["third-party-advisory"],"url":"http://secunia.com/advisories/57347"},{"name":"[syslog-ng-announce] 20140411 syslog-ng Premium Edition 5 LTS (5.0.4a) has been released","tags":["mailing-list"],"url":"https://lists.balabit.hu/pipermail/syslog-ng-announce/2014-April/000184.html"},{"name":"20140411 MRI Rubies may contain statically linked, vulnerable OpenSSL","tags":["mailing-list"],"url":"http://seclists.org/fulldisclosure/2014/Apr/173"},{"url":"https://blog.torproject.org/blog/openssl-bug-cve-2014-0160"},{"url":"http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html"},{"url":"http://www.oracle.com/technetwork/topics/security/opensslheartbleedcve-2014-0160-2188454.html"},{"url":"https://support.f5.com/kb/en-us/solutions/public/15000/100/sol15159.html"},{"url":"http://git.openssl.org/gitweb/?p=openssl.git%3Ba=commit%3Bh=96db9023b881d7cd9f379b0c154650d6c108e9a3"},{"name":"HPSBST03000","tags":["vendor-advisory"],"url":"https://h20566.www2.hp.com/portal/site/hpsc/template.PAGE/public/kb/docDisplay/?spf_p.tpst=kbDocDisplay&spf_p.prp_kbDocDisplay=wsrp-navigationalState%3DdocId%253Demr_na-c04260637-4%257CdocLocale%253Den_US%257CcalledBy%253DSearch_Result&javax.portlet.begCacheTok=com.vignette.cachetoken&javax.portlet.endCacheTok=com.vignette.cachetoken"},{"name":"20141205 NEW: VMSA-2014-0012 - VMware vSphere product updates address security vulnerabilities","tags":["mailing-list"],"url":"http://seclists.org/fulldisclosure/2014/Dec/23"},{"name":"HPSBST03004","tags":["vendor-advisory"],"url":"http://marc.info/?l=bugtraq&m=139905653828999&w=2"},{"name":"USN-2165-1","tags":["vendor-advisory"],"url":"http://www.ubuntu.com/usn/USN-2165-1"},{"name":"RHSA-2014:0378","tags":["vendor-advisory"],"url":"http://rhn.redhat.com/errata/RHSA-2014-0378.html"},{"name":"HPSBMU02997","tags":["vendor-advisory"],"url":"http://marc.info/?l=bugtraq&m=139757919027752&w=2"},{"name":"SUSE-SA:2014:002","tags":["vendor-advisory"],"url":"http://lists.opensuse.org/opensuse-security-announce/2014-04/msg00005.html"},{"name":"32764","tags":["exploit"],"url":"http://www.exploit-db.com/exploits/32764"},{"name":"HPSBMU02994","tags":["vendor-advisory"],"url":"http://marc.info/?l=bugtraq&m=139757726426985&w=2"},{"url":"http://www.symantec.com/security_response/securityupdates/detail.jsp?fid=security_advisory&pvid=security_advisory&year=&suid=20160512_00"},{"name":"HPSBMU03022","tags":["vendor-advisory"],"url":"http://marc.info/?l=bugtraq&m=139869891830365&w=2"},{"name":"HPSBST03027","tags":["vendor-advisory"],"url":"http://marc.info/?l=bugtraq&m=139905868529690&w=2"},{"name":"HPSBMU03019","tags":["vendor-advisory"],"url":"http://marc.info/?l=bugtraq&m=139817685517037&w=2"},{"name":"HPSBMU03062","tags":["vendor-advisory"],"url":"http://marc.info/?l=bugtraq&m=140752315422991&w=2"},{"name":"20140408 Re: heartbleed OpenSSL bug CVE-2014-0160","tags":["mailing-list"],"url":"http://seclists.org/fulldisclosure/2014/Apr/91"},{"name":"1030078","tags":["vdb-entry"],"url":"http://www.securitytracker.com/id/1030078"},{"name":"59243","tags":["third-party-advisory"],"url":"http://secunia.com/advisories/59243"},{"url":"http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004661"},{"name":"HPSBMU03020","tags":["vendor-advisory"],"url":"http://marc.info/?l=bugtraq&m=139836085512508&w=2"},{"name":"HPSBST03015","tags":["vendor-advisory"],"url":"http://marc.info/?l=bugtraq&m=139824923705461&w=2"},{"name":"RHSA-2014:0376","tags":["vendor-advisory"],"url":"http://rhn.redhat.com/errata/RHSA-2014-0376.html"},{"name":"HPSBPI03014","tags":["vendor-advisory"],"url":"http://marc.info/?l=bugtraq&m=139835844111589&w=2"},{"name":"MDVSA-2015:062","tags":["vendor-advisory"],"url":"http://www.mandriva.com/security/advisories?name=MDVSA-2015:062"},{"url":"https://www.cert.fi/en/reports/2014/vulnerability788210.html"},{"name":"57721","tags":["third-party-advisory"],"url":"http://secunia.com/advisories/57721"},{"name":"57968","tags":["third-party-advisory"],"url":"http://secunia.com/advisories/57968"},{"url":"http://blog.fox-it.com/2014/04/08/openssl-heartbleed-bug-live-blog/"},{"url":"http://public.support.unisys.com/common/public/vulnerability/NVD_Detail_Rpt.aspx?ID=3"},{"name":"openSUSE-SU-2014:0560","tags":["vendor-advisory"],"url":"http://lists.opensuse.org/opensuse-updates/2014-04/msg00061.html"},{"name":"HPSBMU03032","tags":["vendor-advisory"],"url":"http://marc.info/?l=bugtraq&m=139905405728262&w=2"},{"name":"1030082","tags":["vdb-entry"],"url":"http://www.securitytracker.com/id/1030082"},{"name":"HPSBMU02998","tags":["vendor-advisory"],"url":"http://marc.info/?l=bugtraq&m=139757819327350&w=2"},{"name":"32745","tags":["exploit"],"url":"http://www.exploit-db.com/exploits/32745"},{"name":"20140412 Re: heartbleed OpenSSL bug CVE-2014-0160","tags":["mailing-list"],"url":"http://seclists.org/fulldisclosure/2014/Apr/190"},{"url":"http://www.getchef.com/blog/2014/04/09/enterprise-chef-11-1-3-release/"},{"name":"HPSBMU03017","tags":["vendor-advisory"],"url":"http://marc.info/?l=bugtraq&m=139817727317190&w=2"},{"url":"https://www.mitel.com/en-ca/support/security-advisories/mitel-product-security-advisory-17-0008"},{"url":"http://www.openssl.org/news/secadv_20140407.txt"},{"url":"https://gist.github.com/chapmajs/10473815"},{"url":"http://public.support.unisys.com/common/public/vulnerability/NVD_Detail_Rpt.aspx?ID=1"},{"name":"1030074","tags":["vdb-entry"],"url":"http://www.securitytracker.com/id/1030074"},{"url":"http://support.citrix.com/article/CTX140605"},{"name":"59139","tags":["third-party-advisory"],"url":"http://secunia.com/advisories/59139"},{"url":"http://www.getchef.com/blog/2014/04/09/enterprise-chef-1-4-9-release/"},{"name":"57966","tags":["third-party-advisory"],"url":"http://secunia.com/advisories/57966"},{"name":"1030026","tags":["vdb-entry"],"url":"http://www.securitytracker.com/id/1030026"},{"name":"59347","tags":["third-party-advisory"],"url":"http://secunia.com/advisories/59347"},{"name":"[tomcat-dev] 20190319 svn commit: r1855831 [26/30] - in /tomcat/site/trunk: ./ docs/ xdocs/","tags":["mailing-list"],"url":"https://lists.apache.org/thread.html/ba661b0edd913b39ff129a32d855620dd861883ade05fd88a8ce517d%40%3Cdev.tomcat.apache.org%3E"},{"name":"[tomcat-dev] 20190325 svn commit: r1856174 [26/29] - in /tomcat/site/trunk: docs/ xdocs/ xdocs/stylesheets/","tags":["mailing-list"],"url":"https://lists.apache.org/thread.html/f8e0814e11c7f21f42224b6de111cb3f5e5ab5c15b78924c516d4ec2%40%3Cdev.tomcat.apache.org%3E"},{"url":"https://sku11army.blogspot.com/2020/01/heartbleed-hearts-continue-to-bleed.html"},{"name":"[tomcat-dev] 20200203 svn commit: r1873527 [26/30] - /tomcat/site/trunk/docs/","tags":["mailing-list"],"url":"https://lists.apache.org/thread.html/rf8e8c091182b45daa50d3557cad9b10bb4198e3f08cf8f1c66a1b08d%40%3Cdev.tomcat.apache.org%3E"},{"url":"https://cert-portal.siemens.com/productcert/pdf/ssa-635659.pdf"},{"name":"[tomcat-dev] 20200213 svn commit: r1873980 [31/34] - /tomcat/site/trunk/docs/","tags":["mailing-list"],"url":"https://lists.apache.org/thread.html/re3b72cbb13e1dfe85c4a06959a3b6ca6d939b407ecca80db12b54220%40%3Cdev.tomcat.apache.org%3E"},{"url":"https://yunus-shn.medium.com/ricon-industrial-cellular-router-heartbleed-attack-2634221c02bd"}]}},"cveMetadata":{"assignerOrgId":"53f830b8-0a3f-465b-8143-3b8a9948e749","assignerShortName":"redhat","cveId":"CVE-2014-0160","datePublished":"2014-04-07T00:00:00.000Z","dateReserved":"2013-12-03T00:00:00.000Z","dateUpdated":"2025-10-22T00:05:38.217Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.1"},"nvd":{"publishedDate":"2014-04-07 22:55:03","lastModifiedDate":"2026-04-21 20:07:16","problem_types":["CWE-125","n/a","CWE-125 CWE-125 Out-of-bounds Read"],"metrics":{"cvssMetricV31":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N","baseScore":7.5,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"NONE","availabilityImpact":"NONE"},"exploitabilityScore":3.9,"impactScore":3.6},{"source":"134c704f-9b21-4f2e-91b3-4a467353bcc0","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N","baseScore":7.5,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"NONE","availabilityImpact":"NONE"},"exploitabilityScore":3.9,"impactScore":3.6}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:N/A:N","baseScore":5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"NONE","availabilityImpact":"NONE"},"baseSeverity":"MEDIUM","exploitabilityScore":10,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:openssl:openssl:*:*:*:*:*:*:*:*","versionStartIncluding":"1.0.1","versionEndExcluding":"1.0.1g","matchCriteriaId":"9EE79AC6-5484-4A53-8333-373DAD1B5649"}]}]},{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:filezilla-project:filezilla_server:*:*:*:*:*:*:*:*","versionEndExcluding":"0.9.44","matchCriteriaId":"3F09BC00-9D25-4C39-B705-A5A29F630517"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:siemens:application_processing_engine_firmware:2.0:*:*:*:*:*:*:*","matchCriteriaId":"119DBCCC-439E-4148-9E11-CE8038066811"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:siemens:application_processing_engine:-:*:*:*:*:*:*:*","matchCriteriaId":"AE6A8466-8A69-491B-8DAB-877A6C2F6660"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:siemens:cp_1543-1_firmware:1.1:*:*:*:*:*:*:*","matchCriteriaId":"B60287DD-E302-4F8C-833F-E8BE94BDB8D5"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:siemens:cp_1543-1:-:*:*:*:*:*:*:*","matchCriteriaId":"F703FF33-882F-4CB5-9CA0-8FAE670B2AEF"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:siemens:simatic_s7-1500_firmware:1.5:*:*:*:*:*:*:*","matchCriteriaId":"92646048-3383-4F12-ABCA-8346D9837C2C"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:siemens:simatic_s7-1500:-:*:*:*:*:*:*:*","matchCriteriaId":"30DDEA9B-E1BF-4572-8E12-D13C54603E77"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:siemens:simatic_s7-1500t_firmware:1.5:*:*:*:*:*:*:*","matchCriteriaId":"80CEA1F3-B820-4D36-B879-7D55F3B95002"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:siemens:simatic_s7-1500t:-:*:*:*:*:*:*:*","matchCriteriaId":"741B2C38-174C-49DF-98D8-F7D6F49D1CE5"}]}]},{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:siemens:elan-8.2:*:*:*:*:*:*:*:*","versionEndExcluding":"8.3.3","matchCriteriaId":"B77B3ED9-1841-449E-B3B2-F53E73254314"},{"vulnerable":true,"criteria":"cpe:2.3:a:siemens:wincc_open_architecture:3.12:*:*:*:*:*:*:*","matchCriteriaId":"B42FE7D9-673C-4FF3-924B-FC21DF06F769"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:intellian:v100_firmware