{"api_version":"1","generated_at":"2026-04-22T23:30:54+00:00","cve":"CVE-2014-3566","urls":{"html":"https://cve.report/CVE-2014-3566","api":"https://cve.report/api/cve/CVE-2014-3566.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2014-3566","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2014-3566"},"summary":{"title":"CVE-2014-3566","description":"The SSL protocol 3.0, as used in OpenSSL through 1.0.1i and other products, uses nondeterministic CBC padding, which makes it easier for man-in-the-middle attackers to obtain cleartext data via a padding-oracle attack, aka the \"POODLE\" issue.","state":"PUBLIC","assigner":"secalert@redhat.com","published_at":"2014-10-15 00:55:00","updated_at":"2023-09-12 14:55:00"},"problem_types":["CWE-310"],"metrics":[],"references":[{"url":"http://www.us-cert.gov/ncas/alerts/TA14-290A","name":"TA14-290A","refsource":"CERT","tags":["Third Party Advisory","US Government Resource"],"title":"SSL 3.0 Protocol Vulnerability and POODLE Attack | US-CERT","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html","name":"http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html","refsource":"CONFIRM","tags":["Third Party Advisory"],"title":"Oracle Solaris Bulletin - April 2016","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://marc.info/?l=bugtraq&m=142660345230545&w=2","name":"SSRT101846","refsource":"HP","tags":["Third Party Advisory"],"title":"'[security bulletin] HPSBHF03293 rev.1 - HP Virtual Connect 8Gb 24-Port FC Module running OpenSSL and' - MARC","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html","name":"http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html","refsource":"CONFIRM","tags":["Patch","Third Party Advisory"],"title":"Oracle Critical Patch Update Advisory - April 2016","mime":"text/html","httpstatus":"200","archivestatus":"0"},{"url":"http://www.securitytracker.com/id/1031088","name":"1031088","refsource":"SECTRACK","tags":["Third Party Advisory","VDB Entry"],"title":"Cisco CSS 11500 Series Content Security Switch SSL 3.0 Protocol Downgrade Flaw Lets Remote Users Decrypt SSL Traffic - SecurityTracker","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://rhn.redhat.com/errata/RHSA-2014-1652.html","name":"RHSA-2014:1652","refsource":"REDHAT","tags":["Third Party Advisory"],"title":"Red Hat Customer Portal","mime":"text/html","httpstatus":"-1","archivestatus":"200"},{"url":"https://kc.mcafee.com/corporate/index?page=content&id=SB10091","name":"https://kc.mcafee.com/corporate/index?page=content&id=SB10091","refsource":"CONFIRM","tags":["Third Party Advisory"],"title":"McAfee KnowledgeBase - McAfee Security Bulletin - Three SSLv3 Vulnerabilities","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html","name":"http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html","refsource":"CONFIRM","tags":["Third Party Advisory"],"title":"Oracle Bulletin Board Update - January 2015","mime":"text/html","httpstatus":"-1","archivestatus":"200"},{"url":"https://access.redhat.com/errata/RHSA-2015:0012","name":"https://access.redhat.com/errata/RHSA-2015:0012","refsource":"MISC","tags":[],"title":"Red Hat Customer Portal - Access to 24x7 support and knowledge","mime":"text/html","httpstatus":"404","archivestatus":"404"},{"url":"http://marc.info/?l=bugtraq&m=142624590206005&w=2","name":"HPSBMU03267","refsource":"HP","tags":["Third Party Advisory"],"title":"'[security bulletin] HPSBMU03267 rev.1 - HP Matrix Operating Environment and HP CloudSystem Matrix ru' - MARC","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://lists.opensuse.org/opensuse-security-announce/2014-11/msg00021.html","name":"SUSE-SU-2014:1526","refsource":"SUSE","tags":["Third Party Advisory"],"title":"[security-announce] SUSE-SU-2014:1526-1: important: Security update for","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.debian.org/security/2015/dsa-3147","name":"DSA-3147","refsource":"DEBIAN","tags":["Third Party Advisory"],"title":"Debian -- Security Information -- DSA-3147-1 openjdk-6","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://secunia.com/advisories/61316","name":"61316","refsource":"SECUNIA","tags":["Third Party Advisory"],"title":"About Secunia Research | Flexera","mime":"text/plain","httpstatus":"200","archivestatus":"200"},{"url":"http://secunia.com/advisories/60792","name":"60792","refsource":"SECUNIA","tags":["Third Party Advisory"],"title":"About Secunia Research | Flexera","mime":"text/plain","httpstatus":"200","archivestatus":"200"},{"url":"http://rhn.redhat.com/errata/RHSA-2014-1876.html","name":"RHSA-2014:1876","refsource":"REDHAT","tags":["Third Party Advisory"],"title":"Red Hat Customer