{"api_version":"1","generated_at":"2026-04-22T17:45:30+00:00","cve":"CVE-2014-0224","urls":{"html":"https://cve.report/CVE-2014-0224","api":"https://cve.report/api/cve/CVE-2014-0224.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2014-0224","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2014-0224"},"summary":{"title":"CVE-2014-0224","description":"OpenSSL before 0.9.8za, 1.0.0 before 1.0.0m, and 1.0.1 before 1.0.1h does not properly restrict processing of ChangeCipherSpec messages, which allows man-in-the-middle attackers to trigger use of a zero-length master key in certain OpenSSL-to-OpenSSL communications, and consequently hijack sessions or obtain sensitive information, via a crafted TLS handshake, aka the \"CCS Injection\" vulnerability.","state":"PUBLIC","assigner":"secalert@redhat.com","published_at":"2014-06-05 21:55:00","updated_at":"2023-11-07 02:18:00"},"problem_types":["CWE-326"],"metrics":[],"references":[{"url":"http://secunia.com/advisories/59214","name":"59214","refsource":"SECUNIA","tags":["Third Party Advisory"],"title":"Security Advisory SA59214 - IBM Rational Tau OpenSSL SSL/TLS Handshakes Security Issue - Secunia","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://secunia.com/advisories/59530","name":"59530","refsource":"SECUNIA","tags":["Third Party Advisory"],"title":"Security Advisory SA59530 - BlackBerry Link OpenSSL Two Vulnerabilities - Secunia","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www-01.ibm.com/support/docview.wss?uid=swg21676615","name":"http://www-01.ibm.com/support/docview.wss?uid=swg21676615","refsource":"CONFIRM","tags":["Third Party Advisory"],"title":"IBM notice: The page you requested cannot be displayed","mime":"text/html","httpstatus":"404","archivestatus":"410"},{"url":"http://www-01.ibm.com/support/docview.wss?uid=swg24037870","name":"http://www-01.ibm.com/support/docview.wss?uid=swg24037870","refsource":"CONFIRM","tags":["Third Party Advisory"],"title":"IBM Cognos Business Intelligence 10.2.x interim fixes address a security vulnerability - United States","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://secunia.com/advisories/59447","name":"59447","refsource":"SECUNIA","tags":["Third Party Advisory"],"title":"Security Advisory SA59447 - IBM Tivoli Endpoint Manager for Remote Control OpenSSL SSL/TLS Handshake Security Issue - Secunia","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.innominate.com/data/downloads/manuals/mdm_1.5.2.1_Release_Notes.pdf","name":"http://www.innominate.com/data/downloads/manuals/mdm_1.5.2.1_Release_Notes.pdf","refsource":"CONFIRM","tags":["Third Party Advisory"],"title":"","mime":"application/pdf","httpstatus":"-1","archivestatus":"200"},{"url":"https://access.redhat.com/site/blogs/766093/posts/908133","name":"https://access.redhat.com/site/blogs/766093/posts/908133","refsource":"CONFIRM","tags":["Third Party Advisory"],"title":"OpenSSL MITM CCS injection attack (CVE-2014-0224) - Red Hat Customer Portal","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://kb.bluecoat.com/index?page=content&id=SA80","name":"https://kb.bluecoat.com/index?page=content&id=SA80","refsource":"CONFIRM","tags":["Third Party Advisory"],"title":"","mime":"","httpstatus":"-1","archivestatus":"404"},{"url":"http://secunia.com/advisories/59040","name":"59040","refsource":"SECUNIA","tags":["Third Party Advisory"],"title":"Security Advisory SA59040 - Cisco AnyConnect VPN Client OpenSSL Multiple Vulnerabilities - Secunia","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5095740","name":"http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5095740","refsource":"CONFIRM","tags":["Third Party Advisory"],"title":"IBM Support","mime":"text/html","httpstatus":"200","archivestatus":"403"},{"url":"http://secunia.com/advisories/59354","name":"59354","refsource":"SECUNIA","tags":["Third Party Advisory"],"title":"Security Advisory SA59354 - Solaris WAN Boot OpenSSL SSL/TLS Handshake Security Issue - Secunia","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://marc.info/?l=bugtraq&m=141164638606214&w=2","name":"HPSBST03103","refsource":"HP","tags":["Third Party Advisory"],"title":"'[security bulletin] HPSBST03103 rev.1 - HP Storage EVA Command View Suite running OpenSSL, Remote Un' - MARC","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://secunia.com/advisories/59529","name":"59529","refsource":"SECUNIA","tags":["Third Party Advisory"],"title":"About Secunia Research | Flexera","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004690","name":"http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004690","refsource":"CONFIRM","tags":["Third Party Advisory"],"title":"IBM Security Bulletin: OpenSSL vulnerability in IBM SAN Volume Controller and Storwize Family (CVE-2014-0224) - United States","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://marc.info/?l=bugtraq&m=140482916501310&w=2","name":"HPSBGN03050","refsource":"HP","tags":["Third Party Advisory"],"title":"'[security bulletin] HPSBGN03050 rev.1 - HP IceWall SSO Dfw and HP IceWall MCRP running OpenSSL, Remo' - MARC","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://secunia.com/advisories/59223","name":"59223","refsource":"SECUNIA","tags":["Third Party Advisory"],"title":"Security Advisory SA59223 - F-Secure E-mail and Server Security / Server Security OpenSSL Multiple Vulnerabilities - Secunia","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://secunia.com/advisories/59301","name":"59301","refsource":"SECUNIA","tags":["Third Party Advisory"],"title":"Security Advisory SA59301 - HP Version Control Repository Manager (VCRM) OpenSSL Multiple Vulnerabilities - Secunia","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://secunia.com/advisories/59380","name":"59380","refsource":"SECUNIA","tags":["Third Party Advisory"],"title":"Security Advisory SA59380 - Oracle Solaris WAN Boot OpenSSL SSL/TLS Handshake Security Issue - Secunia","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www-01.ibm.com/support/docview.wss?uid=swg21676786","name":"http://www-01.ibm.com/support/docview.wss?uid=swg21676786","refsource":"CONFIRM","tags":["Third Party Advisory"],"title":"IBM Security Bulletin: Rational Tau is affected by OpenSSL vulnerabilities (CVE-2014-0224) - United States","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://rhn.redhat.com/errata/RHSA-2014-0624.html","name":"RHSA-2014:0624","refsource":"REDHAT","tags":["Third Party Advisory"],"title":"Red Hat Customer Portal","mime":"text/html","httpstatus":"-1","archivestatus":"200"},{"url":"http://secunia.com/advisories/58977","name":"58977","refsource":"SECUNIA","tags":["Third Party Advisory"],"title":"Security Advisory SA58977 - IBM BladeCenter Advanced Management Module Firmware OpenSSL Multiple Vulnerabilities - Secunia","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://secunia.com/advisories/59162","name":"59162","refsource":"SECUNIA","tags":["Third Party Advisory"],"title":"Security Advisory SA59162 - McAfee Multiple Products OpenSSL Multiple Vulnerabilities - Secunia","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://secunia.com/advisories/61815","name":"61815","refsource":"SECUNIA","tags":["Third Party Advisory"],"title":"Security Advisory SA61815 - HP StorageWorks Command View for Tape Libraries OpenSSL SSL/TLS Handshakes Security Issue - Secunia","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www-01.ibm.com/support/docview.wss?uid=swg21675821","name":"http://www-01.ibm.com/support/docview.wss?uid=swg21675821","refsource":"CONFIRM","tags":["Third Party Advisory"],"title":"IBM Security Bulletin: IBM Tivoli Netcool System Service Monitors/Application Service Monitors is affected by the following OpenSSL vulnerabilities: (CVE-2014-0224, CVE-2014-0221, CVE-2014-0195 and CVE-2014-3470) - United States","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://secunia.com/advisories/58945","name":"58945","refsource":"SECUNIA","tags":["Third Party Advisory"],"title":"Security Advisory SA58945 - IBM FastSetup OpenSSL Multiple Vulnerabilities - Secunia","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://marc.info/?l=bugtraq&m=140794476212181&w=2","name":"HPSBHF03088","refsource":"HP","tags":["Third Party Advisory"],"title":"'[security bulletin] HPSBHF03088 rev.1 - HP Integrity SD2 CB900s i2 and i4 Servers running OpenSSL, R' - MARC","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.novell.com/support/kb/doc.php?id=7015300","name":"http://www.novell.com/support/kb/doc.php?id=7015300","refsource":"CONFIRM","tags":["Third Party Advisory"],"title":"Support | OpenSSL Security Advisory (05 June 2014) and Open Enterprise Server 2 SP3.","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://kb.juniper.net/InfoCenter/index?page=content&id=KB29195","name":"http://kb.juniper.net/InfoCenter/index?page=content&id=KB29195","refsource":"CONFIRM","tags":["Not Applicable"],"title":"Juniper Networks - Junos Pulse/SA (SSLVPN): Details on fixes for SSL/TLS MITM vulnerability (CVE-2014-0224)/JSA10629   - Knowledge Base","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://secunia.com/advisories/59167","name":"59167","refsource":"SECUNIA","tags":["Third Party Advisory"],"title":"Security Advisory SA59167 - Cisco Intrusion Prevention System (IPS) OpenSSL Multiple Vulnerabilities - Secunia","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://secunia.com/advisories/59132","name":"59132","refsource":"SECUNIA","tags":["Third Party Advisory"],"title":"Security Advisory SA59132 - Citrix Products OpenSSL SSL/TLS Handshakes Security Issue - Secunia","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://seclists.org/fulldisclosure/2014/Jun/38","name":"20140607 Re: More OpenSSL issues","refsource":"FULLDISC","tags":["Mailing List","Third Party Advisory"],"title":"Full Disclosure: Re: More OpenSSL issues","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://puppetlabs.com/security/cve/cve-2014-0224","name":"http://puppetlabs.com/security/cve/cve-2014-0224","refsource":"CONFIRM","tags":["Third Party Advisory"],"title":"CVE-2014-0224 | Puppet Labs","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://secunia.com/advisories/59211","name":"59211","refsource":"SECUNIA","tags":["Third Party Advisory"],"title":"Security Advisory SA59211 - F5 Multiple Products OpenSSL SSL/TLS Handshake Security Issue - Secunia","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www-01.ibm.com/support/docview.wss?uid=swg21678289","name":"http://www-01.ibm.com/support/docview.wss?uid=swg21678289","refsource":"CONFIRM","tags":["Third Party Advisory"],"title":"IBM Se curity Bulletin: Tivoli Workload Scheduler is affected by the following OpenSSL vulnerabilities: CVE-2014-0224, CVE-2014-0221, CVE-2014-0195, CVE-2014-3470 - United States","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://support.f5.com/kb/en-us/solutions/public/15000/300/sol15325.html","name":"http://support.f5.com/kb/en-us/solutions/public/15000/300/sol15325.html","refsource":"CONFIRM","tags":["Third Party Advisory"],"title":"","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www-01.ibm.com/support/docview.wss?uid=swg24037730","name":"http://www-01.ibm.com/support/docview.wss?uid=swg24037730","refsource":"CONFIRM","tags":["Third Party Advisory"],"title":"IBM Endpoint Manager for Remote Control Interim Fix 9.0.0-TIV-IEMRC900-IF0005 - United States","mime":"text/html","httpstatus":"404","archivestatus":"200"},{"url":"http://secunia.com/advisories/59442","name":"59442","refsource":"SECUNIA","tags":["Third Party Advisory"],"title":"Security Advisory SA59442 - IBM WebSphere MQ for HP NonStop Server OpenSSL SSL/TLS Handshakes Security Issue - Secunia","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html","name":"http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html","refsource":"CONFIRM","tags":["Patch"],"title":"Oracle Critical Patch Update - July 2016","mime":"text/html","httpstatus":"200","archivestatus":"0"},{"url":"http://secunia.com/advisories/60049","name":"60049","refsource":"SECUNIA","tags":["Third Party Advisory"],"title":"Security Advisory SA60049 - HP OneView OpenSSL Two Vulnerabilities - Secunia","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://secunia.com/advisories/59502","name":"59502","refsource":"SECUNIA","tags":["Third Party Advisory"],"title":"About Secunia Research | Flexera","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"http://www.ibm.com/support/docview.wss?uid=swg21676793","name":"http://www.ibm.com/support/docview.wss?uid=swg21676793","refsource":"CONFIRM","tags":["Broken Link"],"title":"IBM notice: The page you requested cannot be displayed","mime":"text/html","httpstatus":"404","archivestatus":"404"},{"url":"http://aix.software.ibm.com/aix/efixes/security/openssl_advisory9.asc","name":"http://aix.software.ibm.com/aix/efixes/security/openssl_advisory9.asc","refsource":"CONFIRM","tags":["Third Party Advisory"],"title":"","mime":"text/plain","httpstatus":"200","archivestatus":"200"},{"url":"http://marc.info/?l=bugtraq&m=142805027510172&w=2","name":"HPSBST03195","refsource":"HP","tags":["Third Party Advisory"],"title":"'[security bulletin] HPSBST03195 rev.1 - HP 3PAR Service Processor (SP) running OpenSSL and Bash, Rem' - MARC","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://marc.info/?l=bugtraq&m=142350350616251&w=2","name":"SSRT101818","refsource":"HP","tags":["Third Party Advisory"],"title":"'[security bulletin] HPSBMU03216 rev.2 - HP Service Manager running SSLv3, Multiple Remote Vulnerabil' - MARC","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://git.openssl.org/gitweb/?p=openssl.git;a=commit;h=bc8923b1ec9c467755cd86f7848c50ee8812e441","name":"https://git.openssl.org/gitweb/?p=openssl.git;a=commit;h=bc8923b1ec9c467755cd86f7848c50ee8812e441","refsource":"CONFIRM","tags":["Patch","Vendor Advisory"],"title":"git.openssl.org Git - openssl.git/commit","mime":"text/xml","httpstatus":"200","archivestatus":"200"},{"url":"http://rhn.redhat.com/errata/RHSA-2014-0626.html","name":"RHSA-2014:0626","refsource":"REDHAT","tags":["Third Party Advisory"],"title":"Red Hat Customer Portal","mime":"text/html","httpstatus":"-1","archivestatus":"200"},{"url":"http://secunia.com/advisories/59342","name":"59342","refsource":"SECUNIA","tags":["Third Party Advisory"],"title":"Security Advisory SA59342 - HP Smart Update Manager (HP SUM) OpenSSL Multiple Vulnerabilities - Secunia","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://secunia.com/advisories/59448","name":"59448","refsource":"SECUNIA","tags":["Third Party Advisory"],"title":"Security Advisory SA59448 - IBM Sterling Connect:Enterprise for UNIX OpenSSL SSL/TLS Handshake Security Issue - Secunia","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.splunk.com/view/SP-CAAAM2D","name":"http://www.splunk.com/view/SP-CAAAM2D","refsource":"CONFIRM","tags":["Third Party Advisory"],"title":"Splunk Enterprise 6.1.2, 6.0.5 and 5.0.9 address two vulnerabilities - July 1, 2014 | Splunk","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://secunia.com/advisories/59589","name":"59589","refsource":"SECUNIA","tags":["Third Party Advisory"],"title":"Security Advisory SA59589 - HP Onboard Administrator OpenSSL SSL/TLS Handshake Security Issue - Secunia","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://support.apple.com/kb/HT6443","name":"http://support.apple.com/kb/HT6443","refsource":"CONFIRM","tags":["Third Party Advisory"],"title":"About the security content of OS X Mavericks v10.9.5 and Security Update 2014-004 - Apple Support","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://kb.juniper.net/InfoCenter/index?page=content&id=KB29217","name":"http://kb.juniper.net/InfoCenter/index?page=content&id=KB29217","refsource":"CONFIRM","tags":["Third Party Advisory"],"title":"[SBR] Patches for Steel-Belted Radius Enterprise and Global Enterprise for OpenSSL Vulnerability - Juniper Networks","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://marc.info/?l=bugtraq&m=141658880509699&w=2","name":"HPSBHF03052","refsource":"HP","tags":["Third Party Advisory"],"title":"'[security bulletin] HPSBHF03052 rev.2 - HP Network Products running OpenSSL, Multiple Remote Vulnera' - MARC","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://marc.info/?l=bugtraq&m=140672208601650&w=2","name":"HPSBMU03078","refsource":"HP","tags":["Third Party Advisory"],"title":"'[security bulletin] HPSBMU03078 rev.1 - HP CloudSystem Foundation and HP CloudSystem Enterprise Soft' - MARC","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://secunia.com/advisories/59202","name":"59202","refsource":"SECUNIA","tags":["Third Party Advisory"],"title":"Security Advisory SA59202 - Cisco MATE Multiple Products OpenSSL Two Vulnerabilities - Secunia","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://secunia.com/advisories/59375","name":"59375","refsource":"SECUNIA","tags":["Third Party Advisory"],"title":"Security Advisory SA59375 - Oracle Solaris OpenSSL SSL/TLS Handshake Security Issue - Secunia","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://secunia.com/advisories/59451","name":"59451","refsource":"SECUNIA","tags":["Third Party Advisory"],"title":"Security Advisory SA59451 - IBM Tivoli Composite Application Manager for Transactions OpenSSL Security Issue and Vulnerabilities - Secunia","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www-01.ibm.com/support/docview.wss?uid=swg24037727","name":"http://www-01.ibm.com/support/docview.wss?uid=swg24037727","refsource":"CONFIRM","tags":["Third Party Advisory"],"title":"IBM Endpoint Manager for Remote Control Interim Fix 9.1.0-TIV-IEMRC910-IF0002 - United States","mime":"text/html","httpstatus":"404","archivestatus":"200"},{"url":"http://secunia.com/advisories/59347","name":"59347","refsource":"SECUNIA","tags":["Third Party Advisory"],"title":"Security Advisory SA59347 - Innominate mGuard Device Manager OpenSSL Multiple Vulnerabilities - Secunia","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://esupport.trendmicro.com/solution/en-US/1103813.aspx","name":"http://esupport.trendmicro.com/solution/en-US/1103813.aspx","refsource":"CONFIRM","tags":["Third Party Advisory"],"title":"[CVE-2014-0224]  CCS Injection Vulnerability and Trend Micro products","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://secunia.com/advisories/59514","name":"59514","refsource":"SECUNIA","tags":["Third Party Advisory"],"title":"Security Advisory SA59514 - HP System Management Homepage OpenSSL Multiple Vulnerabilities - Secunia","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.fortiguard.com/advisory/FG-IR-14-018/","name":"http://www.fortiguard.com/advisory/FG-IR-14-018/","refsource":"CONFIRM","tags":["Third Party Advisory"],"title":"FortiGuard.com | Multiple Vulnerabilities in OpenSSL","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.websense.com/support/article/kbarticle/Vulnerabilities-resolved-in-TRITON-APX-Version-8-0","name":"http://www.websense.com/support/article/kbarticle/Vulnerabilities-resolved-in-TRITON-APX-Version-8-0","refsource":"CONFIRM","tags":["Third Party Advisory"],"title":"Vulnerabilities resolved in TRITON APX Version 8.0","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://secunia.com/advisories/59192","name":"59192","refsource":"SECUNIA","tags":["Third Party Advisory"],"title":"Security Advisory SA59192 - Cisco TelePresence Server OpenSSL Multiple Vulnerabilities - Secunia","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www-01.ibm.com/support/docview.wss?uid=swg21677695","name":"http://www-01.ibm.com/support/docview.wss?uid=swg21677695","refsource":"CONFIRM","tags":["Third Party Advisory"],"title":"IBM Security Bulletin: IBM Initiate Master Data Service, IBM InfoSphere Master Data Management are affected by the following OpenSSL vulnerabilities: (CVE-2014-0224, CVE-2014-0221, CVE-2014-0195, CVE-2014-0198, CVE-2010-5298, CVE-2014-3470 and CVE-2014-0076) - United States","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://secunia.com/advisories/58742","name":"58742","refsource":"SECUNIA","tags":["Third Party Advisory"],"title":"Security Advisory SA58742 - IBM Rational ClearCase OpenSSL Security Issue and Vulnerability - Secunia","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://secunia.com/advisories/59370","name":"59370","refsource":"SECUNIA","tags":["Third Party Advisory"],"title":"Security Advisory SA59370 - IBM Flex System Integrated Management Module 2 (IMM2) OpenSSL SSL/TLS Handshakes Security Issue - Secunia","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://secunia.com/advisories/59454","name":"59454","refsource":"SECUNIA","tags":["Third Party Advisory"],"title":"Security Advisory SA59454 - Cisco Unity Connection OpenSSL Multiple Vulnerabilities - Secunia","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://secunia.com/advisories/59325","name":"59325","refsource":"SECUNIA","tags":["Third Party Advisory"],"title":"Security Advisory SA59325 - FileZilla Server OpenSSL SSL/TLS Handshake Security Issue - Secunia","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://support.citrix.com/article/CTX140876","name":"http://support.citrix.com/article/CTX140876","refsource":"CONFIRM","tags":["Third Party Advisory"],"title":"Citrix Security Advisory for OpenSSL Vulnerabilities (June 2014)","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://secunia.com/advisories/59655","name":"59655","refsource":"SECUNIA","tags":["Third Party Advisory"],"title":"Security Advisory SA59655 - IBM SmartCloud Provisioning for IBM Provided Software Virtual Appliance OpenSSL Multiple Vulnerabilities - Secunia","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://secunia.com/advisories/58660","name":"58660","refsource":"SECUNIA","tags":["Third Party Advisory"],"title":"Security Advisory SA58660 - Cisco Multiple Products OpenSSL SSL/TLS Handshake and Buffer Overflow Vulnerabilities - Secunia","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www-01.ibm.com/support/docview.wss?uid=swg21676655","name":"http://www-01.ibm.com/support/docview.wss?uid=swg21676655","refsource":"CONFIRM","tags":["Third Party Advisory"],"title":"IBM Security Bulletin: IBM Security Access Manager for Mobile and IBM Security Access Manager for Web appliances are affected by the following OpenSSL vulnerabilities:  CVE-2014-0224, CVE-2014-0198, CVE-2010-5298, CVE-2014-3470 and possibly CVE-2014-0076 - United States","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www-01.ibm.com/support/docview.wss?uid=swg21676333","name":"http://www-01.ibm.com/support/docview.wss?uid=swg21676333","refsource":"CONFIRM","tags":["Third Party Advisory"],"title":"IBM Security Bulletin: Tivoli Endpoint Manager for Remote Control is affected by the following OpenSSL vulnerability:CVE-2014-0224 - United States","mime":"text/html","httpstatus":"404","archivestatus":"200"},{"url":"http://lists.fedoraproject.org/pipermail/package-announce/2014-August/136470.html","name":"FEDORA-2014-9301","refsource":"FEDORA","tags":["Third Party Advisory"],"title":"[SECURITY] Fedora 19 Update: openssl-1.0.1e-39.fc19","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://secunia.com/advisories/58743","name":"58743","refsource":"SECUNIA","tags":["Third Party Advisory"],"title":"Security Advisory SA58743 - Fortinet FortiOS (FortiGate) OpenSSL Two Vulnerabilities - Secunia","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://rhn.redhat.com/errata/RHSA-2014-0632.html","name":"RHSA-2014:0632","refsource":"REDHAT","tags":["Third Party Advisory"],"title":"Red Hat Customer Portal","mime":"text/html","httpstatus":"-1","archivestatus":"200"},{"url":"http://secunia.com/advisories/58930","name":"58930","refsource":"SECUNIA","tags":["Third Party Advisory"],"title":"About Secunia Research | Flexera","mime":"text/plain","httpstatus":"200","archivestatus":"200"},{"url":"http://www.kb.cert.org/vuls/id/978508","name":"VU#978508","refsource":"CERT-VN","tags":["Third Party Advisory","US Government Resource"],"title":"Vulnerability Note VU#978508 - OpenSSL is vulnerable to a man-in-the-middle attack","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://secunia.com/advisories/59287","name":"59287","refsource":"SECUNIA","tags":["Third Party Advisory"],"title":"Security Advisory SA59287 - IBM Proventia Network Enterprise Scanner OpenSSL Multiple Vulnerabilities - Secunia","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://marc.info/?l=bugtraq&m=140852826008699&w=2","name":"HPSBMU03101","refsource":"HP","tags":["Third Party Advisory"],"title":"'[security bulletin] HPSBMU03101 rev.1 - HP Asset Manager, CloudSystem Chargeback, running OpenSSL, R' - MARC","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://marc.info/?l=bugtraq&m=140852757108392&w=2","name":"HPSBMU03094","refsource":"HP","tags":["Third Party Advisory"],"title":"'[security bulletin] HPSBMU03094 rev.1 - HP Connect-IT, running OpenSSL, Remote Disclosure of Informa' - MARC","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www-01.ibm.com/support/docview.wss?uid=swg21683332","name":"http://www-01.ibm.com/support/docview.wss?uid=swg21683332","refsource":"CONFIRM","tags":["Third Party Advisory"],"title":"IBM Security Bulletin: IBM InfoSphere Guardium Database Activity Monitor is affected by CVE-2014-0221, CVE-2014-0224, CVE-2014-0195, CVE-2014-0198, CVE-2010-5298, CVE-2014-3470 - United States","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://secunia.com/advisories/59231","name":"59231","refsource":"SECUNIA","tags":["Third Party Advisory"],"title":"About Secunia Research | Flexera","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"http://secunia.com/advisories/59368","name":"59368","refsource":"SECUNIA","tags":["Third Party Advisory"],"title":"Security Advisory SA59368 - Oracle Solaris OpenSSL SSL/TLS Handshake Security Issue - Secunia","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.vmware.com/security/advisories/VMSA-2014-0012.html","name":"http://www.vmware.com/security/advisories/VMSA-2014-0012.html","refsource":"CONFIRM","tags":["Third Party Advisory"],"title":"VMSA-2014-0012 | United States","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.novell.com/support/kb/doc.php?id=7015264","name":"http://www.novell.com/support/kb/doc.php?id=7015264","refsource":"CONFIRM","tags":["Third Party Advisory"],"title":"Support | OpenSSL Security Advisory (05 June 2014) and Open Enterprise Server 11 SP1.","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://secunia.com/advisories/59437","name":"59437","refsource":"SECUNIA","tags":["Third Party Advisory"],"title":"Security Advisory SA59437 - IBM Rational Application Developer for WebSphere Software OpenSSL Multiple Vulnerabilities - Secunia","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www-01.ibm.com/support/docview.wss?uid=swg21677828","name":"http://www-01.ibm.com/support/docview.wss?uid=swg21677828","refsource":"CONFIRM","tags":["Third Party Advisory"],"title":"IBM Security Bulletin: Vulnerabilities in OpenSSL affect IBM SmartCloud Provisioning. - United States","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://secunia.com/advisories/59264","name":"59264","refsource":"SECUNIA","tags":["Third Party Advisory"],"title":"Security Advisory SA59264 - Cisco WebEx Meetings Server / Unified Communications Manager OpenSSL Multiple Vulnerabilities - Secunia","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00027.html","name":"SUSE-SU-2015:0578","refsource":"SUSE","tags":["Third Party Advisory"],"title":"[security-announce] SUSE-SU-2015:0578-1: important: Security update for","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://marc.info/?l=bugtraq&m=142546741516006&w=2","name":"HPSBST03265","refsource":"HP","tags":["Third Party Advisory"],"title":"'[security bulletin] HPSBST03265 rev.1 - HP VMA SAN Gateway running Bash Shell and OpenSSL, Remote De' - MARC","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://secunia.com/advisories/59827","name":"59827","refsource":"SECUNIA","tags":["Third Party Advisory"],"title":"Security Advisory SA59827 - MySQL Workbench OpenSSL SSL/TLS Handshakes Security Issue - Secunia","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://secunia.com/advisories/58716","name":"58716","refsource":"SECUNIA","tags":["Third Party Advisory"],"title":"Security Advisory SA58716 - IBM Rational ClearQuest Security Issue and Multiple Vulnerabilities - Secunia","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://secunia.com/advisories/59338","name":"59338","refsource":"SECUNIA","tags":["Third Party Advisory"],"title":"Security Advisory SA59338 - IBM Algo One OpenSSL SSL/TLS Handshakes Security Issue - Secunia","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.mandriva.com/security/advisories?name=MDVSA-2014:105","name":"MDVSA-2014:105","refsource":"MANDRIVA","tags":["Third Party Advisory"],"title":"www.mandriva.com","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://secunia.com/advisories/59666","name":"59666","refsource":"SECUNIA","tags":["Third Party Advisory"],"title":"Security Advisory SA59666 - IBM SDK for Node.js OpenSSL Multiple Vulnerabilities - Secunia","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://secunia.com/advisories/59142","name":"59142","refsource":"SECUNIA","tags":["Third Party Advisory"],"title":"Security Advisory SA59142 - IBM General Parallel File System (GPFS) OpenSSL SSL/TLS Handshakes Security Issue - Secunia","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://discussions.nessus.org/thread/7517","name":"https://discussions.nessus.org/thread/7517","refsource":"CONFIRM","tags":["Third Party Advisory"],"title":"Nessus 5.2.7 Now Available | Tenable Discussions Forum","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://secunia.com/advisories/60567","name":"60567","refsource":"SECUNIA","tags":["Third Party Advisory"],"title":"Security Advisory SA60567 - HP AssetManager / CloudSystem Chargeback OpenSSL SSL/TLS Handshakes Security Issue - Secunia","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://secunia.com/advisories/59175","name":"59175","refsource":"SECUNIA","tags":["Third Party Advisory"],"title":"Security Advisory SA59175 - HP OpenVMS update for SSL - Secunia","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://secunia.com/advisories/59894","name":"59894","refsource":"SECUNIA","tags":["Third Party Advisory"],"title":"Security Advisory SA59894 - HP Cloud Service Automation OpenSSL SSL/TLS Handshakes Security Issue - Secunia","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://secunia.com/advisories/60819","name":"60819","refsource":"SECUNIA","tags":["Third Party Advisory"],"title":"Security Advisory SA60819 - HP Connect-It (CIT) OpenSSL SSL/TLS Handshakes Security Issue - Secunia","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://secunia.com/advisories/58713","name":"58713","refsource":"SECUNIA","tags":["Third Party Advisory"],"title":"Security Advisory SA58713 - IBM Multiple Products OpenSSL Multiple Vulnerabilities - Secunia","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www-01.ibm.com/support/docview.wss?uid=swg21676889","name":"http://www-01.ibm.com/support/docview.wss?uid=swg21676889","refsource":"CONFIRM","tags":["Third Party Advisory"],"title":"IBM Security Bulletin: IBM Security Proventia Network Enterprise Scanner is affected by the following OpenSSL vulnerabilities:  CVE-2014-0224, CVE-2014-0221, CVE-2014-0195, CVE-2014-0198, CVE-2010-5298, CVE-2014-3470 - United States","mime":"text/html","httpstatus":"404","archivestatus":"200"},{"url":"https://www.ibm.com/support/docview.wss?uid=ssg1S1004670","name":"https://www.ibm.com/support/docview.wss?uid=ssg1S1004670","refsource":"CONFIRM","tags":["Third Party Advisory"],"title":"Security Bulletin: TS2900 is affected by the following OpenSSL vulnerabilities: CVE-2014-0224","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html","name":"http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html","refsource":"CONFIRM","tags":["Patch","Third Party Advisory"],"title":"Oracle Critical Patch Update - October 2016","mime":"text/html","httpstatus":"200","archivestatus":"0"},{"url":"http://secunia.com/advisories/59450","name":"59450","refsource":"SECUNIA","tags":["Third Party Advisory"],"title":"Security Advisory SA59450 - IBM API Management OpenSSL Multiple Vulnerabilities - Secunia","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www-01.ibm.com/support/docview.wss?uid=swg21673137","name":"http://www-01.ibm.com/support/docview.wss?uid=swg21673137","refsource":"CONFIRM","tags":["Third Party Advisory"],"title":"IBM notice: The page you requested cannot be displayed","mime":"text/html","httpstatus":"404","archivestatus":"410"},{"url":"http://secunia.com/advisories/59374","name":"59374","refsource":"SECUNIA","tags":["Third Party Advisory"],"title":"Security Advisory SA59374 - Cisco IOS XE OpenSSL Multiple Vulnerabilities - Secunia","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://secunia.com/advisories/59120","name":"59120","refsource":"SECUNIA","tags":["Third Party Advisory"],"title":"Security Advisory SA59120 - IBM Hardware Management Console (HMC) OpenSSL Security Issue and Two Vulnerabilities - Secunia","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www-01.ibm.com/support/docview.wss?uid=swg21676334","name":"http://www-01.ibm.com/support/docview.wss?uid=swg21676334","refsource":"CONFIRM","tags":["Third Party Advisory"],"title":"IBM Security Bulletin: IBM Endpoint Manager for Remote Control is affected by the following OpenSSL vulnerability: CVE-2014-0224 - United States","mime":"text/html","httpstatus":"404","archivestatus":"200"},{"url":"http://www.securitytracker.com/id/1031032","name":"1031032","refsource":"SECTRACK","tags":["Third Party Advisory","VDB Entry"],"title":"Solaris Lets Local Users Gain Elevated Privileges and Remote Users Access and Modify Data and Deny Service - SecurityTracker","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www-01.ibm.com/support/docview.wss?uid=nas8N1020163","name":"http://www-01.ibm.com/support/docview.wss?uid=nas8N1020163","refsource":"CONFIRM","tags":["Third Party Advisory"],"title":"IBM Security Bulletin: IBM i is affected by the following OpenSSL vulnerabilities: CVE-2014-0224, CVE-2014-0221, CVE-2014-0195, CVE-2014-0198 and CVE-2014-3470 - United States","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.mandriva.com/security/advisories?name=MDVSA-2014:106","name":"MDVSA-2014:106","refsource":"MANDRIVA","tags":["Third Party Advisory"],"title":"www.mandriva.com","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.ibm.com/support/docview.wss?uid=swg21676356","name":"http://www.ibm.com/support/docview.wss?uid=swg21676356","refsource":"CONFIRM","tags":["Third Party Advisory"],"title":"Security Bulletin: Rational Application Developer is affected by the following OpenSSL vulnerabilities: CVE-2014-0224, CVE-2014-0221, CVE-2014-0195, CVE-2014-0198, CVE-2010-5298, CVE-2014-3470","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"http://www-01.ibm.com/support/docview.wss?uid=isg400001843","name":"http://www-01.ibm.com/support/docview.wss?uid=isg400001843","refsource":"CONFIRM","tags":["Third Party Advisory"],"title":"IBM Tivoli Composite Application Manager