:1.20:*:*:*:*:*:*:*","matchCriteriaId":"A3F2BCF2-2D0C-44AB-AE21-FBC7F04D099A"},{"vulnerable":true,"criteria":"cpe:2.3:o:intellian:v100_firmware:1.21:*:*:*:*:*:*:*","matchCriteriaId":"B46DDC44-A1B4-4DF8-8AD5-FD235F1C2D54"},{"vulnerable":true,"criteria":"cpe:2.3:o:intellian:v100_firmware:1.24:*:*:*:*:*:*:*","matchCriteriaId":"82BF6806-3E91-4B22-B53D-13F4CD19F757"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:intellian:v100:-:*:*:*:*:*:*:*","matchCriteriaId":"DF9C2817-7F10-4369-A106-68DF9369B454"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:intellian:v60_firmware:1.15:*:*:*:*:*:*:*","matchCriteriaId":"9079EBFD-B901-4077-AD4B-A8B034BDDEA1"},{"vulnerable":true,"criteria":"cpe:2.3:o:intellian:v60_firmware:1.25:*:*:*:*:*:*:*","matchCriteriaId":"CFC20C7E-E264-4892-AA43-E289207935EE"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:intellian:v60:-:*:*:*:*:*:*:*","matchCriteriaId":"BD513662-1089-4BF8-A0F8-9BE5CBF937BE"}]}]},{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:mitel:micollab:6.0:*:*:*:*:*:*:*","matchCriteriaId":"03433A5D-632E-47A5-871A-5859C80CB038"},{"vulnerable":true,"criteria":"cpe:2.3:a:mitel:micollab:7.0:*:*:*:*:*:*:*","matchCriteriaId":"2B28F2FB-F263-4B2E-A4C7-951A474FD7F9"},{"vulnerable":true,"criteria":"cpe:2.3:a:mitel:micollab:7.1:*:*:*:*:*:*:*","matchCriteriaId":"DC89913A-F419-43E8-B846-D7AA769EA898"},{"vulnerable":true,"criteria":"cpe:2.3:a:mitel:micollab:7.2:*:*:*:*:*:*:*","matchCriteriaId":"9C5C14AB-2C97-406E-98B5-0BDC8B0AFEA1"},{"vulnerable":true,"criteria":"cpe:2.3:a:mitel:micollab:7.3:*:*:*:*:*:*:*","matchCriteriaId":"C08973EF-E86A-46D7-9CF6-4374F2789ED1"},{"vulnerable":true,"criteria":"cpe:2.3:a:mitel:micollab:7.3.0.104:*:*:*:*:*:*:*","matchCriteriaId":"F2317158-3EE7-4894-ADC0-109E0D94DA0A"},{"vulnerable":true,"criteria":"cpe:2.3:a:mitel:mivoice:1.1.2.5:*:*:*:*:lync:*:*","matchCriteriaId":"501B4ED7-0A26-430A-91A2-29099D3CF493"},{"vulnerable":true,"criteria":"cpe:2.3:a:mitel:mivoice:1.1.3.3:*:*:*:*:skype_for_business:*:*","matchCriteriaId":"A93F15B3-1341-446F-85D0-E1842EA1F42C"},{"vulnerable":true,"criteria":"cpe:2.3:a:mitel:mivoice:1.2.0.11:*:*:*:*:skype_for_business:*:*","matchCriteriaId":"37A5858D-8DE8-4865-A803-7D8A9D4EA306"},{"vulnerable":true,"criteria":"cpe:2.3:a:mitel:mivoice:1.3.2.2:*:*:*:*:skype_for_business:*:*","matchCriteriaId":"32B33A4D-1E37-4EAA-AE25-7DA399D50046"},{"vulnerable":true,"criteria":"cpe:2.3:a:mitel:mivoice:1.4.0.102:*:*:*:*:skype_for_business:*:*","matchCriteriaId":"EDD5CCE5-CD24-4288-952F-B5814454A890"}]}]},{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:opensuse:opensuse:12.3:*:*:*:*:*:*:*","matchCriteriaId":"DFBF430B-0832-44B0-AA0E-BA9E467F7668"},{"vulnerable":true,"criteria":"cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*","matchCriteriaId":"A10BC294-9196-425F-9FB0-B1625465B47F"}]}]},{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*","matchCriteriaId":"8D305F7A-D159-4716-AB26-5E38BB5CD991"},{"vulnerable":true,"criteria":"cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*","matchCriteriaId":"E2076871-2E80-4605-A470-A41C1A8EC7EE"},{"vulnerable":true,"criteria":"cpe:2.3:o:canonical:ubuntu_linux:13.10:*:*:*:*:*:*:*","matchCriteriaId":"7F61F047-129C-41A6-8A27-FFCBB8563E91"}]}]},{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:fedoraproject:fedora:19:*:*:*:*:*:*:*","matchCriteriaId":"5991814D-CA77-4C25-90D2-DB542B17E0AD"},{"vulnerable":true,"criteria":"cpe:2.3:o:fedoraproject:fedora:20:*:*:*:*:*:*:*","matchCriteriaId":"FF47C9