Portal","mime":"text/html","httpstatus":"-1","archivestatus":"200"},{"url":"http://secunia.com/advisories/61827","name":"61827","refsource":"SECUNIA","tags":["Third Party Advisory"],"title":"About Secunia Research | Flexera","mime":"text/plain","httpstatus":"200","archivestatus":"200"},{"url":"http://marc.info/?l=bugtraq&m=143290437727362&w=2","name":"HPSBMU03263","refsource":"HP","tags":["Third Party Advisory"],"title":"'[security bulletin] HPSBMU03263 rev.3 - HP Insight Control running OpenSSL, Remote Disclosure of Inf' - MARC","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://advisories.mageia.org/MGASA-2014-0416.html","name":"http://advisories.mageia.org/MGASA-2014-0416.html","refsource":"CONFIRM","tags":["Third Party Advisory"],"title":"Mageia Advisory: MGASA-2014-0416 - Updated openssl packages fix security vulnerabilities","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://blog.mozilla.org/security/2014/10/14/the-poodle-attack-and-the-end-of-ssl-3-0/","name":"https://blog.mozilla.org/security/2014/10/14/the-poodle-attack-and-the-end-of-ssl-3-0/","refsource":"CONFIRM","tags":["Third Party Advisory"],"title":"The POODLE Attack and the End of SSL 3.0 | Mozilla Security Blog","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://access.redhat.com/errata/RHSA-2015:1545","name":"https://access.redhat.com/errata/RHSA-2015:1545","refsource":"MISC","tags":[],"title":"Red Hat Customer Portal","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://h20564.www2.hp.com/hpsc/doc/public/display?docId=emr_na-c04583581","name":"HPSBUX03281","refsource":"HP","tags":["Third Party Advisory"],"title":"HP Support document - HP Support Center","mime":"text/html","httpstatus":"-1","archivestatus":"200"},{"url":"http://rhn.redhat.com/errata/RHSA-2014-1948.html","name":"RHSA-2014:1948","refsource":"REDHAT","tags":["Third Party Advisory"],"title":"Red Hat Customer Portal","mime":"text/html","httpstatus":"-1","archivestatus":"200"},{"url":"http://www.securitytracker.com/id/1031091","name":"1031091","refsource":"SECTRACK","tags":["Third Party Advisory","VDB Entry"],"title":"Cisco Intrusion Prevention System SSL 3.0 Protocol Downgrade Flaw Lets Remote Users Decrypt SSL Traffic - SecurityTracker","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://secunia.com/advisories/61810","name":"61810","refsource":"SECUNIA","tags":["Third Party Advisory"],"title":"About Secunia Research | Flexera","mime":"text/plain","httpstatus":"200","archivestatus":"200"},{"url":"http://www.securitytracker.com/id/1031085","name":"1031085","refsource":"SECTRACK","tags":["Third Party Advisory","VDB Entry"],"title":"Cisco AnyConnect Secure Mobility Client SSL 3.0 Protocol Downgrade Flaw Lets Remote Users Decrypt SSL Traffic - SecurityTracker","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://marc.info/?l=bugtraq&m=141577087123040&w=2","name":"HPSBMU03184","refsource":"HP","tags":["Third Party Advisory"],"title":"'[security bulletin] HPSBMU03184 rev.1 - HP SiteScope running SSL, Remote Disclosure of Information' - MARC","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.mandriva.com/security/advisories?name=MDVSA-2014:203","name":"MDVSA-2014:203","refsource":"MANDRIVA","tags":["Third Party Advisory"],"title":"Support / Security / Advisories /  / MDVSA-2014:203 | Mandriva","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://marc.info/?l=bugtraq&m=141620103726640&w=2","name":"HPSBGN03192","refsource":"HP","tags":["Third Party Advisory"],"title":"'[security bulletin] HPSBGN03192 rev.1 - HP Remote Device Access: Instant Customer Access Server (iCA' - MARC","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://support.apple.com/HT205217","name":"https://support.apple.com/HT205217","refsource":"CONFIRM","tags":["Vendor Advisory"],"title":"About the security content of Xcode 7.0 - Apple Support","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html","name":"http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html","refsource":"CONFIRM","tags":["Patch","Third Party Advisory"],"title":"Oracle Critical Patch Update - July 2016","mime":"text/html","httpstatus":"200","archivestatus":"0"},{"url":"https://access.redhat.com/errata/RHSA-2014:1881","name":"https://access.redhat.com/errata/RHSA-2014:1881","refsource":"MISC","tags":[],"title":"Red Hat Customer Portal","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.debian.org/security/2015/dsa-3253","name":"DSA-3253","refsource":"DEBIAN","tags":["Third Party Advisory"],"title":"Debian -- Security Information -- DSA-3253-1 pound","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://rhn.redhat.com/errata/RHSA-2015-1546.html","name":"RHSA-2015:1546","refsource":"REDHAT","tags":["Third Party Advisory"],"title":"Red Hat Customer