for Transactions Internet Service Monitoring 7.3.0.1 Interim Fix 29 README Tivoli Composite Application Manager for Transactions 7.3.0.1 7.3.0.1-TIV-CAMIS-IF0029 Readme - United States","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://secunia.com/advisories/59282","name":"59282","refsource":"SECUNIA","tags":["Third Party Advisory"],"title":"Security Advisory SA59282 - Cisco Multiple Products OpenSSL Multiple Vulnerabilities - Secunia","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://ccsinjection.lepidum.co.jp","name":"http://ccsinjection.lepidum.co.jp","refsource":"MISC","tags":["Third Party Advisory"],"title":"OpenSSL #ccsinjection Vulnerability","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://secunia.com/advisories/59449","name":"59449","refsource":"SECUNIA","tags":["Third Party Advisory"],"title":"Security Advisory SA59449 - IBM Security Network Intrusion Prevention System OpenSSL Multiple Vulnerabilities - Secunia","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://kc.mcafee.com/corporate/index?page=content&id=SB10075","name":"https://kc.mcafee.com/corporate/index?page=content&id=SB10075","refsource":"CONFIRM","tags":["Third Party Advisory"],"title":"McAfee KnowledgeBase - McAfee Security Bulletin – Seven OpenSSL vulnerabilities patched in McAfee products","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://secunia.com/advisories/59438","name":"59438","refsource":"SECUNIA","tags":["Third Party Advisory"],"title":"Security Advisory SA59438 - IBM Security Access Manager for Web / Security Access Manager for Mobile Multiple Vulnerabilities - Secunia","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://secunia.com/advisories/58719","name":"58719","refsource":"SECUNIA","tags":["Third Party Advisory"],"title":"Security Advisory SA58719 - IBM TS3400 OpenSSL SSL/TLS Handshake Security Issue - Secunia","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://secunia.com/advisories/59305","name":"59305","refsource":"SECUNIA","tags":["Third Party Advisory"],"title":"Security Advisory SA59305 - IBM MessageSight Server OpenSSL SSL/TLS Handshake and Buffer Overflow Vulnerabilities - Secunia","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://www.arista.com/en/support/advisories-notices/security-advisories/941-security-advisory-0005","name":"https://www.arista.com/en/support/advisories-notices/security-advisories/941-security-advisory-0005","refsource":"MISC","tags":[],"title":"Arista - Security Advisory 0005","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://secunia.com/advisories/58615","name":"58615","refsource":"SECUNIA","tags":["Third Party Advisory"],"title":"Security Advisory SA58615 - IBM Tivoli Netcool System Service Monitors Multiple Security Issues and Multiple Vulnerabilities - Secunia","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://marc.info/?l=bugtraq&m=140389274407904&w=2","name":"HPSBMU03057","refsource":"HP","tags":["Third Party Advisory"],"title":"'[security bulletin] HPSBMU03057 rev.1 - HP Version Control Agent (HP VCA) running OpenSSL on Linux a' - MARC","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www14.software.ibm.com/webapp/set2/subscriptions/pqvcmjd?mode=18&ID=6061&myns=phmc&mync=E","name":"http://www14.software.ibm.com/webapp/set2/subscriptions/pqvcmjd?mode=18&ID=6061&myns=phmc&mync=E","refsource":"CONFIRM","tags":["Third Party Advisory"],"title":"","mime":"text/plain","httpstatus":"404","archivestatus":"404"},{"url":"http://rhn.redhat.com/errata/RHSA-2014-0630.html","name":"RHSA-2014:0630","refsource":"REDHAT","tags":["Third Party Advisory"],"title":"Red Hat Customer Portal","mime":"text/html","httpstatus":"-1","archivestatus":"200"},{"url":"http://secunia.com/advisories/60066","name":"60066","refsource":"SECUNIA","tags":["Third Party Advisory"],"title":"About Secunia Research | Flexera","mime":"text/plain","httpstatus":"200","archivestatus":"200"},{"url":"http://www.tenable.com/blog/nessus-527-and-pvs-403-are-available-for-download","name":"http://www.tenable.com/blog/nessus-527-and-pvs-403-are-available-for-download","refsource":"CONFIRM","tags":["Third Party Advisory"],"title":"Nessus 5.2.7 and PVS 4.0.3 Are Available for Download | Tenable Network Security","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www-01.ibm.com/support/docview.wss?uid=swg21676496","name":"http://www-01.ibm.com/support/docview.wss?uid=swg21676496","refsource":"CONFIRM","tags":["Third Party Advisory"],"title":"IBM Security Bulletin: WebSphere MQ is affected by the following OpenSSL vulnerabilities: CVE-2014-0224 & CVE-2014-3470 - United States","mime":"text/html","httpstatus":"404","archivestatus":"200"},{"url":"http://marc.info/?l=bugtraq&m=140389355508263&w=2","name":"HPSBMU03056","refsource":"HP","tags":["Third Party Advisory"],"title":"'[security bulletin] HPSBMU03056 rev.1 - HP Version Control Repository Manager (HP VCRM) running Open' - MARC","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www-01.ibm.com/support/docview.wss?uid=swg21676501","name":"http://www-01.ibm.com/support/docview.wss?uid=swg21676501","refsource":"CONFIRM","tags":["Third Party Advisory"],"title":"IBM Security Bulletin: IBM Worklight is affected by the following OpenSSL vulnerabilities: CVE-2014-0224, CVE-2014-3470 and CVE-2014-0076 - United States","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://secunia.com/advisories/58128","name":"58128","refsource":"SECUNIA","tags":["Third Party Advisory"],"title":"Security Advisory SA58128 - Trend Micro Multiple Products OpenSSL SSL/TLS Handshakes Security Issue - Secunia","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://marc.info/?l=bugtraq&m=140752315422991&w=2","name":"HPSBMU03062","refsource":"HP","tags":["Third Party Advisory"],"title":"'[security bulletin] HPSBMU03062 rev.1 - HP Insight Control server deployment on Linux and Windows ru' - MARC","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://secunia.com/advisories/59878","name":"59878","refsource":"SECUNIA","tags":["Third Party Advisory"],"title":"Security Advisory SA59878 - HP StoreEver MSL6480 Tape Library OpenSSL SSL/TLS Handshake Security Issue - Secunia","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://secunia.com/advisories/59101","name":"59101","refsource":"SECUNIA","tags":["Third Party Advisory"],"title":"Security Advisory SA59101 - VMware OVF Tool OpenSSL SSL/TLS Handshake Security Issue - Secunia","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://secunia.com/advisories/59528","name":"59528","refsource":"SECUNIA","tags":["Third Party Advisory"],"title":"Security Advisory SA59528 - BlackBerry Enterprise Service Universal Device Service Component OpenSSL Multiple Vulnerabilities - Secunia","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www14.software.ibm.com/webapp/set2/subscriptions/pqvcmjd?mode=18&ID=6060&myns=phmc&mync=E","name":"http://www14.software.ibm.com/webapp/set2/subscriptions/pqvcmjd?mode=18&ID=6060&myns=phmc&mync=E","refsource":"CONFIRM","tags":["Third Party Advisory"],"title":"IBM - My notifications","mime":"text/html","httpstatus":"404","archivestatus":"200"},{"url":"http://secunia.com/advisories/59506","name":"59506","refsource":"SECUNIA","tags":["Third Party Advisory"],"title":"Security Advisory SA59506 - BlackBerry Multiple Products OpenSSL SSL/TLS Handshake Security Issue - Secunia","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://secunia.com/advisories/59916","name":"59916","refsource":"SECUNIA","tags":["Third Party Advisory"],"title":"Security Advisory SA59916 - HP NonStop Server OpenSSL Security Issue and Vulnerability - Secunia","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://secunia.com/advisories/59362","name":"59362","refsource":"SECUNIA","tags":["Third Party Advisory"],"title":"Security Advisory SA59362 - Cisco Nexus Multiple Products OpenSSL SSL/TLS Handshake and ECDH Ciphersuites Vulnerabilities - Secunia","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://secunia.com/advisories/59446","name":"59446","refsource":"SECUNIA","tags":["Third Party Advisory"],"title":"Security Advisory SA59446 - IBM WebSphere Cast Iron Cloud Integration OpenSSL SSL/TLS Handshakes Security Issue - Secunia","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://marc.info/?l=bugtraq&m=140499864129699&w=2","name":"HPSBMU03070","refsource":"HP","tags":["Third Party Advisory"],"title":"'[security bulletin] HPSBMU03070 rev.1 - HP Cloud Service Automation, OpenSSL Vulnerability, Unauthor' - MARC","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html","name":"http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html","refsource":"CONFIRM","tags":["Third Party Advisory"],"title":"Oracle Critical Patch Update - January 2015","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www-01.ibm.com/support/docview.wss?uid=swg21676879","name":"http://www-01.ibm.com/support/docview.wss?uid=swg21676879","refsource":"CONFIRM","tags":["Third Party Advisory"],"title":"IBM Security Bulletin: IBM Security Network Intrusion Prevention System is affected by the following OpenSSL vulnerabilities: CVE-2014-0224, CVE-2014-0221, CVE-2014-0195, CVE-2014-0198, CVE-2010-5298, and CVE-2014-3470. - United States","mime":"text/html","httpstatus":"404","archivestatus":"200"},{"url":"http://secunia.com/advisories/59215","name":"59215","refsource":"SECUNIA","tags":["Third Party Advisory"],"title":"Security Advisory SA59215 - Kerio Control OpenSSL Security Issue and Two SQL Injection Vulnerabilities - Secunia","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.ibm.com/support/docview.wss?uid=isg3T1020948","name":"http://www.ibm.com/support/docview.wss?uid=isg3T1020948","refsource":"CONFIRM","tags":["Broken Link"],"title":"IBM notice: The page you requested cannot be displayed","mime":"text/html","httpstatus":"404","archivestatus":"404"},{"url":"http://secunia.com/advisories/60176","name":"60176","refsource":"SECUNIA","tags":["Third Party Advisory"],"title":"Security Advisory SA60176 - HP Integrity Superdome 2 CB900s i2 and i4 Servers OpenSSL SSL/TLS Handshakes Security Issue - Secunia","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://secunia.com/advisories/59163","name":"59163","refsource":"SECUNIA","tags":["Third Party Advisory"],"title":"Security Advisory SA59163 - Juniper IVE OS OpenSSL Two Vulnerabilities - Secunia","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://secunia.com/advisories/60571","name":"60571","refsource":"SECUNIA","tags":["Third Party Advisory"],"title":"Security Advisory SA60571 - EMC Documentum Content Server Multiple Vulnerabilities - Secunia","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://secunia.com/advisories/59669","name":"59669","refsource":"SECUNIA","tags":["Third Party Advisory"],"title":"Security Advisory SA59669 - IBM InfoSphere Guardium OpenSSL Security Issue and Multiple Vulnerabilities - Secunia","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://seclists.org/fulldisclosure/2014/Dec/23","name":"20141205 NEW: VMSA-2014-0012 - VMware vSphere product updates address security vulnerabilities","refsource":"FULLDISC","tags":["Mailing List","Third Party Advisory"],"title":"Full Disclosure: NEW: VMSA-2014-0012 - VMware vSphere product updates address security vulnerabilities","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://secunia.com/advisories/59413","name":"59413","refsource":"SECUNIA","tags":["Third Party Advisory"],"title":"Security Advisory SA59413 - IBM Initiate Master Data Service / IBM InfoSphere Master Data Management OpenSSL Vulnerabilities - Secunia","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://marc.info/?l=bugtraq&m=140621259019789&w=2","name":"HPSBMU03074","refsource":"HP","tags":["Third Party Advisory"],"title":"'[security bulletin] HPSBMU03074 rev.1 - HP Insight Control server migration on Linux and Windows run' - MARC","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://secunia.com/advisories/59300","name":"59300","refsource":"SECUNIA","tags":["Third Party Advisory"],"title":"Security Advisory SA59300 - IBM Tivoli Management Framework OpenSSL Multiple Vulnerabilities - Secunia","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.html","name":"SUSE-SU-2015:0743","refsource":"SUSE","tags":["Third Party Advisory"],"title":"[security-announce] SUSE-SU-2015:0743-1: important: Security update for","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=migr-5095737","name":"http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=migr-5095737","refsource":"CONFIRM","tags":["Third Party Advisory"],"title":"IBM Support","mime":"text/html","httpstatus":"200","archivestatus":"403"},{"url":"http://marc.info/?l=bugtraq&m=140784085708882&w=2","name":"HPSBMU03089","refsource":"HP","tags":["Third Party Advisory"],"title":"'[security bulletin] HPSBMU03089 rev.1 - HP Executive Scorecard, Running OpenSSL, Disclosure of Infor' - MARC","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://secunia.com/advisories/59365","name":"59365","refsource":"SECUNIA","tags":["Third Party Advisory"],"title":"Security Advisory SA59365 - Cisco MDS 9000 / Nexus 7000 OpenSSL Multiple Vulnerabilities - Secunia","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://secunia.com/advisories/59441","name":"59441","refsource":"SECUNIA","tags":["Third Party Advisory"],"title":"Security Advisory SA59441 - IBM Tivoli Network Manager IP Edition OpenSSL Multiple Vulnerabilities - Secunia","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://secunia.com/advisories/59518","name":"59518","refsource":"SECUNIA","tags":["Third Party Advisory"],"title":"Security Advisory SA59518 - IBM Tivoli Workload Scheduler for Applications OpenSSL Multiple Vulnerabilities - Secunia","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://filezilla-project.org/versions.php?type=server","name":"https://filezilla-project.org/versions.php?type=server","refsource":"CONFIRM","tags":["Third Party Advisory"],"title":"FileZilla - The free FTP solution","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05301946","name":"https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05301946","refsource":"CONFIRM","tags":["Third Party Advisory"],"title":"Document Display | HPE Support Center","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"http://dev.mysql.com/doc/relnotes/workbench/en/wb-news-6-1-7.html","name":"http://dev.mysql.com/doc/relnotes/workbench/en/wb-news-6-1-7.html","refsource":"CONFIRM","tags":["Third Party Advisory"],"title":"MySQL ::   MySQL Workbench Release Notes ::  Changes in MySQL Workbench 6.1.7 (2014-06-27)","mime":"text/html","httpstatus":"404","archivestatus":"200"},{"url":"http://marc.info/?l=bugtraq&m=140431828824371&w=2","name":"HPSBMU03055","refsource":"HP","tags":["Third Party Advisory"],"title":"'[security bulletin] HPSBMU03055 rev.1 - HP Smart Update Manager (HP SUM) running OpenSSL, Remote Den' - MARC","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://secunia.com/advisories/58639","name":"58639","refsource":"SECUNIA","tags":["Third Party Advisory"],"title":"Security Advisory SA58639 - IBM Security Proventia Network Active Bypass (NAB) OpenSSL SSL/TLS Handshakes Security Issue - Secunia","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5095756","name":"http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5095756","refsource":"CONFIRM","tags":["Third Party Advisory"],"title":"IBM Support","mime":"text/html","httpstatus":"200","archivestatus":"403"},{"url":"http://secunia.com/advisories/59990","name":"59990","refsource":"SECUNIA","tags":["Third Party Advisory"],"title":"Security Advisory SA59990 - Cisco Quantum Policy Suite OpenSSL Multiple Vulnerabilities - Secunia","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://marc.info/?l=bugtraq&m=140604261522465&w=2","name":"HPSBMU03071","refsource":"HP","tags":["Third Party Advisory"],"title":"'[security bulletin] HPSBMU03071 rev.1 - HP Autonomy IDOL, Running OpenSSL, Remote Unauthorized Acces' - MARC","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://secunia.com/advisories/59495","name":"59495","refsource":"SECUNIA","tags":["Third Party Advisory"],"title":"Security Advisory SA59495 - Novell Open Enterprise Server OpenSSL Multiple Vulnerabilities - Secunia","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://secunia.com/advisories/59677","name":"59677","refsource":"SECUNIA","tags":["Third Party Advisory"],"title":"About Secunia Research | Flexera","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"http://secunia.com/advisories/59659","name":"59659","refsource":"SECUNIA","tags":["Third Party Advisory"],"title":"Security Advisory SA59659 - IBM Tivoli Workload Scheduler Distributed OpenSSL Multiple Vulnerabilities - Secunia","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://secunia.com/advisories/59885","name":"59885","refsource":"SECUNIA","tags":["Third Party Advisory"],"title":"Security Advisory SA59885 - Nessus OpenSSL SSL/TLS Handshakes Security Issue - Secunia","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www-01.ibm.com/support/docview.wss?uid=swg21676833","name":"http://www-01.ibm.com/support/docview.wss?uid=swg21676833","refsource":"CONFIRM","tags":["Third Party Advisory"],"title":"IBM Security Bulletin: IBM WebSphere Cast Iron Solution is affected by OpenSSL vulnerabilities: CVE-2014-0224 - United States","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://marc.info/?l=bugtraq&m=140369637402535&w=2","name":"HPSBMU03053","refsource":"HP","tags":["Third Party Advisory"],"title":"'[security bulletin] HPSBMU03053 rev.1 - HP Software Database and Middleware Automation, OpenSSL