F0-D8DA-4B55-89EB-9B2C9383ADB9"}]}]},{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:redhat:gluster_storage:2.1:*:*:*:*:*:*:*","matchCriteriaId":"5B45F8E4-0E7A-4D55-84C2-5BE5B6335269"},{"vulnerable":true,"criteria":"cpe:2.3:a:redhat:storage:2.1:*:*:*:*:*:*:*","matchCriteriaId":"53C986BD-2D1F-4865-B16D-72FD875E3776"},{"vulnerable":true,"criteria":"cpe:2.3:a:redhat:virtualization:6.0:*:*:*:*:*:*:*","matchCriteriaId":"37BA55FC-D350-4DEB-9802-40AF59C99E79"},{"vulnerable":true,"criteria":"cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*","matchCriteriaId":"EE249E1B-A1FD-4E08-AA71-A0E1F10FFE97"},{"vulnerable":true,"criteria":"cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*","matchCriteriaId":"9BBCD86A-E6C7-4444-9D74-F861084090F0"},{"vulnerable":true,"criteria":"cpe:2.3:o:redhat:enterprise_linux_server_aus:6.5:*:*:*:*:*:*:*","matchCriteriaId":"1F3BEFDB-5156-4E1C-80BB-8BE9FEAA7623"},{"vulnerable":true,"criteria":"cpe:2.3:o:redhat:enterprise_linux_server_eus:6.5:*:*:*:*:*:*:*","matchCriteriaId":"45010D45-2FF2-4B04-B115-6B6FE606D598"},{"vulnerable":true,"criteria":"cpe:2.3:o:redhat:enterprise_linux_server_tus:6.5:*:*:*:*:*:*:*","matchCriteriaId":"835AE071-CEAE-49E5-8F0C-E5F50FB85EFC"},{"vulnerable":true,"criteria":"cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*","matchCriteriaId":"E5ED5807-55B7-47C5-97A6-03233F4FBC3A"}]}]},{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:debian:debian_linux:6.0:*:*:*:*:*:*:*","matchCriteriaId":"036E8A89-7A16-411F-9D31-676313BB7244"},{"vulnerable":true,"criteria":"cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*","matchCriteriaId":"16F59A04-14CF-49E2-9973-645477EA09DA"},{"vulnerable":true,"criteria":"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","matchCriteriaId":"C11E6FB0-C8C0-4527-9AA0-CB9B316F8F43"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:ricon:s9922l_firmware:16.10.3\\(3794\\):*:*:*:*:*:*:*","matchCriteriaId":"9ED94033-99C2-419B-BBFA-247B4BB3ED4D"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:ricon:s9922l:1.0:*:*:*:*:*:*:*","matchCriteriaId":"BB07C7E6-1DFD-4B39-BA17-FB2912CB92D4"}]}]},{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:broadcom:symantec_messaging_gateway:10.6.0:*:*:*:*:*:*:*","matchCriteriaId":"1745640A-621C-458B-92C6-C24BA06D79E5"},{"vulnerable":true,"criteria":"cpe:2.3:a:broadcom:symantec_messaging_gateway:10.6.1:*:*:*:*:*:*:*","matchCriteriaId":"D4DEF17D-93AD-4E79-96ED-E7C44332BD52"}]}]},{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:splunk:splunk:*:*:*:*:enterprise:*:*:*","versionStartIncluding":"6.0.0","versionEndExcluding":"6.0.3","matchCriteriaId":"F660A53D-39E7-422A-9E77-3D69A91F2E07"}]}]}]},"legacy_mitre":{"record":{"CveYear":"2014","CveId":"160","Ordinal":"1","Title":"CVE-2014-0160","CVE":"CVE-2014-0160","Year":"2014"},"notes":[{"CveYear":"2014","CveId":"160","Ordinal":"1","NoteData":"The (1) TLS and (2) DTLS implementations in OpenSSL 1.0.1 before 1.0.1g do not properly handle Heartbeat Extension packets, which allows remote attackers to obtain sensitive information from process memory via crafted packets that trigger a buffer over-read, as demonstrated by reading private keys, related to d1_both.c and t1_lib.c, aka the Heartbleed bug.","Type":"Description","Title":"CVE-2014-0160"},{"CveYear":"2014","CveId":"160","Ordinal":"2","NoteData":"2014-04-07","Type":"Other","Title":"Published"},{"CveYear":"2014","CveId":"160","Ordinal":"3","NoteData":"2020-02-13","Type":"Other","Title":"Modified"}]}}}