Portal","mime":"text/html","httpstatus":"-1","archivestatus":"200"},{"url":"http://marc.info/?l=bugtraq&m=141814011518700&w=2","name":"SSRT101838","refsource":"HP","tags":["Third Party Advisory"],"title":"'[security bulletin] HPSBGN03208 rev.1 - HP Cloud Service Automation running SSLv3, Remote Disclosure' - MARC","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://support.lenovo.com/us/en/product_security/poodle","name":"https://support.lenovo.com/us/en/product_security/poodle","refsource":"CONFIRM","tags":["Third Party Advisory"],"title":"POODLE: SSLv3 Vulnerability - Lenovo Support (US)","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://access.redhat.com/errata/RHSA-2014:1920","name":"https://access.redhat.com/errata/RHSA-2014:1920","refsource":"MISC","tags":[],"title":"Red Hat Customer Portal - Access to 24x7 support and knowledge","mime":"text/html","httpstatus":"404","archivestatus":"404"},{"url":"http://marc.info/?l=bugtraq&m=142805027510172&w=2","name":"HPSBST03195","refsource":"HP","tags":["Third Party Advisory"],"title":"'[security bulletin] HPSBST03195 rev.1 - HP 3PAR Service Processor (SP) running OpenSSL and Bash, Rem' - MARC","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www1.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-405500.htm","name":"http://www1.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-405500.htm","refsource":"CONFIRM","tags":["Third Party Advisory"],"title":"Security Advisory-SSLv3 POODLE Vulnerability in Huawei Products -  Huawei PSIRT","mime":"text/html","httpstatus":"-1","archivestatus":"200"},{"url":"https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05068681","name":"https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05068681","refsource":"CONFIRM","tags":["Third Party Advisory"],"title":"HPE Support document - HPE Support Center","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05157667","name":"https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05157667","refsource":"CONFIRM","tags":["Third Party Advisory"],"title":"HPE Support document - HPE Support Center","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.securitytracker.com/id/1031092","name":"1031092","refsource":"SECTRACK","tags":["Third Party Advisory","VDB Entry"],"title":"Cisco Prime Security Manager SSL 3.0 Protocol Downgrade Flaw Lets Remote Users Decrypt SSL Traffic - SecurityTracker","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://googleonlinesecurity.blogspot.com/2014/10/this-poodle-bites-exploiting-ssl-30.html","name":"http://googleonlinesecurity.blogspot.com/2014/10/this-poodle-bites-exploiting-ssl-30.html","refsource":"MISC","tags":["Third Party Advisory"],"title":"Google Online Security Blog: This POODLE bites: exploiting the SSL 3.0 fallback","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.securitytracker.com/id/1031086","name":"1031086","refsource":"SECTRACK","tags":["Third Party Advisory","VDB Entry"],"title":"Cisco Wireless LAN Controller SSL 3.0 Protocol Downgrade Flaw Lets Remote Users Decrypt SSL Traffic - SecurityTracker","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://access.redhat.com/security/cve/CVE-2014-3566","name":"https://access.redhat.com/security/cve/CVE-2014-3566","refsource":"MISC","tags":[],"title":"access.redhat.com | CVE-2014-3566","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.securityfocus.com/bid/70574","name":"70574","refsource":"BID","tags":["Third Party Advisory","VDB Entry"],"title":"OpenSSL CVE-2014-3566 Man In The Middle Information Disclosure Vulnerability","mime":"text/html","httpstatus":"200","archivestatus":"0"},{"url":"http://rhn.redhat.com/errata/RHSA-2015-0086.html","name":"RHSA-2015:0086","refsource":"REDHAT","tags":["Third Party Advisory"],"title":"Red Hat Customer Portal","mime":"text/html","httpstatus":"-1","archivestatus":"200"},{"url":"https://lists.apache.org/thread.html/rc774278135816e7afc943dc9fc78eb0764f2c84a2b96470a0187315c@%3Ccommits.cxf.apache.org%3E","name":"[cxf-commits] 20200116 svn commit: r1055336 - in /websites/production/cxf/content: cache/main.pageCache security-advisories.data/CVE-2019-12423.txt.asc security-advisories.data/CVE-2019-17573.txt.asc security-advisories.html","refsource":"MLIST","tags":["Third Party Advisory"],"title":"Pony Mail!","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://marc.info/?l=bugtraq&m=142350298616097&w=2","name":"SSRT101898","refsource":"HP","tags":["Third Party Advisory"],"title":"'[security bulletin] HPSBGN03254 rev.1 - HP Service Health Analyzer running SSLv3, Remote Disclosure ' - MARC","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://access.redhat.com/errata/RHSA-2014:1880","name":"https://access.redhat.com/errata/RHSA-2014:1880","refsource":"MISC","tags":[],"title":"Red