Vuln' - MARC","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://rhn.redhat.com/errata/RHSA-2014-0633.html","name":"RHSA-2014:0633","refsource":"REDHAT","tags":["Third Party Advisory"],"title":"Red Hat Customer Portal","mime":"text/html","httpstatus":"-1","archivestatus":"200"},{"url":"https://www.novell.com/support/kb/doc.php?id=7015271","name":"https://www.novell.com/support/kb/doc.php?id=7015271","refsource":"CONFIRM","tags":["Third Party Advisory"],"title":"","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://secunia.com/advisories/59490","name":"59490","refsource":"SECUNIA","tags":["Third Party Advisory"],"title":"Security Advisory SA59490 - HP Version Control Agent OpenSSL Multiple Vulnerabilities - Secunia","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://secunia.com/advisories/58337","name":"58337","refsource":"SECUNIA","tags":["Third Party Advisory"],"title":"Security Advisory SA58337 - IBM Upward Integration Modules (UIM) OpenSSL Multiple Vulnerabilities - Secunia","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www-01.ibm.com/support/docview.wss?uid=swg21678167","name":"http://www-01.ibm.com/support/docview.wss?uid=swg21678167","refsource":"CONFIRM","tags":["Third Party Advisory"],"title":"IBM Security Bulletin: IBM® SDK for Node.js™ is affected by the following OpenSSL vulnerabilities: CVE-2014-0224, CVE-2014-0221, CVE-2014-0195, CVE-2014-0198, CVE-2010-5298, CVE-2014-3470 - United States","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.mandriva.com/security/advisories?name=MDVSA-2015:062","name":"MDVSA-2015:062","refsource":"MANDRIVA","tags":["Third Party Advisory"],"title":"Support / Security / Advisories /  / MDVSA-2015:062 | Mandriva","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://secunia.com/advisories/59383","name":"59383","refsource":"SECUNIA","tags":["Third Party Advisory"],"title":"Security Advisory SA59383 - Trend Micro ServerProtect for Linux OpenSSL SSL/TLS Handshakes Security Issue - Secunia","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://marc.info/?l=bugtraq&m=140491231331543&w=2","name":"HPSBMU03065","refsource":"HP","tags":["Third Party Advisory"],"title":"'[security bulletin] HPSBMU03065 rev.1 - HP Operations Analytics, OpenSSL Vulnerability, SSL/TLS, Rem' - MARC","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://secunia.com/advisories/58492","name":"58492","refsource":"SECUNIA","tags":["Third Party Advisory"],"title":"Security Advisory SA58492 - Cisco Multiple Products OpenSSL Two Vulnerabilities - Secunia","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://secunia.com/advisories/59784","name":"59784","refsource":"SECUNIA","tags":["Third Party Advisory"],"title":"Security Advisory SA59784 - Novell File Reporter Multiple OpenSSL Vulnerabilities - Secunia","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://secunia.com/advisories/59444","name":"59444","refsource":"SECUNIA","tags":["Third Party Advisory"],"title":"Security Advisory SA59444 - IBM TS2900 OpenSSL SSL/TLS Handshake Security Issue - Secunia","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://secunia.com/advisories/59043","name":"59043","refsource":"SECUNIA","tags":["Third Party Advisory"],"title":"Security Advisory SA59043 - IBM Security Virtual Server Protection for VMware OpenSSL SSL/TLS Handshakes Security Issue - Secunia","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://blogs.oracle.com/sunsecurity/entry/cve_2014_0224_cryptographic_issues","name":"https://blogs.oracle.com/sunsecurity/entry/cve_2014_0224_cryptographic_issues","refsource":"CONFIRM","tags":["Third Party Advisory"],"title":"CVE-2014-0224 Cryptographic Issues vulnerability in WAN Boot (Third Party Vulnerability Resolution Blog)","mime":"text/html","httpstatus":"-1","archivestatus":"200"},{"url":"http://www-01.ibm.com/support/docview.wss?uid=swg21677080","name":"http://www-01.ibm.com/support/docview.wss?uid=swg21677080","refsource":"CONFIRM","tags":["Third Party Advisory"],"title":"IBM Security Bulletin: IBM Sterling Connect:Direct for Microsoft Windows is affected by the following OpenSSL vulnerabilities: CVE-2014-0224 - United States","mime":"text/html","httpstatus":"404","archivestatus":"200"},{"url":"http://www.ibm.com/support/docview.wss?uid=swg21676877","name":"http://www.ibm.com/support/docview.wss?uid=swg21676877","refsource":"CONFIRM","tags":["Third Party Advisory"],"title":"Security Bulletin: IBM Sterling Connect:Enterprise for UNIX affected by the following OpenSSL vulnerability (CVE-2014-0224).","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://secunia.com/advisories/59721","name":"59721","refsource":"SECUNIA","tags":["Third Party Advisory"],"title":"Security Advisory SA59721 - IBM SmartCloud Provisioning OpenSSL Multiple Vulnerabilities - Secunia","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-345106.htm","name":"http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-345106.htm","refsource":"CONFIRM","tags":["Third Party Advisory"],"title":"Security Advisory-Multiple OpenSSL vulnerabilities on Huawei products -  Huawei PSIRT","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www-01.ibm.com/support/docview.wss?uid=isg400001841","name":"http://www-01.ibm.com/support/docview.wss?uid=isg400001841","refsource":"CONFIRM","tags":["Third Party Advisory"],"title":"IBM Tivoli Composite Application Manager for Transactions Internet Service Monitoring 7.4 Interim Fix 13 README Tivoli Composite Application Manager for Transactions 7.4.0.0 7.4.0.0-TIV-CAMIS-IF0013 Readme - United States","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://secunia.com/advisories/58714","name":"58714","refsource":"SECUNIA","tags":["Third Party Advisory"],"title":"About Secunia Research | Flexera","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"http://secunia.com/advisories/59389","name":"59389","refsource":"SECUNIA","tags":["Third Party Advisory"],"title":"Security Advisory SA59389 - Oracle Solaris WAN Boot OpenSSL SSL/TLS Handshake Security Issue - Secunia","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://rhn.redhat.com/errata/RHSA-2014-0631.html","name":"RHSA-2014:0631","refsource":"REDHAT","tags":["Third Party Advisory"],"title":"Red Hat Customer Portal","mime":"text/html","httpstatus":"-1","archivestatus":"200"},{"url":"http://secunia.com/advisories/59435","name":"59435","refsource":"SECUNIA","tags":["Third Party Advisory"],"title":"Security Advisory SA59435 - IBM WebSphere DataPower Service Gateway XG45 OpenSSL SSL/TLS Handshakes Security Issue - Secunia","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://secunia.com/advisories/59483","name":"59483","refsource":"SECUNIA","tags":["Third Party Advisory"],"title":"Security Advisory SA59483 - IBM Watson Explorer OpenSSL Security Issue and Vulnerability - Secunia","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://www.intersectalliance.com/wp-content/uploads/release_notes/ReleaseNotes_for_Snare_for_Windows.pdf","name":"https://www.intersectalliance.com/wp-content/uploads/release_notes/ReleaseNotes_for_Snare_for_Windows.pdf","refsource":"CONFIRM","tags":["Third Party Advisory"],"title":"Page not found - Snare Solutions","mime":"application/pdf","httpstatus":"404","archivestatus":"200"},{"url":"http://marc.info/?l=bugtraq&m=140317760000786&w=2","name":"HPSBOV03047","refsource":"HP","tags":["Third Party Advisory"],"title":"'[security bulletin] HPSBOV03047 rev.1 - HP OpenVMS running OpenSSL, Remote Denial of Service (DoS), ' - MARC","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://secunia.com/advisories/59661","name":"59661","refsource":"SECUNIA","tags":["Third Party Advisory"],"title":"About Secunia Research | Flexera","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1103586","name":"https://bugzilla.redhat.com/show_bug.cgi?id=1103586","refsource":"CONFIRM","tags":["Issue Tracking"],"title":"Bug 1103586 – CVE-2014-0224 openssl: SSL/TLS MITM vulnerability","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://marc.info/?l=bugtraq&m=140544599631400&w=2","name":"HPSBGN03068","refsource":"HP","tags":["Third Party Advisory"],"title":"'[security bulletin] HPSBGN03068 rev.1 - HP OneView running OpenSSL, Remote Denial of Service (DoS), ' - MARC","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5095755","name":"http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5095755","refsource":"CONFIRM","tags":["Third Party Advisory"],"title":"IBM Support","mime":"text/html","httpstatus":"200","archivestatus":"403"},{"url":"http://secunia.com/advisories/59188","name":"59188","refsource":"SECUNIA","tags":["Third Party Advisory"],"title":"Security Advisory SA59188 - Blue Coat Multiple Products OpenSSL Two Vulnerabilities - Secunia","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://marc.info/?l=bugtraq&m=141383465822787&w=2","name":"HPSBHF03145","refsource":"HP","tags":["Third Party Advisory"],"title":"'[security bulletin] HPSBHF03145 rev.1 - HP Integrity Superdome X and HP Converged System 900 for SAP' - MARC","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commit%3Bh=bc8923b1ec9c467755cd86f7848c50ee8812e441","name":"https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commit%3Bh=bc8923b1ec9c467755cd86f7848c50ee8812e441","refsource":"","tags":[],"title":"git.openssl.org Git - openssl.git/commit","mime":"text/xml","httpstatus":"404","archivestatus":"200"},{"url":"https://blogs.oracle.com/sunsecurity/entry/cve_2014_0224_cryptographic_issues1","name":"https://blogs.oracle.com/sunsecurity/entry/cve_2014_0224_cryptographic_issues1","refsource":"CONFIRM","tags":["Third Party Advisory"],"title":"CVE-2014-0224 Cryptographic Issues vulnerability in OpenSSL (Third Party Vulnerability Resolution Blog)","mime":"text/html","httpstatus":"-1","archivestatus":"200"},{"url":"http://secunia.com/advisories/59460","name":"59460","refsource":"SECUNIA","tags":["Third Party Advisory"],"title":"Security Advisory SA59460 - Cisco Wireless LAN Controller (WLC) OpenSSL Multiple Vulnerabilities - Secunia","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://secunia.com/advisories/59191","name":"59191","refsource":"SECUNIA","tags":["Third Party Advisory"],"title":"Security Advisory SA59191 - Blue Coat Security Analytics Platform OpenSSL Two Vulnerabilities - Secunia","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140605-openssl","name":"20140605 Multiple Vulnerabilities in OpenSSL Affecting Cisco Products","refsource":"CISCO","tags":["Third Party Advisory"],"title":"Multiple Vulnerabilities in OpenSSL Affecting Cisco Products","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www-01.ibm.com/support/docview.wss?uid=swg24037731","name":"http://www-01.ibm.com/support/docview.wss?uid=swg24037731","refsource":"CONFIRM","tags":["Third Party Advisory"],"title":"IBM Tivoli Endpoint Manager for Remote Control Interim Fix 8.2.0-TIV-TEMRC820-IF0002 - United States","mime":"text/html","httpstatus":"404","archivestatus":"200"},{"url":"http://marc.info/?l=bugtraq&m=141383410222440&w=2","name":"HPSBST03097","refsource":"HP","tags":["Third Party Advisory"],"title":"'[security bulletin] HPSBST03097 rev.1 - HP Command View for Tape Libraries (CVTL) running OpenSSL, R' - MARC","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www-01.ibm.com/support/docview.wss?uid=swg21676845","name":"http://www-01.ibm.com/support/docview.wss?uid=swg21676845","refsource":"CONFIRM","tags":["Third Party Advisory"],"title":"IBM Security Bulletin: IBM Security Virtual Server Protection for VMware is affected by the following OpenSSL vulnerability:  CVE-2014-0224 - United States","mime":"text/html","httpstatus":"404","archivestatus":"200"},{"url":"http://secunia.com/advisories/59055","name":"59055","refsource":"SECUNIA","tags":["Third Party Advisory"],"title":"Security Advisory SA59055 - IBM QRadar SIEM OpenSSL SSL/TLS Handshake Security Issue - Secunia","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www-01.ibm.com/support/docview.wss?uid=swg21675626","name":"http://www-01.ibm.com/support/docview.wss?uid=swg21675626","refsource":"CONFIRM","tags":["Third Party Advisory"],"title":"IBM Security Bulletin: Rational ClearCase is affected by OpenSSL vulnerabilities (CVE-2014-0224, CVE-2014-3470, CVE-2015-0292) - United States","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.ibm.com/support/docview.wss?uid=ssg1S1004678","name":"http://www.ibm.com/support/docview.wss?uid=ssg1S1004678","refsource":"CONFIRM","tags":["Third Party Advisory"],"title":"Security Bulletin: IBM XIV Gen3 Storage System is exposed to the following OpenSSL vulnerability: CVE-2014-0224","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://secunia.com/advisories/59525","name":"59525","refsource":"SECUNIA","tags":["Third Party Advisory"],"title":"Security Advisory SA59525 - IBM Sterling Connect:Express for UNIX OpenSSL Security Issue and Two Vulnerabilities - Secunia","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://secunia.com/advisories/59429","name":"59429","refsource":"SECUNIA","tags":["Third Party Advisory"],"title":"Security Advisory SA59429 - Cisco IOS OpenSSL Multiple Vulnerabilities - Secunia","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://www.ibm.com/support/docview.wss?uid=ssg1S1004671","name":"https://www.ibm.com/support/docview.wss?uid=ssg1S1004671","refsource":"CONFIRM","tags":["Third Party Advisory"],"title":"Security Bulletin: TS3400 is affected by the following OpenSSL vulnerabilities: CVE-2014-0224","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://marc.info/?l=bugtraq&m=140266410314613&w=2","name":"HPSBUX03046","refsource":"HP","tags":["Third Party Advisory"],"title":"'[security bulletin] HPSBUX03046 SSRT101590 rev.1 - HP-UX Running OpenSSL, Remote Denial of Service (' - MARC","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://marc.info/?l=bugtraq&m=140386311427810&w=2","name":"HPSBMU03058","refsource":"HP","tags":["Third Party Advisory"],"title":"'[security bulletin] HPSBMU03058 rev.1 - HP BladeSystem c-Class Onboard Administrator (OA) running Op' - MARC","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www-01.ibm.com/support/docview.wss?uid=swg21678233","name":"http://www-01.ibm.com/support/docview.wss?uid=swg21678233","refsource":"CONFIRM","tags":["Third Party Advisory"],"title":"IBM Security Bulletin: Security Bulletin: IBM Sterling Connect:Direct for UNIX is affected by the following OpenSSL vulnerabilities: CVE-2014-0224 - United States","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www-01.ibm.com/support/docview.wss?uid=swg21676035","name":"http://www-01.ibm.com/support/docview.wss?uid=swg21676035","refsource":"CONFIRM","tags":["Third Party Advisory"],"title":"IBM notice: The page you requested cannot be displayed","mime":"text/html","httpstatus":"404","archivestatus":"410"},{"url":"http://www.openssl.org/news/secadv_20140605.txt","name":"http://www.openssl.org/news/secadv_20140605.txt","refsource":"CONFIRM","tags":["Vendor Advisory"],"title":"","mime":"text/plain","httpstatus":"200","archivestatus":"200"},{"url":"http://secunia.com/advisories/58745","name":"58745","refsource":"SECUNIA","tags":["Third Party Advisory"],"title":"Security Advisory SA58745 - Tenable Passive Vulnerability Scanner OpenSSL SSL/TLS Handshakes Security Issue - Secunia","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://security.gentoo.org/glsa/glsa-201407-05.xml","name":"GLSA-201407-05","refsource":"GENTOO","tags":["Third Party Advisory"],"title":"Gentoo Linux Documentation\n--\n  OpenSSL: Multiple vulnerabilities","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://secunia.com/advisories/59063","name":"59063","refsource":"SECUNIA","tags":["Third Party Advisory"],"title":"Security Advisory SA59063 - IBM Power Systems OpenSSL SSL/TLS Handshakes Security Issue - Secunia","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www-01.ibm.com/support/docview.wss?uid=nas8N1020172","name":"http://www-01.ibm.com/support/docview.wss?uid=nas8N1020172","refsource":"CONFIRM","tags":["Third Party Advisory"],"title":"IBM Security Bulletin: Power Systems Firmware is affected by the following OpenSSL vulnerabilities: (CVE-2014-0224) - United States","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html","name":"http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html","refsource":"CONFIRM","tags":["Third Party Advisory"],"title":"Oracle Critical Patch Update - October 2014","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www-01.ibm.com/support/docview.wss?uid=swg24037732","name":"http://www-01.ibm.com/support/docview.wss?uid=swg24037732","refsource":"CONFIRM","tags":["Third Party Advisory"],"title":"IBM Tivoli Endpoint Manager for Remote Control Interim Fix 8.2.1-TIV-TEMRC821-IF0007 - United States","mime":"text/html","httpstatus":"404","archivestatus":"200"},{"url":"http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html","name":"http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html","refsource":"CONFIRM","tags":["Third Party Advisory"],"title":"Oracle Critical Patch Update - July 2014","mime":"text/html","httpstatus":"-1","archivestatus":"200"},{"url":"http://www-01.ibm.com/support/docview.wss?uid=swg21676644","name":"http://www-01.ibm.com/support/docview.wss?uid=swg21676644","refsource":"CONFIRM","tags":["Third Party Advisory"],"title":"IBM Security Bulletin: IBM MessageSight is affected by the following OpenSSL vulnerabilities: (CVE-2014-0224, and CVE-2014-0195) - United States","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10629","name":"http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10629","refsource":"CONFIRM","tags":["Not