Hat Customer Portal","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://support.apple.com/kb/HT6535","name":"https://support.apple.com/kb/HT6535","refsource":"CONFIRM","tags":["Vendor Advisory"],"title":"About the security content of OS X Yosemite v10.10 - Apple Support","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.securitytracker.com/id/1031039","name":"1031039","refsource":"SECTRACK","tags":["Third Party Advisory","VDB Entry"],"title":"Microsoft Windows SSL 3.0 Protocol Downgrade Flaw Lets Remote Users Decrypt SSL Traffic - SecurityTracker","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://www.arista.com/en/support/advisories-notices/security-advisories/1015-security-advisory-7","name":"https://www.arista.com/en/support/advisories-notices/security-advisories/1015-security-advisory-7","refsource":"MISC","tags":[],"title":"Arista - Security Advisory 0007","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://marc.info/?l=bugtraq&m=142740155824959&w=2","name":"SSRT101795","refsource":"HP","tags":["Third Party Advisory"],"title":"'[security bulletin] HPSBMU03294 rev.1 - HP Process Automation running OpenSSL, Remote Disclosure of ' - MARC","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.websense.com/support/article/kbarticle/Vulnerabilities-resolved-in-TRITON-APX-Version-8-0","name":"http://www.websense.com/support/article/kbarticle/Vulnerabilities-resolved-in-TRITON-APX-Version-8-0","refsource":"CONFIRM","tags":["Third Party Advisory"],"title":"Vulnerabilities resolved in TRITON APX Version 8.0","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://groups.google.com/forum/#%21topic/docker-user/oYm0i3xShJU","name":"https://groups.google.com/forum/#%21topic/docker-user/oYm0i3xShJU","refsource":"MISC","tags":[],"title":"Google Groups","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.ubuntu.com/usn/USN-2486-1","name":"USN-2486-1","refsource":"UBUNTU","tags":["Vendor Advisory"],"title":"USN-2486-1: OpenJDK 6 vulnerabilities | Ubuntu","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.securitytracker.com/id/1031107","name":"1031107","refsource":"SECTRACK","tags":["Third Party Advisory","VDB Entry"],"title":"Blue Coat Director SSL 3.0 Protocol Downgrade Flaw Lets Remote Users Decrypt SSL Traffic - SecurityTracker","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://marc.info/?l=bugtraq&m=141628688425177&w=2","name":"HPSBMU03183","refsource":"HP","tags":["Third Party Advisory"],"title":"'[security bulletin] HPSBMU03183 rev.2 - HP Server Automation and Server Automation Virtual Appliance' - MARC","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.securityfocus.com/archive/1/533747","name":"APPLE-SA-2014-10-20-1","refsource":"APPLE","tags":["Third Party Advisory","VDB Entry"],"title":"SecurityFocus","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://marc.info/?l=bugtraq&m=141775427104070&w=2","name":"HPSBGN03205","refsource":"HP","tags":["Third Party Advisory"],"title":"'[security bulletin] HPSBGN03205 rev.1 - HP Insight Remote Support Clients running SSLv3, Remote Disc' - MARC","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://support.citrix.com/article/CTX216642","name":"https://support.citrix.com/article/CTX216642","refsource":"CONFIRM","tags":["Third Party Advisory"],"title":"Multiple Security Vulnerabilities in Citrix NetScaler Platform IPMI Lights Out Management (LOM) firmware","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://marc.info/?l=bugtraq&m=141697638231025&w=2","name":"HPSBGN03201","refsource":"HP","tags":["Third Party Advisory"],"title":"'[security bulletin] HPSBGN03201 rev.1 - HP Asset Manager running SSLv3, Remote Disclosure of Informa' - MARC","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1076983","name":"https://bugzilla.mozilla.org/show_bug.cgi?id=1076983","refsource":"CONFIRM","tags":["Issue Tracking"],"title":"1076983 – (POODLE) Padding oracle attack on SSL 3.0","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://marc.info/?l=bugtraq&m=141879378918327&w=2","name":"SSRT101849","refsource":"HP","tags":["Third Party Advisory"],"title":"'[security bulletin] HPSBMU03221 rev.1 - HP Connect-IT running SSLv3, Remote Disclosure of Informatio' - MARC","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://marc.info/?l=bugtraq&m=141694355519663&w=2","name":"HPSBMU03214","refsource":"HP","tags":["Third Party Advisory"],"title":"'[security bulletin] HPSBMU03214 rev.1 - HP Systinet running SSLv3, Remote Disclosure of Information' - MARC","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.securityfocus.com/archive/1/533724/100/0/threaded","name":"APPLE-SA-2014-10-16-4","refsource":"APPLE","tags":["Third Party Advisory","VDB