Applicable"],"title":"Juniper Networks - 2014-06 Out of Cycle Security Bulletin: Vulnerabilities in OpenSSL related to ChangeCipherSpec, DTLS, SSL_MODE_RELEASE_BUFFERS and ECDH ciphersuites   - Knowledge Base","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www-01.ibm.com/support/docview.wss?uid=swg21676478","name":"http://www-01.ibm.com/support/docview.wss?uid=swg21676478","refsource":"CONFIRM","tags":["Third Party Advisory"],"title":"IBM notice: The page you requested cannot be displayed","mime":"text/html","httpstatus":"404","archivestatus":"410"},{"url":"http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00011.html","name":"openSUSE-SU-2016:0640","refsource":"SUSE","tags":["Third Party Advisory"],"title":"[security-announce] openSUSE-SU-2016:0640-1: important: Security update","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://marc.info/?l=bugtraq&m=140904544427729&w=2","name":"HPSBMU03076","refsource":"HP","tags":["Third Party Advisory"],"title":"'[security bulletin] HPSBMU03076 rev.2 - HP Systems Insight Manager (SIM) on Linux and Windows runnin' - MARC","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www-01.ibm.com/support/docview.wss?uid=swg21677836","name":"http://www-01.ibm.com/support/docview.wss?uid=swg21677836","refsource":"CONFIRM","tags":["Third Party Advisory"],"title":"IBM Security Bulletin: IBM Sterling Connect:Express for UNIX is affected by the following OpenSSL vulnerabilities: CVE-2014-0224, CVE-2014-0198, CVE-2010-5298, CVE-2014-3470 - United States","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://secunia.com/advisories/58433","name":"58433","refsource":"SECUNIA","tags":["Third Party Advisory"],"title":"Security Advisory SA58433 - Tableau Desktop / Reader OpenSSL SSL/TLS Handshake Security Issue - Secunia","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://marc.info/?l=bugtraq&m=140448122410568&w=2","name":"HPSBMU03051","refsource":"HP","tags":["Third Party Advisory"],"title":"'[security bulletin] HPSBMU03051 rev.2 - HP System Management Homepage running OpenSSL on Linux and W' - MARC","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://secunia.com/advisories/58667","name":"58667","refsource":"SECUNIA","tags":["Third Party Advisory"],"title":"Security Advisory SA58667 - Cisco Multiple Products OpenSSL SSL/TLS Handshake Security Issue and Two Denial of Service Vulnerabilities - Secunia","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://secunia.com/advisories/59310","name":"59310","refsource":"SECUNIA","tags":["Third Party Advisory"],"title":"Security Advisory SA59310 - Novell Messenger OpenSSL Multiple Vulnerabilities - Secunia","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www-01.ibm.com/support/docview.wss?uid=swg21677131","name":"http://www-01.ibm.com/support/docview.wss?uid=swg21677131","refsource":"CONFIRM","tags":["Third Party Advisory"],"title":"IBM Security Bulletin: Tivoli Storage Productivity Center is affected by the following OpenSSL vulnerabilities: CVE-2014-0224 - United States","mime":"text/html","httpstatus":"404","archivestatus":"200"},{"url":"http://marc.info/?l=bugtraq&m=140983229106599&w=2","name":"HPSBMU03083","refsource":"HP","tags":["Third Party Advisory"],"title":"'[security bulletin] HPSBMU03083 rev.2 - HP BladeSystem c-Class Virtual Connect Firmware running Open' - MARC","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.ibm.com/support/docview.wss?uid=swg1IT02314","name":"IT02314","refsource":"AIXAPAR","tags":["Third Party Advisory"],"title":"IT02314: CVE-2014-0224 - VULNERABILITY IN SSL CHANGECIPHERSPEC PROCESSING","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://secunia.com/advisories/59004","name":"59004","refsource":"SECUNIA","tags":["Third Party Advisory"],"title":"Security Advisory SA59004 - IBM Tivoli Storage Productivity Center OpenSSL SSL/TLS Handshake Security Issue - Secunia","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.kerio.com/support/kerio-control/release-history","name":"http://www.kerio.com/support/kerio-control/release-history","refsource":"CONFIRM","tags":["Third Party Advisory"],"title":"Kerio Control small business firewall","mime":"text/html","httpstatus":"200","archivestatus":"403"},{"url":"https://cert-portal.siemens.com/productcert/pdf/ssa-234763.pdf","name":"https://cert-portal.siemens.com/productcert/pdf/ssa-234763.pdf","refsource":"CONFIRM","tags":["Third Party Advisory"],"title":"","mime":"application/pdf","httpstatus":"200","archivestatus":"200"},{"url":"http://www-01.ibm.com/support/docview.wss?uid=swg21676062","name":"http://www-01.ibm.com/support/docview.wss?uid=swg21676062","refsource":"CONFIRM","tags":["Third Party Advisory"],"title":"IBM Security Bulletin: SmartCloud Orchestrator is affected by the following OpenSSL vulnerabilities (CVE-2014-0224, CVE-2014-0221, CVE-2014-0195, CVE-2014-0198, CVE-2010-5298, CVE-2014-3470, CVE-2014-0076) - United States","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://secunia.com/advisories/59824","name":"59824","refsource":"SECUNIA","tags":["Third Party Advisory"],"title":"Security Advisory SA59824 - IBM Flex System Integrated Management Module 2 (IMM2) OpenSSL SSL/TLS Handshakes Security Issue - Secunia","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://secunia.com/advisories/59190","name":"59190","refsource":"SECUNIA","tags":["Third Party Advisory"],"title":"Security Advisory SA59190 - Blue Coat ProxySG OpenSSL SSL/TLS Handshake Security Issue and Denial of Service Vulnerability - Secunia","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www-01.ibm.com/support/docview.wss?uid=swg21676536","name":"http://www-01.ibm.com/support/docview.wss?uid=swg21676536","refsource":"CONFIRM","tags":["Third Party Advisory"],"title":"IBM Image Construction and Composition Tool is affected by OpenSSL vulnerabilities - United States","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www-01.ibm.com/support/docview.wss?uid=swg21677527","name":"http://www-01.ibm.com/support/docview.wss?uid=swg21677527","refsource":"CONFIRM","tags":["Third Party Advisory"],"title":"IBM notice: The page you requested cannot be displayed","mime":"text/html","httpstatus":"404","archivestatus":"410"},{"url":"http://secunia.com/advisories/59602","name":"59602","refsource":"SECUNIA","tags":["Third Party Advisory"],"title":"Security Advisory SA59602 - IBM Switches OpenSSL SSL/TLS Handshakes Security Issue - Secunia","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.ibm.com/support/docview.wss?uid=swg24037783","name":"http://www.ibm.com/support/docview.wss?uid=swg24037783","refsource":"CONFIRM","tags":["Third Party Advisory"],"title":"IBM SDK for Node.js 1.1.0.4 for use by the Cordova tools","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"http://secunia.com/advisories/59126","name":"59126","refsource":"SECUNIA","tags":["Third Party Advisory"],"title":"Security Advisory SA59126 - Huawei Multiple Products Multiple OpenSSL Vulnerabilities - Secunia","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www-01.ibm.com/support/docview.wss?uid=swg21676419","name":"http://www-01.ibm.com/support/docview.wss?uid=swg21676419","refsource":"CONFIRM","tags":["Third Party Advisory"],"title":"IBM Security Bulletin: Tivoli Management Framework is affected by the following OpenSSL vulnerabilities: CVE-2014-0224, CVE-2014-0221, CVE-2014-0195, CVE-2014-0198, CVE-2010-5298, CVE-2014-3470 and possibly CVE-2014-0076. - United States","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www-01.ibm.com/support/docview.wss?uid=swg24037761","name":"http://www-01.ibm.com/support/docview.wss?uid=swg24037761","refsource":"CONFIRM","tags":["Third Party Advisory"],"title":"IBM WebSphere MQ for HP NonStop Server V5.3.1 fix pack 5.3.1.10 - United States","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://secunia.com/advisories/58759","name":"58759","refsource":"SECUNIA","tags":["Third Party Advisory"],"title":"Security Advisory SA58759 - IBM SAN Volume Controller and Storwize Family OpenSSL SSL/TLS Handshakes Security Issue - Secunia","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://secunia.com/advisories/59189","name":"59189","refsource":"SECUNIA","tags":["Third Party Advisory"],"title":"Security Advisory SA59189 - Blue Coat IntelligenceCenter OpenSSL Multiple Vulnerabilities - Secunia","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://secunia.com/advisories/59284","name":"59284","refsource":"SECUNIA","tags":["Third Party Advisory"],"title":"Security Advisory SA59284 - Cisco Prime Network OpenSSL Multiple Vulnerabilities - Secunia","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://rhn.redhat.com/errata/RHSA-2014-0680.html","name":"RHSA-2014:0680","refsource":"REDHAT","tags":["Third Party Advisory"],"title":"Red Hat Customer Portal","mime":"text/html","httpstatus":"-1","archivestatus":"200"},{"url":"http://marc.info/?l=bugtraq&m=141147110427269&w=2","name":"HPSBPI03107","refsource":"HP","tags":["Third Party Advisory"],"title":"'[security bulletin] HPSBPI03107 rev.1 - Certain HP LaserJet Printers, MFPs and Certain HP OfficeJet ' - MARC","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5095754","name":"http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5095754","refsource":"CONFIRM","tags":["Third Party Advisory"],"title":"IBM Support","mime":"text/html","httpstatus":"200","archivestatus":"403"},{"url":"http://lists.opensuse.org/opensuse-updates/2015-02/msg00030.html","name":"openSUSE-SU-2015:0229","refsource":"SUSE","tags":["Third Party Advisory"],"title":"openSUSE-SU-2015:0229-1: moderate: Security update for virtualbox","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://www.imperialviolet.org/2014/06/05/earlyccs.html","name":"https://www.imperialviolet.org/2014/06/05/earlyccs.html","refsource":"MISC","tags":["Exploit"],"title":"ImperialViolet - Early ChangeCipherSpec Attack","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://marc.info/?l=bugtraq&m=141025641601169&w=2","name":"HPSBST03106","refsource":"HP","tags":["Third Party Advisory"],"title":"'[security bulletin] HPSBST03106 rev.1 - HP P2000 G3 MSA Array System running OpenSSL, Remote Unautho' - MARC","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.securityfocus.com/archive/1/534161/100/0/threaded","name":"20141205 NEW: VMSA-2014-0012 - VMware vSphere product updates address security vulnerabilities","refsource":"BUGTRAQ","tags":["Not Applicable"],"title":"SecurityFocus","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://www.intersectalliance.com/wp-content/uploads/release_notes/ReleaseNotes_for_SNARE_for_MSSQL.pdf","name":"https://www.intersectalliance.com/wp-content/uploads/release_notes/ReleaseNotes_for_SNARE_for_MSSQL.pdf","refsource":"CONFIRM","tags":["Third Party Advisory"],"title":"Page not found - Snare Solutions","mime":"application/pdf","httpstatus":"404","archivestatus":"200"},{"url":"http://www.blackberry.com/btsc/KB36051","name":"http://www.blackberry.com/btsc/KB36051","refsource":"CONFIRM","tags":["Third Party Advisory"],"title":"","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"http://secunia.com/advisories/61254","name":"61254","refsource":"SECUNIA","tags":["Third Party Advisory"],"title":"Security Advisory SA61254 - IBM InfoSphere Guardium Database Activity Monitor Multiple Vulnerabilities - Secunia","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www-01.ibm.com/support/docview.wss?uid=swg21677567","name":"http://www-01.ibm.com/support/docview.wss?uid=swg21677567","refsource":"CONFIRM","tags":["Third Party Advisory"],"title":"IBM Security Bulletin: IBM Security Proventia Network Active Bypass is affected by vulnerabilities in OpenSSL (CVE-2014-0224) - United States","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://secunia.com/advisories/59491","name":"59491","refsource":"SECUNIA","tags":["Third Party Advisory"],"title":"Security Advisory SA59491 - BlackBerry OS OpenSSL Multiple Vulnerabilities - Secunia","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.f-secure.com/en/web/labs_global/fsc-2014-6","name":"http://www.f-secure.com/en/web/labs_global/fsc-2014-6","refsource":"CONFIRM","tags":["Third Party Advisory"],"title":"fsc-2014-6 | F-Secure Labs","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www-01.ibm.com/support/docview.wss?uid=swg21676529","name":"http://www-01.ibm.com/support/docview.wss?uid=swg21676529","refsource":"CONFIRM","tags":["Third Party Advisory"],"title":"IBM Security Bulletin: IBM Security Network Protection is affected by the following OpenSSL vulnerabilities:  CVE-2014-0224, CVE-2014-0198, CVE-2010-5298, CVE-2014-3470 - United States","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://lists.fedoraproject.org/pipermail/package-announce/2014-August/136473.html","name":"FEDORA-2014-9308","refsource":"FEDORA","tags":["Third Party Advisory"],"title":"[SECURITY] Fedora 20 Update: openssl-1.0.1e-39.fc20","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://rhn.redhat.com/errata/RHSA-2014-0627.html","name":"RHSA-2014:0627","refsource":"REDHAT","tags":["Third Party Advisory"],"title":"Red Hat Customer Portal","mime":"text/html","httpstatus":"-1","archivestatus":"200"},{"url":"http://secunia.com/advisories/58939","name":"58939","refsource":"SECUNIA","tags":["Third Party Advisory"],"title":"Security Advisory SA58939 - IBM SmartCloud Orchestrator OpenSSL Multiple Vulnerabilities - Secunia","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://marc.info/?l=bugtraq&m=140870499402361&w=2","name":"HPSBST03098","refsource":"HP","tags":["Third Party Advisory"],"title":"'[security bulletin] HPSBST03098 rev.1 - HP StoreEver MSL6480 Tape Library running OpenSSL, Remote Un' - MARC","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://secunia.com/advisories/59135","name":"59135","refsource":"SECUNIA","tags":["Third Party Advisory"],"title":"Security Advisory SA59135 - IBM XIV Storage System OpenSSL SSL/TLS Handshake Security Issue - Secunia","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://secunia.com/advisories/59445","name":"59445","refsource":"SECUNIA","tags":["Third Party Advisory"],"title":"Security Advisory SA59445 - IBM Worklight OpenSSL Security Issue and Vulnerability - Secunia","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html","name":"http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html","refsource":"CONFIRM","tags":["Third Party Advisory"],"title":"Oracle Critical Patch Update - July 2017","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www-01.ibm.com/support/docview.wss?uid=swg21676071","name":"http://www-01.ibm.com/support/docview.wss?uid=swg21676071","refsource":"CONFIRM","tags":["Third Party Advisory"],"title":"IBM Security Bulletin: IBM Tivoli Network Manager IP Edition V39 Fix Pack 4 HTTPS support for Perl Collector install is affected by the following OpenSSL vulnerabilities: (CVE-2014-0224, CVE-2014-0221, CVE-2014-0195 and CVE-2014-3470) - United States","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html","name":"http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html","refsource":"CONFIRM","tags":["Third Party Advisory"],"title":"Oracle Critical Patch Update - October 2017","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5095757","name":"http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5095757","refsource":"CONFIRM","tags":["Third Party Advisory"],"title":"IBM Support","mime":"text/html","httpstatus":"200","archivestatus":"403"},{"url":"http://secunia.com/advisories/59459","name":"59459","refsource":"SECUNIA","tags":["Third Party Advisory"],"title":"Security Advisory SA59459 - Splunk OpenSSL Security Issue and Vulnerability - Secunia","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.securitytracker.com/id/1031594","name":"1031594","refsource":"SECTRACK","tags":["Third Party Advisory","VDB Entry"],"title":"Sun Integrated Lights-Out Manager Bugs Let Remote Authenticated Users Partially Access Data, Modify Data, and Deny Service - SecurityTracker","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.vmware.com/security/advisories/VMSA-2014-0006.html","name":"http://www.vmware.com/security/advisories/VMSA-2014-0006.html","refsource":"CONFIRM","tags":["Third Party Advisory"],"title":"VMSA-2014-0006.11 | United States","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://secunia.com/advisories/59186","name":"59186","refsource":"SECUNIA","tags":["Third Party Advisory"],"title":"Security Advisory SA59186 - IBM Image Construction and Composition Tool OpenSSL SSL/TLS Handshake Security Issue - Secunia","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://secunia.com/advisories/60522","name":"60522","refsource":"SECUNIA","tags":["Third Party Advisory"],"title":"Security Advisory SA60522 - HP AssetManager OpenSSL SSL/TLS Handshakes Security Issue - Secunia","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://secunia.com/advisories/59440","name":"59440","refsource":"SECUNIA","tags":["Third Party Advisory"],"title":"Security Advisory SA59440 - IBM Security Network Protection Security Issue and Multiple Vulnerabilities - Secunia","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://secunia.com/advisories/59364","name":"59364","refsource":"SECUNIA","tags":["Third Party Advisory"],"title":"Security Advisory SA59364 - HP-UX update for OpenSSL - Secunia","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://secunia.com/advisories/59012","name":"59012","refsource":"SECUNIA","tags":["Third Party Advisory"],"title":"Security Advisory SA59012 - IBM SAN Volume Controller and Storwize Family OpenSSL SSL/TLS Handshakes Security Issue - Secunia","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://secunia.com/advisories/58579","name":"58579","refsource":"SECUNIA","tags":["Third Party Advisory"],"title":"Security Advisory SA58579 - Cisco Multiple Products OpenSSL SSL/TLS Handshake and Denial of Service Vulnerabilities - Secunia","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www-01.ibm.com/support/docview.wss?uid=swg24037729","name":"http://www-01.ibm.com/support/docview.wss?uid=swg24037729","refsource":"CONFIRM","tags":["Third Party Advisory"],"title":"IBM notice: The page you requested cannot be displayed","mime":"text/html","httpstatus":"404","archivestatus":"410"},{"url":"http://secunia.com/advisories/60577","name":"60577","refsource":"SECUNIA","tags":["Third Party Advisory"],"title":"Security Advisory SA60577 - HP Connect-It (CIT) OpenSSL SSL/TLS Handshakes Security Issue - Secunia","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://linux.oracle.com/errata/ELSA-2014-1053.html","name":"http://linux.oracle.com/errata/ELSA-2014-1053.html","refsource":"CONFIRM","tags":["Third Party Advisory"],"title":"linux.oracle.com | ELSA-2014-1053 -  openssl security update","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www-01.ibm.com/support/docview.wss?uid=swg21677390","name":"http://www-01.ibm.com/support/docview.wss?uid=swg21677390","refsource":"CONFIRM","tags":["Third Party Advisory"],"title":"IBM Security Bulletin: IBM X Series hardware IMMv1, IMMv2 remote management ports as used by IBM QRadar SIEM appliances are affected by the following OpenSSL vulnerabilities: (CVE-2014-0224) - United States","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www-01.ibm.com/support/docview.wss?uid=swg1IV61506","name":"IV61506","refsource":"AIXAPAR","tags":["Third Party Advisory"],"title":"IBM IV61506: CHANGES TO ADDRESS CVE-2014-0224 - United States","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://secunia.com/advisories/59093","name":"59093","refsource":"SECUNIA","tags":["Third Party Advisory"],"title":"Security Advisory SA59093 - Juniper Multiple Products OpenSSL SSL/TLS Handshake Security Issue - Secunia","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://secunia.com/advisories/58385","name":"58385","refsource":"SECUNIA","tags":["Third Party Advisory"],"title":"Security Advisory SA58385 - Trend Micro Deep Security OpenSSL SSL/TLS Handshakes Security Issue - Secunia","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://secunia.com/advisories/59306","name":"59306","refsource":"SECUNIA","tags":["Third Party Advisory"],"title":"Security Advisory SA59306 - IBM i OpenSSL Multiple Vulnerabilities - Secunia","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://www.cve.org/CVERecord?id=CVE-2014-0224","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2014-0224","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2014","cve_id":"224","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"fedoraproject","cpe5":"fedora","cpe6":"19","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"224","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"fedoraproject","cpe5":"fedora","cpe6":"20","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"224","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"fedoraproject","cpe5":"fedora","cpe6":"19","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"224","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"fedoraproject","cpe5":"fedora","cpe6":"20","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"224","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"filezilla-project","cpe5":"filezilla_server","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"224","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"filezilla-project","cpe5":"filezilla_server","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"224","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"mariadb","cpe5":"mariadb","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"224","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"nodejs","cpe5":"node.js","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"224","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"openssl","cpe5":"openssl","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"224","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"openssl","cpe5":"openssl","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"224","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"opensuse","cpe5":"opensuse","cpe6":"13.1","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"224","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"opensuse","cpe5":"opensuse","cpe6":"13.2","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"224","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"opensuse","cpe5":"opensuse","cpe6":"13.1","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"224","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"opensuse","cpe5":"opensuse","cpe6":"13.2","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"224","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"python","cpe5":"python","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"224","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"redhat","cpe5":"enterprise_linux","cpe6":"4","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"224","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"redhat","cpe5":"enterprise_linux","cpe6":"5","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"224","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"redhat","cpe5":"enterprise_linux","cpe6":"6.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"224","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"redhat","cpe5":"enterprise_linux","cpe6":"4","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"224","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"redhat","cpe5":"enterprise_linux","cpe6":"5","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"224","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"redhat","cpe5":"enterprise_linux","cpe6":"6.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"224","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"redhat","cpe5":"jboss_enterprise_application_platform","cpe6":"5.2.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"224","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"redhat","cpe5":"jboss_enterprise_application_platform","cpe6":"6.2.3","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"224","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"redhat","cpe5":"jboss_enterprise_application_platform","cpe6":"5.2.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"224","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"redhat","cpe5":"jboss_enterprise_application_platform","cpe6":"6.2.3","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"224","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"redhat","cpe5":"jboss_enterprise_web_platform","cpe6":"5.2.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"224","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"redhat","cpe5":"jboss_enterprise_web_platform","cpe6":"5.2.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"224","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"redhat","cpe5":"jboss_enterprise_web_server","cpe6":"2.0.1","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"224","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"redhat","cpe5":"jboss_enterprise_web_server","cpe6":"2.0.1","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"224","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"redhat","cpe5":"storage","cpe6":"2.1","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"224","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"redhat","cpe5":"storage","cpe6":"2.1","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"224","vulnerable":"-1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"h","cpe4":"siemens","cpe5":"application_processing_engine","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"224","vulnerable":"0","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"h","cpe4":"siemens","cpe5":"application_processing_engine","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"224","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"siemens","cpe5":"application_processing_engine_firmware","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"224","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"siemens","cpe5":"application_processing_engine_firmware","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"224","vulnerable":"-1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"h","cpe4":"siemens","cpe5":"cp1543-1","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"224","vulnerable":"0","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"h","cpe4":"siemens","cpe5":"cp1543-1","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"224","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"siemens","cpe5":"cp1543-1_firmware","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"224","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"siemens","cpe5":"cp1543-1_firmware","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"224","vulnerable":"-1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"h","cpe4":"siemens","cpe5":"rox","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"224","vulnerable":"0","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"h","cpe4":"siemens","cpe5":"rox","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"224","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"siemens","cpe5":"rox_firmware","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"224","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"siemens","cpe5":"rox_firmware","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"224","vulnerable":"-1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"h","cpe4":"siemens","cpe5":"s7-1500","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"224","vulnerable":"0","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"h","cpe4":"siemens","cpe5":"s7-1500","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"224","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"siemens","cpe5":"s7-1500_firmware","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"224","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"siemens","cpe5":"s7-1500_firmware","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[{"cve":"CVE-2014-0224","qid":"377614","title":"Filezilla Server Information Disclosure Vulnerability (CVE-2014-0224)"},{"cve":"CVE-2014-0224","qid":"390226","title":"Oracle Managed Virtualization (VM) Server for x86 Security Update for Open Secure Sockets Layer (OpenSSL) (OVMSA-2021-0011)"},{"cve":"CVE-2014-0224","qid":"390284","title":"Oracle Managed Virtualization (VM) Server for x86 Security Update for Open Secure Sockets Layer (OpenSSL) (OVMSA-2023-0013)"},{"cve":"CVE-2014-0224","qid":"590349","title":"Rockwell Automation Stratix 5900 Multiple Vulnerabilities (ICSA-17-094-04)"},{"cve":"CVE-2014-0224","qid":"590887","title":"Phoenix Contact Innominate mGuard devices Open Secure Sockets Layer (OpenSSL) Transport Layer Security (TLS) Man-in-the-Middle (MITM) Vulnerability (20140606_001)"},{"cve":"CVE-2014-0224","qid":"591350","title":"General Electric D20MX Open Secure Sockets Layer (OpenSSL) Multiple Vulnerabilities (PRSN-0006)"}]},"source_records":{"cve_program":{"CVE_data_meta":{"ASSIGNER":"secalert@redhat.com","ID":"CVE-2014-0224","STATE":"PUBLIC"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"n/a","version":{"version_data":[{"version_value":"n/a"}]}}]},"vendor_name":"n/a"}]}},"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"OpenSSL before 0.9.8za, 1.0.0 before 1.0.0m, and 1.0.1 before 1.0.1h does not properly restrict processing of ChangeCipherSpec messages, which allows man-in-the-middle attackers to trigger use of a zero-length master key in certain OpenSSL-to-OpenSSL communications, and consequently hijack sessions or obtain sensitive information, via a crafted TLS handshake, aka the \"CCS Injection\" vulnerability."}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"n/a"}]}]},"references":{"reference_data":[{"name":"59342","refsource":"SECUNIA","url":"http://secunia.com/advisories/59342"},{"name":"59669","refsource":"SECUNIA","url":"http://secunia.com/advisories/59669"},{"name":"59525","refsource":"SECUNIA","url":"http://secunia.com/advisories/59525"},{"name":"HPSBMU03071","refsource":"HP","url":"http://marc.info/?l=bugtraq&m=140604261522465&w=2"},{"name":"59004","refsource":"SECUNIA","url":"http://secunia.com/advisories/59004"},{"name":"59530","refsource":"SECUNIA","url":"http://secunia.com/advisories/59530"},{"name":"http://www-01.ibm.com/support/docview.wss?uid=swg21675626","refsource":"CONFIRM","url":"http://www-01.ibm.com/support/docview.wss?uid=swg21675626"},{"name":"59824","refsource":"SECUNIA","url":"http://secunia.com/advisories/59824"},{"name":"59282","refsource":"SECUNIA","url":"http://secunia.com/advisories/59282"},{"name":"http://www.novell.com/support/kb/doc.php?id=7015300","refsource":"CONFIRM","url":"http://www.novell.com/support/kb/doc.php?id=7015300"},{"name":"59215","refsource":"SECUNIA","url":"http://secunia.com/advisories/59215"},{"name":"https://bugzilla.redhat.com/show_bug.cgi?id=1103586","refsource":"CONFIRM","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1103586"},{"name":"59990","refsource":"SECUNIA","url":"http://secunia.com/advisories/59990"},{"name":"59264","refsource":"SECUNIA","url":"http://secunia.com/advisories/59264"},{"name":"59454","refsource":"SECUNIA","url":"http://secunia.com/advisories/59454"},{"name":"58492","refsource":"SECUNIA","url":"http://secunia.com/advisories/58492"},{"name":"59186","refsource":"SECUNIA","url":"http://secunia.com/advisories/59186"},{"name":"59188","refsource":"SECUNIA","url":"http://secunia.com/advisories/59188"},{"name":"59126","refsource":"SECUNIA","url":"http://secunia.com/advisories/59126"},{"name":"HPSBMU03078","refsource":"HP","url":"http://marc.info/?l=bugtraq&m=140672208601650&w=2"},{"name":"HPSBMU03089","refsource":"HP","url":"http://marc.info/?l=bugtraq&m=140784085708882&w=2"},{"name":"http://www.novell.com/support/kb/doc.php?id=7015264","refsource":"CONFIRM","url":"http://www.novell.com/support/kb/doc.php?id=7015264"},{"name":"http://support.f5.com/kb/en-us/solutions/public/15000/300/sol15325.html","refsource":"CONFIRM","url":"http://support.f5.com/kb/en-us/solutions/public/15000/300/sol15325.html"},{"name":"59306","refsource":"SECUNIA","url":"http://secunia.com/advisories/59306"},{"name":"RHSA-2014:0627","refsource":"REDHAT","url":"http://rhn.redhat.com/errata/RHSA-2014-0627.html"},{"name":"http://www.websense.com/support/article/kbarticle/Vulnerabilities-resolved-in-TRITON-APX-Version-8-0","refsource":"CONFIRM","url":"http://www.websense.com/support/article/kbarticle/Vulnerabilities-resolved-in-TRITON-APX-Version-8-0"},{"name":"HPSBGN03068","refsource":"HP","url":"http://marc.info/?l=bugtraq&m=140544599631400&w=2"},{"name":"RHSA-2014:0626","refsource":"REDHAT","url":"http://rhn.redhat.com/errata/RHSA-2014-0626.html"},{"name":"59190","refsource":"SECUNIA","url":"http://secunia.com/advisories/59190"},{"name":"58639","refsource":"SECUNIA","url":"http://secunia.com/advisories/58639"},{"name":"http://www-01.ibm.com/support/docview.wss?uid=swg21678289","refsource":"CONFIRM","url":"http://www-01.ibm.com/support/docview.wss?uid=swg21678289"},{"name":"http://www.ibm.com/support/docview.wss?uid=swg21676877","refsource":"CONFIRM","url":"http://www.ibm.com/support/docview.wss?uid=swg21676877"},{"name":"59446","refsource":"SECUNIA","url":"http://secunia.com/advisories/59446"},{"name":"59529","refsource":"SECUNIA","url":"http://secunia.com/advisories/59529"},{"name":"59445","refsource":"SECUNIA","url":"http://secunia.com/advisories/59445"},{"name":"http://www.vmware.com/security/advisories/VMSA-2014-0012.html","refsource":"CONFIRM","url":"http://www.vmware.com/security/advisories/VMSA-2014-0012.html"},{"name":"59589","refsource":"SECUNIA","url":"http://secunia.com/advisories/59589"},{"name":"59894","refsource":"SECUNIA","url":"http://secunia.com/advisories/59894"},{"name":"59325","refsource":"SECUNIA","url":"http://secunia.com/advisories/59325"},{"name":"59354","refsource":"SECUNIA","url":"http://secunia.com/advisories/59354"},{"name":"http://www-01.ibm.com/support/docview.wss?uid=swg24037729","refsource":"CONFIRM","url":"http://www-01.ibm.com/support/docview.wss?uid=swg24037729"},{"name":"http://www-01.ibm.com/support/docview.wss?uid=swg21677131","refsource":"CONFIRM","url":"http://www-01.ibm.com/support/docview.wss?uid=swg21677131"},{"name":"HPSBUX03046","refsource":"HP","url":"http://marc.info/?l=bugtraq&m=140266410314613&w=2"},{"name":"61254","refsource":"SECUNIA","url":"http://secunia.com/advisories/61254"},{"name":"http://www-01.ibm.com/support/docview.wss?uid=swg21678233","refsource":"CONFIRM","url":"http://www-01.ibm.com/support/docview.wss?uid=swg21678233"},{"name":"59447","refsource":"SECUNIA","url":"http://secunia.com/advisories/59447"},{"name":"1031594","refsource":"SECTRACK","url":"http://www.securitytracker.com/id/1031594"},{"name":"http://www-01.ibm.com/support/docview.wss?uid=swg21676655","refsource":"CONFIRM","url":"http://www-01.ibm.com/support/docview.wss?uid=swg21676655"},{"name":"http://www14.software.ibm.com/webapp/set2/subscriptions/pqvcmjd?mode=18&ID=6061&myns=phmc&mync=E","refsource":"CONFIRM","url":"http://www14.software.ibm.com/webapp/set2/subscriptions/pqvcmjd?mode=18&ID=6061&myns=phmc&mync=E"},{"name":