Entry"],"title":"SecurityFocus","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://marc.info/?l=bugtraq&m=142624679706236&w=2","name":"HPSBMU03283","refsource":"HP","tags":["Third Party Advisory"],"title":"'[security bulletin] HPSBMU03283 rev.1 - HP Virtual Connect Enterprise Manager SDK running OpenSSL on' - MARC","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://marc.info/?l=bugtraq&m=142350743917559&w=2","name":"SSRT101896","refsource":"HP","tags":["Third Party Advisory"],"title":"'[security bulletin] HPSBGN03252 rev.1 - HP AppPulse Active running SSLv3, Remote Disclosure of Infor' - MARC","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html","name":"http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html","refsource":"CONFIRM","tags":["Third Party Advisory"],"title":"Oracle Critical Patch Update - July 2015","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://secunia.com/advisories/61782","name":"61782","refsource":"SECUNIA","tags":["Third Party Advisory"],"title":"About Secunia Research | Flexera","mime":"text/plain","httpstatus":"200","archivestatus":"200"},{"url":"https://github.com/mpgn/poodle-PoC","name":"https://github.com/mpgn/poodle-PoC","refsource":"MISC","tags":["Third Party Advisory"],"title":"GitHub - mpgn/poodle-PoC: Poodle (Padding Oracle On Downgraded Legacy Encryption) attack","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://rhn.redhat.com/errata/RHSA-2014-1692.html","name":"RHSA-2014:1692","refsource":"REDHAT","tags":["Third Party Advisory"],"title":"Red Hat Customer Portal","mime":"text/html","httpstatus":"-1","archivestatus":"200"},{"url":"http://marc.info/?l=bugtraq&m=144251162130364&w=2","name":"HPSBST03418","refsource":"HP","tags":["Third Party Advisory"],"title":"'[security bulletin] HPSBST03418 rev.1 - HP P6000 Command View Software, Remote Disclosure of Informa' - MARC","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://ics-cert.us-cert.gov/advisories/ICSMA-18-058-02","name":"https://ics-cert.us-cert.gov/advisories/ICSMA-18-058-02","refsource":"MISC","tags":["Third Party Advisory","US Government Resource"],"title":"Philips Intellispace Portal ISP Vulnerabilities | ICS-CERT","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://marc.info/?l=bugtraq&m=142118135300698&w=2","name":"SSRT101868","refsource":"HP","tags":["Third Party Advisory"],"title":"'[security bulletin] HPSBGN03233 rev.1 - HP OneView running OpenSSL, Remote Denial of Service (DoS), ' - MARC","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://lists.apple.com/archives/security-announce/2015/Sep/msg00002.html","name":"APPLE-SA-2015-09-16-2","refsource":"APPLE","tags":["Mailing List","Third Party Advisory"],"title":"APPLE-SA-2015-09-16-2 Xcode 7.0","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00027.html","name":"SUSE-SU-2015:0578","refsource":"SUSE","tags":["Third Party Advisory"],"title":"[security-announce] SUSE-SU-2015:0578-1: important: Security update for","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://marc.info/?l=bugtraq&m=142546741516006&w=2","name":"HPSBST03265","refsource":"HP","tags":["Third Party Advisory"],"title":"'[security bulletin] HPSBST03265 rev.1 - HP VMA SAN Gateway running Bash Shell and OpenSSL, Remote De' - MARC","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://lists.fedoraproject.org/pipermail/package-announce/2015-October/169374.html","name":"FEDORA-2015-9090","refsource":"FEDORA","tags":["Third Party Advisory"],"title":"[SECURITY] Fedora 21 Update: fossil-1.33-1.fc21","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://marc.info/?l=bugtraq&m=143039249603103&w=2","name":"HPSBMU03241","refsource":"HP","tags":["Third Party Advisory"],"title":"'[security bulletin] HPSBMU03241 rev.1 - HP Network Automation running SSLv3, Remote Disclosure of In' - MARC","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://blog.nodejs.org/2014/10/23/node-v0-10-33-stable/","name":"http://blog.nodejs.org/2014/10/23/node-v0-10-33-stable/","refsource":"CONFIRM","tags":["Third Party Advisory"],"title":"Node v0.10.33 (Stable)","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://access.redhat.com/errata/RHSA-2015:0069","name":"https://access.redhat.com/errata/RHSA-2015:0069","refsource":"MISC","tags":[],"title":"Red Hat Customer Portal","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://support.apple.com/kb/HT6531","name":"https://support.apple.com/kb/HT6531","refsource":"CONFIRM","tags":["Vendor Advisory"],"title":"About Security Update 2014-005 - Apple Support","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://support.apple.com/kb/HT6542","name":"https://support.apple.com/kb/HT6542","refsource":"CONFIRM","tags":["Vendor Advisory"],"title":"About the security content of Apple TV 7.0.1 - Apple Support","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://blogs.oracle.com/sunsecurity/entry/multiple_vulnerabilities_in_openssl6","name":"https://blogs.oracle.com/sunsecurity/entry/multiple_vulnerabilities_in_openssl6","refsource":"CONFIRM","tags":["Third Party Advisory"],"title":"Multiple vulnerabilities in OpenSSL (Third Party Vulnerability Resolution Blog)","mime":"text/html","httpstatus":"-1","archivestatus":"200"},{"url":"https://access.redhat.com/errata/RHSA-2015:0010","name":"https://access.redhat.com/errata/RHSA-2015:0010","refsource":"MISC","tags":[],"title":"Red Hat Customer Portal - Access to 24x7 support and knowledge","mime":"text/html","httpstatus":"404","archivestatus":"404"},{"url":"https://support.lenovo.com/product_security/poodle","name":"https://support.lenovo.com/product_security/poodle","refsource":"CONFIRM","tags":["Third Party Advisory"],"title":"POODLE: SSLv3 Vulnerability - US","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://lists.apache.org/thread.html/rec7160382badd3ef4ad017a22f64a266c7188b9ba71394f0d321e2d4@%3Ccommits.cxf.apache.org%3E","name":"[cxf-commits] 20210402 svn commit: r1073270 - in /websites/production/cxf/content: cache/main.pageCache security-advisories.data/CVE-2021-22696.txt.asc security-advisories.html","refsource":"MLIST","tags":[],"title":"Pony Mail!","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"http://www.securitytracker.com/id/1031094","name":"1031094","refsource":"SECTRACK","tags":["Third Party Advisory","VDB Entry"],"title":"Cisco Nexus SSL 3.0 Protocol Downgrade Flaw Lets Remote Users Decrypt SSL Traffic - SecurityTracker","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://marc.info/?l=bugtraq&m=142624619906067","name":"SSRT101922","refsource":"HP","tags":["Third Party Advisory"],"title":"'[security bulletin] HPSBMU03259 rev.1 - HP Version Control Repository Manager running OpenSSL on Lin' - MARC","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://www.openssl.org/news/secadv_20141015.txt","name":"https://www.openssl.org/news/secadv_20141015.txt","refsource":"CONFIRM","tags":["Vendor Advisory"],"title":"","mime":"text/plain","httpstatus":"200","archivestatus":"200"},{"url":"http://www.securitytracker.com/id/1031130","name":"1031130","refsource":"SECTRACK","tags":["Third Party Advisory","VDB Entry"],"title":"Citrix NetScaler SSL 3.0 Protocol Downgrade Flaw Lets Remote Users Decrypt SSL Traffic - SecurityTracker","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00026.html","name":"SUSE-SU-2015:0344","refsource":"SUSE","tags":["Third Party Advisory"],"title":"[security-announce] SUSE-SU-2015:0344-1: important: Security update for","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.securitytracker.com/id/1031124","name":"1031124","refsource":"SECTRACK","tags":["Third Party Advisory","VDB Entry"],"title":"TippingPoint Intrusion Prevention System Local Security Manager SSL 3.0 Protocol Downgrade Flaw Lets Remote Users Decrypt SSL Traffic - SecurityTracker","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://lists.apache.org/thread.html/r36e44ffc1a9b365327df62cdfaabe85b9a5637de102cea07d79b2dbf@%3Ccommits.cxf.apache.org%3E","name":"[cxf-commits] 20200319 svn commit: r1058035 - in /websites/production/cxf/content: cache/main.pageCache security-advisories.data/CVE-2019-17573.txt.asc security-advisories.html","refsource":"MLIST","tags":["Third Party Advisory"],"title":"Pony Mail!","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www-01.ibm.com/support/docview.wss?uid=swg21686997","name":"http://www-01.ibm.com/support/docview.wss?uid=swg21686997","refsource":"CONFIRM","tags":["Third Party Advisory"],"title":"IBM Security Bulletin: - United States","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://marc.info/?l=bugtraq&m=143558137709884&w=2","name":"HPSBPI03107","refsource":"HP","tags":["Third Party Advisory"],"title":"'[security bulletin] HPSBPI03107 rev.1 - HP LaserJet Printers and MFPs, HP OfficeJet Printers and MFP' - MARC","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://marc.info/?l=bugtraq&m=143290583027876&w=2","name":"HPSBMU03223","refsource":"HP","tags":["Third Party Advisory"],"title":"'[security bulletin] HPSBMU03223 rev.1 - HP Insight Control server provisioning running SSLv3, Remote' - MARC","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://marc.info/?l=bugtraq&m=142496355704097&w=2","name":"SSRT101951","refsource":"HP","tags":["Third Party Advisory"],"title":"'[security bulletin] HPSBUX03273 SSRT101951 rev.1 - HP-UX running Java6, Remote Unauthorized