"59223","refsource":"SECUNIA","url":"http://secunia.com/advisories/59223"},{"name":"58743","refsource":"SECUNIA","url":"http://secunia.com/advisories/58743"},{"name":"http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html","refsource":"CONFIRM","url":"http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html"},{"name":"58719","refsource":"SECUNIA","url":"http://secunia.com/advisories/58719"},{"name":"59449","refsource":"SECUNIA","url":"http://secunia.com/advisories/59449"},{"name":"59132","refsource":"SECUNIA","url":"http://secunia.com/advisories/59132"},{"name":"SSRT101818","refsource":"HP","url":"http://marc.info/?l=bugtraq&m=142350350616251&w=2"},{"name":"http://www-01.ibm.com/support/docview.wss?uid=isg400001843","refsource":"CONFIRM","url":"http://www-01.ibm.com/support/docview.wss?uid=isg400001843"},{"name":"HPSBST03098","refsource":"HP","url":"http://marc.info/?l=bugtraq&m=140870499402361&w=2"},{"name":"HPSBMU03058","refsource":"HP","url":"http://marc.info/?l=bugtraq&m=140386311427810&w=2"},{"name":"59442","refsource":"SECUNIA","url":"http://secunia.com/advisories/59442"},{"name":"https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05301946","refsource":"CONFIRM","url":"https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05301946"},{"name":"HPSBOV03047","refsource":"HP","url":"http://marc.info/?l=bugtraq&m=140317760000786&w=2"},{"name":"HPSBST03195","refsource":"HP","url":"http://marc.info/?l=bugtraq&m=142805027510172&w=2"},{"name":"http://www-01.ibm.com/support/docview.wss?uid=swg21676879","refsource":"CONFIRM","url":"http://www-01.ibm.com/support/docview.wss?uid=swg21676879"},{"name":"http://www-01.ibm.com/support/docview.wss?uid=swg24037761","refsource":"CONFIRM","url":"http://www-01.ibm.com/support/docview.wss?uid=swg24037761"},{"name":"http://www-01.ibm.com/support/docview.wss?uid=swg21677828","refsource":"CONFIRM","url":"http://www-01.ibm.com/support/docview.wss?uid=swg21677828"},{"name":"59441","refsource":"SECUNIA","url":"http://secunia.com/advisories/59441"},{"name":"HPSBMU03074","refsource":"HP","url":"http://marc.info/?l=bugtraq&m=140621259019789&w=2"},{"name":"http://www.innominate.com/data/downloads/manuals/mdm_1.5.2.1_Release_Notes.pdf","refsource":"CONFIRM","url":"http://www.innominate.com/data/downloads/manuals/mdm_1.5.2.1_Release_Notes.pdf"},{"name":"HPSBMU03094","refsource":"HP","url":"http://marc.info/?l=bugtraq&m=140852757108392&w=2"},{"name":"https://filezilla-project.org/versions.php?type=server","refsource":"CONFIRM","url":"https://filezilla-project.org/versions.php?type=server"},{"name":"http://www-01.ibm.com/support/docview.wss?uid=swg21676786","refsource":"CONFIRM","url":"http://www-01.ibm.com/support/docview.wss?uid=swg21676786"},{"name":"60567","refsource":"SECUNIA","url":"http://secunia.com/advisories/60567"},{"name":"59189","refsource":"SECUNIA","url":"http://secunia.com/advisories/59189"},{"name":"59368","refsource":"SECUNIA","url":"http://secunia.com/advisories/59368"},{"name":"MDVSA-2014:106","refsource":"MANDRIVA","url":"http://www.mandriva.com/security/advisories?name=MDVSA-2014:106"},{"name":"59142","refsource":"SECUNIA","url":"http://secunia.com/advisories/59142"},{"name":"http://www-01.ibm.com/support/docview.wss?uid=swg21676478","refsource":"CONFIRM","url":"http://www-01.ibm.com/support/docview.wss?uid=swg21676478"},{"name":"http://www-01.ibm.com/support/docview.wss?uid=swg21676845","refsource":"CONFIRM","url":"http://www-01.ibm.com/support/docview.wss?uid=swg21676845"},{"name":"58742","refsource":"SECUNIA","url":"http://secunia.com/advisories/58742"},{"name":"https://www.ibm.com/support/docview.wss?uid=ssg1S1004670","refsource":"CONFIRM","url":"https://www.ibm.com/support/docview.wss?uid=ssg1S1004670"},{"name":"RHSA-2014:0624","refsource":"REDHAT","url":"http://rhn.redhat.com/errata/RHSA-2014-0624.html"},{"name":"59602","refsource":"SECUNIA","url":"http://secunia.com/advisories/59602"},{"name":"http://www.kerio.com/support/kerio-control/release-history","refsource":"CONFIRM","url":"http://www.kerio.com/support/kerio-control/release-history"},{"name":"59300","refsource":"SECUNIA","url":"http://secunia.com/advisories/59300"},{"name":"58930","refsource":"SECUNIA","url":"http://secunia.com/advisories/58930"},{"name":"http://www-01.ibm.com/support/docview.wss?uid=swg21677080","refsource":"CONFIRM","url":"http://www-01.ibm.com/support/docview.wss?uid=swg21677080"},{"name":"61815","refsource":"SECUNIA","url":"http://secunia.com/advisories/61815"},{"name":"58667","refsource":"SECUNIA","url":"http://secunia.com/advisories/58667"},{"name":"GLSA-201407-05","refsource":"GENTOO","url":"http://security.gentoo.org/glsa/glsa-201407-05.xml"},{"name":"http://www-01.ibm.com/support/docview.wss?uid=swg21677390","refsource":"CONFIRM","url":"http://www-01.ibm.com/support/docview.wss?uid=swg21677390"},{"name":"59191","refsource":"SECUNIA","url":"http://secunia.com/advisories/59191"},{"name":"59284","refsource":"SECUNIA","url":"http://secunia.com/advisories/59284"},{"name":"59444","refsource":"SECUNIA","url":"http://secunia.com/advisories/59444"},{"name":"https://www.imperialviolet.org/2014/06/05/earlyccs.html","refsource":"MISC","url":"https://www.imperialviolet.org/2014/06/05/earlyccs.html"},{"name":"http://www.ibm.com/support/docview.wss?uid=swg24037783","refsource":"CONFIRM","url":"http://www.ibm.com/support/docview.wss?uid=swg24037783"},{"name":"59365","refsource":"SECUNIA","url":"http://secunia.com/advisories/59365"},{"name":"http://www-01.ibm.com/support/docview.wss?uid=swg21677695","refsource":"CONFIRM","url":"http://www-01.ibm.com/support/docview.wss?uid=swg21677695"},{"name":"59305","refsource":"SECUNIA","url":"http://secunia.com/advisories/59305"},{"name":"http://www-01.ibm.com/support/docview.wss?uid=swg21676529","refsource":"CONFIRM","url":"http://www-01.ibm.com/support/docview.wss?uid=swg21676529"},{"name":"59483","refsource":"SECUNIA","url":"http://secunia.com/advisories/59483"},{"name":"58385","refsource":"SECUNIA","url":"http://secunia.com/advisories/58385"},{"name":"20141205 NEW: VMSA-2014-0012 - VMware vSphere product updates address security vulnerabilities","refsource":"BUGTRAQ","url":"http://www.securityfocus.com/archive/1/534161/100/0/threaded"},{"name":"59495","refsource":"SECUNIA","url":"http://secunia.com/advisories/59495"},{"name":"http://www-01.ibm.com/support/docview.wss?uid=nas8N1020163","refsource":"CONFIRM","url":"http://www-01.ibm.com/support/docview.wss?uid=nas8N1020163"},{"name":"http://www-01.ibm.com/support/docview.wss?uid=swg21676889","refsource":"CONFIRM","url":"http://www-01.ibm.com/support/docview.wss?uid=swg21676889"},{"name":"FEDORA-2014-9308","refsource":"FEDORA","url":"http://lists.fedoraproject.org/pipermail/package-announce/2014-August/136473.html"},{"name":"58945","refsource":"SECUNIA","url":"http://secunia.com/advisories/58945"},{"name":"http://www-01.ibm.com/support/docview.wss?uid=isg400001841","refsource":"CONFIRM","url":"http://www-01.ibm.com/support/docview.wss?uid=isg400001841"},{"name":"HPSBST03106","refsource":"HP","url":"http://marc.info/?l=bugtraq&m=141025641601169&w=2"},{"name":"59659","refsource":"SECUNIA","url":"http://secunia.com/advisories/59659"},{"name":"59440","refsource":"SECUNIA","url":"http://secunia.com/advisories/59440"},{"name":"openSUSE-SU-2016:0640","refsource":"SUSE","url":"http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00011.html"},{"name":"59429","refsource":"SECUNIA","url":"http://secunia.com/advisories/59429"},{"name":"http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html","refsource":"CONFIRM","url":"http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html"},{"name":"http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html","refsource":"CONFIRM","url":"http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html"},{"name":"59655","refsource":"SECUNIA","url":"http://secunia.com/advisories/59655"},{"name":"59370","refsource":"SECUNIA","url":"http://secunia.com/advisories/59370"},{"name":"59827","refsource":"SECUNIA","url":"http://secunia.com/advisories/59827"},{"name":"58660","refsource":"SECUNIA","url":"http://secunia.com/advisories/58660"},{"name":"59163","refsource":"SECUNIA","url":"http://secunia.com/advisories/59163"},{"name":"58716","refsource":"SECUNIA","url":"http://secunia.com/advisories/58716"},{"name":"59055","refsource":"SECUNIA","url":"http://secunia.com/advisories/59055"},{"name":"http://www-01.ibm.com/support/docview.wss?uid=swg21676071","refsource":"CONFIRM","url":"http://www-01.ibm.com/support/docview.wss?uid=swg21676071"},{"name":"http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=migr-5095737","refsource":"CONFIRM","url":"http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=migr-5095737"},{"name":"http://www-01.ibm.com/support/docview.wss?uid=swg21677836","refsource":"CONFIRM","url":"http://www-01.ibm.com/support/docview.wss?uid=swg21677836"},{"name":"59437","refsource":"SECUNIA","url":"http://secunia.com/advisories/59437"},{"name":"http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5095754","refsource":"CONFIRM","url":"http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5095754"},{"name":"60176","refsource":"SECUNIA","url":"http://secunia.com/advisories/60176"},{"name":"HPSBPI03107","refsource":"HP","url":"http://marc.info/?l=bugtraq&m=141147110427269&w=2"},{"name":"59101","refsource":"SECUNIA","url":"http://secunia.com/advisories/59101"},{"name":"http://esupport.trendmicro.com/solution/en-US/1103813.aspx","refsource":"CONFIRM","url":"http://esupport.trendmicro.com/solution/en-US/1103813.aspx"},{"name":"59374","refsource":"SECUNIA","url":"http://secunia.com/advisories/59374"},{"name":"59063","refsource":"SECUNIA","url":"http://secunia.com/advisories/59063"},{"name":"http://www.vmware.com/security/advisories/VMSA-2014-0006.html","refsource":"CONFIRM","url":"http://www.vmware.com/security/advisories/VMSA-2014-0006.html"},{"name":"https://discussions.nessus.org/thread/7517","refsource":"CONFIRM","url":"https://discussions.nessus.org/thread/7517"},{"name":"59310","refsource":"SECUNIA","url":"http://secunia.com/advisories/59310"},{"name":"http://www-01.ibm.com/support/docview.wss?uid=swg21676501","refsource":"CONFIRM","url":"http://www-01.ibm.com/support/docview.wss?uid=swg21676501"},{"name":"HPSBMU03216","refsource":"HP","url":"http://marc.info/?l=bugtraq&m=142350350616251&w=2"},{"name":"http://www-01.ibm.com/support/docview.wss?uid=swg21676536","refsource":"CONFIRM","url":"http://www-01.ibm.com/support/docview.wss?uid=swg21676536"},{"name":"http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html","refsource":"CONFIRM","url":"http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html"},{"name":"http://aix.software.ibm.com/aix/efixes/security/openssl_advisory9.asc","refsource":"CONFIRM","url":"http://aix.software.ibm.com/aix/efixes/security/openssl_advisory9.asc"},{"name":"IV61506","refsource":"AIXAPAR","url":"http://www-01.ibm.com/support/docview.wss?uid=swg1IV61506"},{"name":"59502","refsource":"SECUNIA","url":"http://secunia.com/advisories/59502"},{"name":"http://www.splunk.com/view/SP-CAAAM2D","refsource":"CONFIRM","url":"http://www.splunk.com/view/SP-CAAAM2D"},{"name":"59878","refsource":"SECUNIA","url":"http://secunia.com/advisories/59878"},{"name":"http://www.fortiguard.com/advisory/FG-IR-14-018/","refsource":"CONFIRM","url":"http://www.fortiguard.com/advisory/FG-IR-14-018/"},{"name":"SUSE-SU-2015:0743","refsource":"SUSE","url":"http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.html"},{"name":"HPSBMU03101","refsource":"HP","url":"http://marc.info/?l=bugtraq&m=140852826008699&w=2"},{"name":"http://www.ibm.com/support/docview.wss?uid=swg21676793","refsource":"CONFIRM","url":"http://www.ibm.com/support/docview.wss?uid=swg21676793"},{"name":"59214","refsource":"SECUNIA","url":"http://secunia.com/advisories/59214"},{"name":"http://www.ibm.com/support/docview.wss?uid=swg21676356","refsource":"CONFIRM","url":"http://www.ibm.com/support/docview.wss?uid=swg21676356"},{"name":"HPSBHF03088","refsource":"HP","url":"http://marc.info/?l=bugtraq&m=140794476212181&w=2"},{"name":"HPSBMU03057","refsource":"HP","url":"http://marc.info/?l=bugtraq&m=140389274407904&w=2"},{"name":"http://support.citrix.com/article/CTX140876","refsource":"CONFIRM","url":"http://support.citrix.com/article/CTX140876"},{"name":"59167","refsource":"SECUNIA","url":"http://secunia.com/advisories/59167"},{"name":"59120","refsource":"SECUNIA","url":"http://secunia.com/advisories/59120"},{"name":"http://www-01.ibm.com/support/docview.wss?uid=swg24037732","refsource":"CONFIRM","url":"http://www-01.ibm.com/support/docview.wss?uid=swg24037732"},{"name":"http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5095757","refsource":"CONFIRM","url":"http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5095757"},{"name":"http://www-01.ibm.com/support/docview.wss?uid=nas8N1020172","refsource":"CONFIRM","url":"http://www-01.ibm.com/support/docview.wss?uid=nas8N1020172"},{"name":"HPSBMU03053","refsource":"HP","url":"http://marc.info/?l=bugtraq&m=140369637402535&w=2"},{"name":"59380","refsource":"SECUNIA","url":"http://secunia.com/advisories/59380"},{"name":"MDVSA-2014:105","refsource":"MANDRIVA","url":"http://www.mandriva.com/security/advisories?name=MDVSA-2014:105"},{"name":"59460","refsource":"SECUNIA","url":"http://secunia.com/advisories/59460"},{"name":"59506","refsource":"SECUNIA","url":"http://secunia.com/advisories/59506"},{"name":"58939","refsource":"SECUNIA","url":"http://secunia.com/advisories/58939"},{"name":"SSRT101590","refsource":"HP","url":"http://marc.info/?l=bugtraq&m=140266410314613&w=2"},{"name":"59661","refsource":"SECUNIA","url":"http://secunia.com/advisories/59661"},{"name":"59514","refsource":"SECUNIA","url":"http://secunia.com/advisories/59514"},{"name":"59677","refsource":"SECUNIA","url":"http://secunia.com/advisories/59677"},{"name":"RHSA-2014:0630","refsource":"REDHAT","url":"http://rhn.redhat.com/errata/RHSA-2014-0630.html"},{"name":"20140605 Multiple Vulnerabilities in OpenSSL Affecting Cisco Products","refsource":"CISCO","url":"http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140605-openssl"},{"name":"http://kb.juniper.net/InfoCenter/index?page=content&id=KB29195","refsource":"CONFIRM","url":"http://kb.juniper.net/InfoCenter/index?page=content&id=KB29195"},{"name":"RHSA-2014:0632","refsource":"REDHAT","url":"http://rhn.redhat.com/errata/RHSA-2014-0632.html"},{"name":"http://www-01.ibm.com/support/docview.wss?uid=swg24037730","refsource":"CONFIRM","url":"http://www-01.ibm.com/support/docview.wss?uid=swg24037730"},{"name":"https://kc.mcafee.com/corporate/index?page=content&id=SB10075","refsource":"CONFIRM","url":"https://kc.mcafee.com/corporate/index?page=content&id=SB10075"},{"name":"http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html","refsource":"CONFIRM","url":"http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html"},{"name":"http://www-01.ibm.com/support/docview.wss?uid=swg24037731","refsource":"CONFIRM","url":"http://www-01.ibm.com/support/docview.wss?uid=swg24037731"},{"name":"58745","refsource":"SECUNIA","url":"http://secunia.com/advisories/58745"},{"name":"http://www-01.ibm.com/support/docview.wss?uid=swg21676419","refsource":"CONFIRM","url":"http://www-01.ibm.com/support/docview.wss?uid=swg21676419"},{"name":"59438","refsource":"SECUNIA","url":"http://secunia.com/advisories/59438"},{"name":"http://www.ibm.com/support/docview.wss?uid=isg3T1020948","refsource":"CONFIRM","url":"http://www.ibm.com/support/docview.wss?uid=isg3T1020948"},{"name":"http://www-01.ibm.com/support/docview.wss?uid=swg21676496","refsource":"CONFIRM","url":"http://www-01.ibm.com/support/docview.wss?uid=swg21676496"},{"name":"58714","refsource":"SECUNIA","url":"http://secunia.com/advisories/58714"},{"name":"HPSBGN03050","refsource":"HP","url":"http://marc.info/?l=bugtraq&m=140482916501310&w=2"},{"name":"openSUSE-SU-2015:0229","refsource":"SUSE","url":"http://lists.opensuse.org/opensuse-updates/2015-02/msg00030.html"},{"name":"http://ccsinjection.lepidum.co.jp","refsource":"MISC","url":"http://ccsinjection.lepidum.co.jp"},{"name":"59435","refsource":"SECUNIA","url":"http://secunia.com/advisories/59435"},{"name":"HPSBHF03052","refsource":"HP","url":"http://marc.info/?l=bugtraq&m=141658880509699&w=2"},{"name":"http://www.openssl.org/news/secadv_20140605.txt","refsource":"CONFIRM","url":"http://www.openssl.org/news/secadv_20140605.txt"},{"name":"58615","refsource":"SECUNIA","url":"http://secunia.com/advisories/58615"},{"name":"HPSBST03265","refsource":"HP","url":"http://marc.info/?l=bugtraq&m=142546741516006&w=2"},{"name":"20141205 NEW: VMSA-2014-0012 - VMware vSphere product updates address security