Access, ' - MARC","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://www.elastic.co/blog/logstash-1-4-3-released","name":"https://www.elastic.co/blog/logstash-1-4-3-released","refsource":"CONFIRM","tags":["Third Party Advisory"],"title":"Logstash 1.4.3 released\n\t  \t | Elastic","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://security.netapp.com/advisory/ntap-20141015-0001/","name":"https://security.netapp.com/advisory/ntap-20141015-0001/","refsource":"CONFIRM","tags":["Third Party Advisory"],"title":"CVE-2014-3566 SSL v3.0 Nondeterministic CBC Padding Vulnerability in Multiple NetApp Products | NetApp Product Security","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20141015-poodle","name":"20141014 SSL Padding Oracle On Downgraded Legacy Encryption (POODLE) Vulnerability","refsource":"CISCO","tags":["Third Party Advisory"],"title":"SSL Padding Oracle On Downgraded Legacy Encryption (POODLE) Vulnerability","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://marc.info/?l=bugtraq&m=141577350823734&w=2","name":"HPSBGN03164","refsource":"HP","tags":["Third Party Advisory"],"title":"'[security bulletin] HPSBGN03164 rev.1 - HP IceWall SSO Dfw, SSO Certd and MCRP running OpenSSL, Remo' - MARC","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://access.redhat.com/errata/RHSA-2015:1546","name":"https://access.redhat.com/errata/RHSA-2015:1546","refsource":"MISC","tags":[],"title":"Red Hat Customer Portal","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04819635","name":"https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04819635","refsource":"CONFIRM","tags":["Third Party Advisory"],"title":"HPE Support document - HPE Support Center","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://access.redhat.com/errata/RHSA-2015:0068","name":"https://access.redhat.com/errata/RHSA-2015:0068","refsource":"MISC","tags":[],"title":"Red Hat Customer Portal","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.vmware.com/security/advisories/VMSA-2015-0003.html","name":"http://www.vmware.com/security/advisories/VMSA-2015-0003.html","refsource":"CONFIRM","tags":["Third Party Advisory"],"title":"VMSA-2015-0003.15 | United States","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://access.redhat.com/errata/RHSA-2015:0264","name":"https://access.redhat.com/errata/RHSA-2015:0264","refsource":"MISC","tags":[],"title":"Red Hat Customer Portal","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://marc.info/?l=bugtraq&m=141813976718456&w=2","name":"HPSBGN03222","refsource":"HP","tags":["Third Party Advisory"],"title":"'[security bulletin] HPSBGN03222 rev.1 - HP Enterprise Maps running SSLv3, Remote Disclosure of Infor' - MARC","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://rhn.redhat.com/errata/RHSA-2014-1881.html","name":"RHSA-2014:1881","refsource":"REDHAT","tags":["Third Party Advisory"],"title":"Red Hat Customer Portal","mime":"text/html","httpstatus":"-1","archivestatus":"200"},{"url":"http://docs.ipswitch.com/MOVEit/DMZ82/ReleaseNotes/MOVEitReleaseNotes82.pdf","name":"http://docs.ipswitch.com/MOVEit/DMZ82/ReleaseNotes/MOVEitReleaseNotes82.pdf","refsource":"CONFIRM","tags":["Third Party Advisory"],"title":"","mime":"application/pdf","httpstatus":"200","archivestatus":"200"},{"url":"http://support.apple.com/HT204244","name":"http://support.apple.com/HT204244","refsource":"CONFIRM","tags":["Third Party Advisory"],"title":"About the security content of OS X Yosemite v10.10.2 and Security Update 2015-001 - Apple Support","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://marc.info/?l=bugtraq&m=141715130023061&w=2","name":"HPSBGN03209","refsource":"HP","tags":["Third Party Advisory"],"title":"'[security bulletin] HPSBGN03209 rev.1 - HP Application Lifecycle Management running SSLv3, Remote Di' - MARC","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://technet.microsoft.com/library/security/3009008.aspx","name":"https://technet.microsoft.com/library/security/3009008.aspx","refsource":"CONFIRM","tags":["Patch","Vendor Advisory"],"title":"Microsoft Security Advisory 3009008","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://access.redhat.com/errata/RHSA-2014:1882","name":"https://access.redhat.com/errata/RHSA-2014:1882","refsource":"MISC","tags":[],"title":"Red Hat Customer Portal","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html","name":"http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html","refsource":"CONFIRM","tags":["Third Party Advisory"],"title":"Oracle Solaris Third Party Bulletin - October 2015","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00066.html","name":"SUSE-SU-2016:1457","refsource":"SUSE","tags":["Third Party Advisory"],"title":"[security-announce] SUSE-SU-2016:1457-1: important: Security update