vulnerabilities","refsource":"FULLDISC","url":"http://seclists.org/fulldisclosure/2014/Dec/23"},{"name":"http://www-01.ibm.com/support/docview.wss?uid=swg21676644","refsource":"CONFIRM","url":"http://www-01.ibm.com/support/docview.wss?uid=swg21676644"},{"name":"59231","refsource":"SECUNIA","url":"http://secunia.com/advisories/59231"},{"name":"https://www.ibm.com/support/docview.wss?uid=ssg1S1004671","refsource":"CONFIRM","url":"https://www.ibm.com/support/docview.wss?uid=ssg1S1004671"},{"name":"SUSE-SU-2015:0578","refsource":"SUSE","url":"http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00027.html"},{"name":"http://support.apple.com/kb/HT6443","refsource":"CONFIRM","url":"http://support.apple.com/kb/HT6443"},{"name":"59211","refsource":"SECUNIA","url":"http://secunia.com/advisories/59211"},{"name":"58433","refsource":"SECUNIA","url":"http://secunia.com/advisories/58433"},{"name":"60066","refsource":"SECUNIA","url":"http://secunia.com/advisories/60066"},{"name":"http://dev.mysql.com/doc/relnotes/workbench/en/wb-news-6-1-7.html","refsource":"CONFIRM","url":"http://dev.mysql.com/doc/relnotes/workbench/en/wb-news-6-1-7.html"},{"name":"https://access.redhat.com/site/blogs/766093/posts/908133","refsource":"CONFIRM","url":"https://access.redhat.com/site/blogs/766093/posts/908133"},{"name":"59301","refsource":"SECUNIA","url":"http://secunia.com/advisories/59301"},{"name":"60522","refsource":"SECUNIA","url":"http://secunia.com/advisories/60522"},{"name":"59784","refsource":"SECUNIA","url":"http://secunia.com/advisories/59784"},{"name":"https://kb.bluecoat.com/index?page=content&id=SA80","refsource":"CONFIRM","url":"https://kb.bluecoat.com/index?page=content&id=SA80"},{"name":"HPSBST03097","refsource":"HP","url":"http://marc.info/?l=bugtraq&m=141383410222440&w=2"},{"name":"20140607 Re: More OpenSSL issues","refsource":"FULLDISC","url":"http://seclists.org/fulldisclosure/2014/Jun/38"},{"name":"HPSBMU03076","refsource":"HP","url":"http://marc.info/?l=bugtraq&m=140904544427729&w=2"},{"name":"http://www.f-secure.com/en/web/labs_global/fsc-2014-6","refsource":"CONFIRM","url":"http://www.f-secure.com/en/web/labs_global/fsc-2014-6"},{"name":"59135","refsource":"SECUNIA","url":"http://secunia.com/advisories/59135"},{"name":"http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10629","refsource":"CONFIRM","url":"http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10629"},{"name":"http://www-01.ibm.com/support/docview.wss?uid=swg21678167","refsource":"CONFIRM","url":"http://www-01.ibm.com/support/docview.wss?uid=swg21678167"},{"name":"58759","refsource":"SECUNIA","url":"http://secunia.com/advisories/58759"},{"name":"59093","refsource":"SECUNIA","url":"http://secunia.com/advisories/59093"},{"name":"http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5095740","refsource":"CONFIRM","url":"http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5095740"},{"name":"http://puppetlabs.com/security/cve/cve-2014-0224","refsource":"CONFIRM","url":"http://puppetlabs.com/security/cve/cve-2014-0224"},{"name":"59192","refsource":"SECUNIA","url":"http://secunia.com/advisories/59192"},{"name":"FEDORA-2014-9301","refsource":"FEDORA","url":"http://lists.fedoraproject.org/pipermail/package-announce/2014-August/136470.html"},{"name":"HPSBMU03062","refsource":"HP","url":"http://marc.info/?l=bugtraq&m=140752315422991&w=2"},{"name":"58579","refsource":"SECUNIA","url":"http://secunia.com/advisories/58579"},{"name":"https://www.intersectalliance.com/wp-content/uploads/release_notes/ReleaseNotes_for_SNARE_for_MSSQL.pdf","refsource":"CONFIRM","url":"https://www.intersectalliance.com/wp-content/uploads/release_notes/ReleaseNotes_for_SNARE_for_MSSQL.pdf"},{"name":"59040","refsource":"SECUNIA","url":"http://secunia.com/advisories/59040"},{"name":"HPSBMU03056","refsource":"HP","url":"http://marc.info/?l=bugtraq&m=140389355508263&w=2"},{"name":"59175","refsource":"SECUNIA","url":"http://secunia.com/advisories/59175"},{"name":"60819","refsource":"SECUNIA","url":"http://secunia.com/advisories/60819"},{"name":"HPSBMU03051","refsource":"HP","url":"http://marc.info/?l=bugtraq&m=140448122410568&w=2"},{"name":"59666","refsource":"SECUNIA","url":"http://secunia.com/advisories/59666"},{"name":"http://www.tenable.com/blog/nessus-527-and-pvs-403-are-available-for-download","refsource":"CONFIRM","url":"http://www.tenable.com/blog/nessus-527-and-pvs-403-are-available-for-download"},{"name":"58128","refsource":"SECUNIA","url":"http://secunia.com/advisories/58128"},{"name":"HPSBMU03055","refsource":"HP","url":"http://marc.info/?l=bugtraq&m=140431828824371&w=2"},{"name":"59413","refsource":"SECUNIA","url":"http://secunia.com/advisories/59413"},{"name":"http://www-01.ibm.com/support/docview.wss?uid=swg21676334","refsource":"CONFIRM","url":"http://www-01.ibm.com/support/docview.wss?uid=swg21676334"},{"name":"http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html","refsource":"CONFIRM","url":"http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html"},{"name":"http://www-01.ibm.com/support/docview.wss?uid=swg21675821","refsource":"CONFIRM","url":"http://www-01.ibm.com/support/docview.wss?uid=swg21675821"},{"name":"http://www-01.ibm.com/support/docview.wss?uid=swg24037870","refsource":"CONFIRM","url":"http://www-01.ibm.com/support/docview.wss?uid=swg24037870"},{"name":"59721","refsource":"SECUNIA","url":"http://secunia.com/advisories/59721"},{"name":"HPSBHF03145","refsource":"HP","url":"http://marc.info/?l=bugtraq&m=141383465822787&w=2"},{"name":"http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5095756","refsource":"CONFIRM","url":"http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5095756"},{"name":"RHSA-2014:0680","refsource":"REDHAT","url":"http://rhn.redhat.com/errata/RHSA-2014-0680.html"},{"name":"http://www-01.ibm.com/support/docview.wss?uid=swg21676062","refsource":"CONFIRM","url":"http://www-01.ibm.com/support/docview.wss?uid=swg21676062"},{"name":"59012","refsource":"SECUNIA","url":"http://secunia.com/advisories/59012"},{"name":"58713","refsource":"SECUNIA","url":"http://secunia.com/advisories/58713"},{"name":"http://www-01.ibm.com/support/docview.wss?uid=swg21673137","refsource":"CONFIRM","url":"http://www-01.ibm.com/support/docview.wss?uid=swg21673137"},{"name":"59362","refsource":"SECUNIA","url":"http://secunia.com/advisories/59362"},{"name":"MDVSA-2015:062","refsource":"MANDRIVA","url":"http://www.mandriva.com/security/advisories?name=MDVSA-2015:062"},{"name":"http://www-01.ibm.com/support/docview.wss?uid=swg21676035","refsource":"CONFIRM","url":"http://www-01.ibm.com/support/docview.wss?uid=swg21676035"},{"name":"HPSBMU03070","refsource":"HP","url":"http://marc.info/?l=bugtraq&m=140499864129699&w=2"},{"name":"RHSA-2014:0631","refsource":"REDHAT","url":"http://rhn.redhat.com/errata/RHSA-2014-0631.html"},{"name":"59338","refsource":"SECUNIA","url":"http://secunia.com/advisories/59338"},{"name":"59450","refsource":"SECUNIA","url":"http://secunia.com/advisories/59450"},{"name":"http://linux.oracle.com/errata/ELSA-2014-1053.html","refsource":"CONFIRM","url":"http://linux.oracle.com/errata/ELSA-2014-1053.html"},{"name":"http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html","refsource":"CONFIRM","url":"http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html"},{"name":"VU#978508","refsource":"CERT-VN","url":"http://www.kb.cert.org/vuls/id/978508"},{"name":"1031032","refsource":"SECTRACK","url":"http://www.securitytracker.com/id/1031032"},{"name":"59287","refsource":"SECUNIA","url":"http://secunia.com/advisories/59287"},{"name":"https://blogs.oracle.com/sunsecurity/entry/cve_2014_0224_cryptographic_issues1","refsource":"CONFIRM","url":"https://blogs.oracle.com/sunsecurity/entry/cve_2014_0224_cryptographic_issues1"},{"name":"http://www-01.ibm.com/support/docview.wss?uid=swg21683332","refsource":"CONFIRM","url":"http://www-01.ibm.com/support/docview.wss?uid=swg21683332"},{"name":"59491","refsource":"SECUNIA","url":"http://secunia.com/advisories/59491"},{"name":"59364","refsource":"SECUNIA","url":"http://secunia.com/advisories/59364"},{"name":"https://blogs.oracle.com/sunsecurity/entry/cve_2014_0224_cryptographic_issues","refsource":"CONFIRM","url":"https://blogs.oracle.com/sunsecurity/entry/cve_2014_0224_cryptographic_issues"},{"name":"59451","refsource":"SECUNIA","url":"http://secunia.com/advisories/59451"},{"name":"58977","refsource":"SECUNIA","url":"http://secunia.com/advisories/58977"},{"name":"https://www.novell.com/support/kb/doc.php?id=7015271","refsource":"CONFIRM","url":"https://www.novell.com/support/kb/doc.php?id=7015271"},{"name":"http://www-01.ibm.com/support/docview.wss?uid=swg21676333","refsource":"CONFIRM","url":"http://www-01.ibm.com/support/docview.wss?uid=swg21676333"},{"name":"60571","refsource":"SECUNIA","url":"http://secunia.com/advisories/60571"},{"name":"59459","refsource":"SECUNIA","url":"http://secunia.com/advisories/59459"},{"name":"http://www-01.ibm.com/support/docview.wss?uid=swg21676833","refsource":"CONFIRM","url":"http://www-01.ibm.com/support/docview.wss?uid=swg21676833"},{"name":"60577","refsource":"SECUNIA","url":"http://secunia.com/advisories/60577"},{"name":"59448","refsource":"SECUNIA","url":"http://secunia.com/advisories/59448"},{"name":"https://git.openssl.org/gitweb/?p=openssl.git;a=commit;h=bc8923b1ec9c467755cd86f7848c50ee8812e441","refsource":"CONFIRM","url":"https://git.openssl.org/gitweb/?p=openssl.git;a=commit;h=bc8923b1ec9c467755cd86f7848c50ee8812e441"},{"name":"https://www.intersectalliance.com/wp-content/uploads/release_notes/ReleaseNotes_for_Snare_for_Windows.pdf","refsource":"CONFIRM","url":"https://www.intersectalliance.com/wp-content/uploads/release_notes/ReleaseNotes_for_Snare_for_Windows.pdf"},{"name":"http://www.blackberry.com/btsc/KB36051","refsource":"CONFIRM","url":"http://www.blackberry.com/btsc/KB36051"},{"name":"http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5095755","refsource":"CONFIRM","url":"http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5095755"},{"name":"http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-345106.htm","refsource":"CONFIRM","url":"http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-345106.htm"},{"name":"HPSBST03103","refsource":"HP","url":"http://marc.info/?l=bugtraq&m=141164638606214&w=2"},{"name":"http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004690","refsource":"CONFIRM","url":"http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004690"},{"name":"59885","refsource":"SECUNIA","url":"http://secunia.com/advisories/59885"},{"name":"http://www-01.ibm.com/support/docview.wss?uid=swg21677527","refsource":"CONFIRM","url":"http://www-01.ibm.com/support/docview.wss?uid=swg21677527"},{"name":"59202","refsource":"SECUNIA","url":"http://secunia.com/advisories/59202"},{"name":"RHSA-2014:0633","refsource":"REDHAT","url":"http://rhn.redhat.com/errata/RHSA-2014-0633.html"},{"name":"http://www.ibm.com/support/docview.wss?uid=ssg1S1004678","refsource":"CONFIRM","url":"http://www.ibm.com/support/docview.wss?uid=ssg1S1004678"},{"name":"59375","refsource":"SECUNIA","url":"http://secunia.com/advisories/59375"},{"name":"HPSBMU03083","refsource":"HP","url":"http://marc.info/?l=bugtraq&m=140983229106599&w=2"},{"name":"59528","refsource":"SECUNIA","url":"http://secunia.com/advisories/59528"},{"name":"58337","refsource":"SECUNIA","url":"http://secunia.com/advisories/58337"},{"name":"59518","refsource":"SECUNIA","url":"http://secunia.com/advisories/59518"},{"name":"59389","refsource":"SECUNIA","url":"http://secunia.com/advisories/59389"},{"name":"59162","refsource":"SECUNIA","url":"http://secunia.com/advisories/59162"},{"name":"59383","refsource":"SECUNIA","url":"http://secunia.com/advisories/59383"},{"name":"http://www-01.ibm.com/support/docview.wss?uid=swg21677567","refsource":"CONFIRM","url":"http://www-01.ibm.com/support/docview.wss?uid=swg21677567"},{"name":"http://kb.juniper.net/InfoCenter/index?page=content&id=KB29217","refsource":"CONFIRM","url":"http://kb.juniper.net/InfoCenter/index?page=content&id=KB29217"},{"name":"59490","refsource":"SECUNIA","url":"http://secunia.com/advisories/59490"},{"name":"59916","refsource":"SECUNIA","url":"http://secunia.com/advisories/59916"},{"name":"http://www14.software.ibm.com/webapp/set2/subscriptions/pqvcmjd?mode=18&ID=6060&myns=phmc&mync=E","refsource":"CONFIRM","url":"http://www14.software.ibm.com/webapp/set2/subscriptions/pqvcmjd?mode=18&ID=6060&myns=phmc&mync=E"},{"name":"HPSBMU03065","refsource":"HP","url":"http://marc.info/?l=bugtraq&m=140491231331543&w=2"},{"name":"http://www-01.ibm.com/support/docview.wss?uid=swg24037727","refsource":"CONFIRM","url":"http://www-01.ibm.com/support/docview.wss?uid=swg24037727"},{"name":"IT02314","refsource":"AIXAPAR","url":"http://www.ibm.com/support/docview.wss?uid=swg1IT02314"},{"name":"59043","refsource":"SECUNIA","url":"http://secunia.com/advisories/59043"},{"name":"59347","refsource":"SECUNIA","url":"http://secunia.com/advisories/59347"},{"name":"60049","refsource":"SECUNIA","url":"http://secunia.com/advisories/60049"},{"name":"http://www-01.ibm.com/support/docview.wss?uid=swg21676615","refsource":"CONFIRM","url":"http://www-01.ibm.com/support/docview.wss?uid=swg21676615"},{"refsource":"CONFIRM","name":"https://cert-portal.siemens.com/productcert/pdf/ssa-234763.pdf","url":"https://cert-portal.siemens.com/productcert/pdf/ssa-234763.pdf"},{"refsource":"MISC","name":"https://www.arista.com/en/support/advisories-notices/security-advisories/941-security-advisory-0005","url":"https://www.arista.com/en/support/advisories-notices/security-advisories/941-security-advisory-0005"}]}},"nvd":{"publishedDate":"2014-06-05 21:55:00","lastModifiedDate":"2023-11-07 02:18:00","problem_types":["CWE-326"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N","attackVector":"NETWORK","attackComplexity":"HIGH","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"NONE","baseScore":7.4,"baseSeverity":"HIGH"},"exploitabilityScore":2.2,"impactScore":5.2},"baseMetricV2":{"cvssV2":{"version":"2.0","vectorString":"AV:N/AC:M/Au:N/C:P/I:P/A:N","accessVector":"NETWORK","accessComplexity":"MEDIUM","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"NONE","baseScore":5.8},"severity":"MEDIUM","exploitabilityScore":8.6,"impactScore":4.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:openssl:openssl:*:*:*:*:*:*:*:*","versionStartIncluding":"1.0.0","versionEndExcluding":"1.0.0m","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:openssl:openssl:*:*:*:*:*:*:*:*","versionStartIncluding":"1.0.1","versionEndExcluding":"1.0.1h","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:openssl:openssl:*:*:*:*:*:*:*:*","versionEndExcluding":"0.9.8za","cpe_name":[]}]},{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:redhat:jboss_enterprise_web_platform:5.2.0:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:redhat:storage:2.1:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:redhat:enterprise_linux:4:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:redhat:enterprise_linux:5:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:redhat:jboss_enterprise_web_server:2.0.1:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:redhat:jboss_enterprise_application_platform:5.2.0:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:fedoraproject:fedora:20:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:redhat:jboss_enterprise_application_platform:6.2.3:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:fedoraproject:fedora:19:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*","cpe_name":[]}]},{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:filezilla-project:filezilla_server:*:*:*:*:*:*:*:*","versionEndExcluding":"0.9.45","cpe_name":[]}]},{"operator":"AND","children":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:siemens:application_processing_engine_firmware:*:*:*:*:*:*:*:*","versionEndExcluding":"2.0.2","cpe_name":[]}]},{"operator":"OR","children":[],"cpe_match":[{"vulnerable":false,"cpe23Uri":"cpe:2.3:h:siemens:application_processing_engine:-:*:*:*:*:*:*:*","cpe_name":[]}]}],"cpe_match":[]},{"operator":"AND","children":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:siemens:cp1543-1_firmware:*:*:*:*:*:*:*:*","versionEndExcluding":"1.1.25","cpe_name":[]}]},{"operator":"OR","children":[],"cpe_match":[{"vulnerable":false,"cpe23Uri":"cpe:2.3:h:siemens:cp1543-1:-:*:*:*:*:*:*:*","cpe_name":[]}]}],"cpe_match":[]},{"operator":"AND","children":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:siemens:s7-1500_firmware:*:*:*:*:*:*:*:*","versionEndExcluding":"1.6","cpe_name":[]}]},{"operator":"OR","children":[],"cpe_match":[{"vulnerable":false,"cpe23Uri":"cpe:2.3:h:siemens:s7-1500:-:*:*:*:*:*:*:*","cpe_name":[]}]}],"cpe_match":[]},{"operator":"AND","children":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:siemens:rox_firmware:*:*:*:*:*:*:*:*","versionEndExcluding":"1.16.1","cpe_name":[]}]},{"operator":"OR","children":[],"cpe_match":[{"vulnerable":false,"cpe23Uri":"cpe:2.3:h:siemens:rox:-:*:*:*:*:*:*:*","cpe_name":[]}]}],"cpe_match":[]},{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*","versionStartIncluding":"10.0.0","versionEndExcluding":"10.0.13","cpe_name":[]}]},{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:python:python:*:*:*:*:*:*:*:*","versionStartIncluding":"3.4.0","versionEndExcluding":"3.4.2","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:python:python:*:*:*:*:*:*:*:*","versionStartIncluding":"2.7.0","versionEndExcluding":"2.7.8","cpe_name":[]}]},{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:nodejs:node.js:*:*:*:*:*:*:*:*","versionEndExcluding":"0.10.29","cpe_name":[]}]}]}},"legacy_mitre":{"record":{"CveYear":"2014","CveId":"224","Ordinal":"66857","Title":"CVE-2014-0224","CVE":"CVE-2014-0224","Year":"2014"},"notes":[{"CveYear":"2014","CveId":"224","Ordinal":"1","NoteData":"OpenSSL before 0.9.8za, 1.0.0 before 1.0.0m, and 1.0.1 before 1.0.1h does not properly restrict processing of ChangeCipherSpec messages, which allows man-in-the-middle attackers to trigger use of a zero-length master key in certain OpenSSL-to-OpenSSL communications, and consequently hijack sessions or obtain sensitive information, via a crafted TLS handshake, aka the \"CCS Injection\" vulnerability.","Type":"Description","Title":null},{"CveYear":"2014","CveId":"224","Ordinal":"2","NoteData":"2014-06-05","Type":"Other","Title":"Published"},{"CveYear":"2014","CveId":"224","Ordinal":"3","NoteData":"2021-11-05","Type":"Other","Title":"Modified"}]}}}