for","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00033.html","name":"SUSE-SU-2015:0376","refsource":"SUSE","tags":["Third Party Advisory"],"title":"[security-announce] SUSE-SU-2015:0376-1: important: Security update for","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.ubuntu.com/usn/USN-2487-1","name":"USN-2487-1","refsource":"UBUNTU","tags":["Vendor Advisory"],"title":"USN-2487-1: OpenJDK 7 vulnerabilities | Ubuntu","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://lists.opensuse.org/opensuse-security-announce/2014-11/msg00003.html","name":"SUSE-SU-2014:1361","refsource":"SUSE","tags":["Third Party Advisory"],"title":"[security-announce] SUSE-SU-2014:1361-1: important: Security update for","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://lists.apache.org/thread.html/r36e44ffc1a9b365327df62cdfaabe85b9a5637de102cea07d79b2dbf%40%3Ccommits.cxf.apache.org%3E","name":"https://lists.apache.org/thread.html/r36e44ffc1a9b365327df62cdfaabe85b9a5637de102cea07d79b2dbf%40%3Ccommits.cxf.apache.org%3E","refsource":"MISC","tags":[],"title":"Pony Mail!","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://access.redhat.com/errata/RHBA-2014:1857","name":"https://access.redhat.com/errata/RHBA-2014:1857","refsource":"MISC","tags":[],"title":"Red Hat Customer Portal","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://archives.neohapsis.com/archives/bugtraq/2014-10/0103.html","name":"APPLE-SA-2014-10-16-3","refsource":"APPLE","tags":["Third Party Advisory"],"title":"NEOHAPSIS - Peace of Mind Through Integrity and Insight","mime":"text/html","httpstatus":"-1","archivestatus":"200"},{"url":"https://support.apple.com/kb/HT6529","name":"https://support.apple.com/kb/HT6529","refsource":"CONFIRM","tags":["Vendor Advisory"],"title":"About the security content of OS X Server v2.2.5 - Apple Support","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://people.canonical.com/~ubuntu-security/cve/2014/CVE-2014-3566.html","name":"http://people.canonical.com/~ubuntu-security/cve/2014/CVE-2014-3566.html","refsource":"CONFIRM","tags":["Third Party Advisory"],"title":"CVE-2014-3566 in Ubuntu","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://marc.info/?l=bugtraq&m=142624719706349&w=2","name":"SSRT101921","refsource":"HP","tags":["Third Party Advisory"],"title":"'[security bulletin] HPSBMU03262 rev.1 - HP Version Control Agent running OpenSSL on Linux and Window' - MARC","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html","name":"http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html","refsource":"CONFIRM","tags":["Third Party Advisory"],"title":"Oracle Critical Patch Update - January 2015","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00036.html","name":"SUSE-SU-2015:0392","refsource":"SUSE","tags":["Third Party Advisory"],"title":"[security-announce] SUSE-SU-2015:0392-1: important: Security update for","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://support.apple.com/kb/HT6527","name":"https://support.apple.com/kb/HT6527","refsource":"CONFIRM","tags":["Vendor Advisory"],"title":"About the security content of OS X Server v3.2.2 - Apple Support","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://marc.info/?l=bugtraq&m=142624619906067&w=2","name":"HPSBMU03259","refsource":"HP","tags":["Third Party Advisory"],"title":"'[security bulletin] HPSBMU03259 rev.1 - HP Version Control Repository Manager running OpenSSL on Lin' - MARC","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://marc.info/?l=bugtraq&m=143628269912142&w=2","name":"HPSBMU03234","refsource":"HP","tags":["Third Party Advisory"],"title":"'[security bulletin] HPSBMU03234 rev.1 - HP Vertica Analytics Platform running SSLv3, Remote Disclosu' - MARC","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://marc.info/?l=bugtraq&m=143101048219218&w=2","name":"HPSBUX03194","refsource":"HP","tags":["Third Party Advisory"],"title":"'[security bulletin] HPSBUX03194 rev.1 - HP-UX running sendmail(1M), Remote Disclosure of Information' - MARC","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://blogs.technet.com/b/msrc/archive/2014/10/14/security-advisory-3009008-released.aspx","name":"http://blogs.technet.com/b/msrc/archive/2014/10/14/security-advisory-3009008-released.aspx","refsource":"CONFIRM","tags":["Third Party Advisory"],"title":"Security Advisory 3009008 updated - MSRC - Site Home - TechNet Blogs","mime":"text/html","httpstatus":"404","archivestatus":"200"},{"url":"https://www.dfranke.us/posts/2014-10-14-how-poodle-happened.html","name":"https://www.dfranke.us/posts/2014-10-14-how-poodle-happened.html","refsource":"MISC","tags":["Third Party Advisory"],"title":"How POODLE Happened — Indistinguishable from Random","mime":"text/html","httpstatus":"-1","archivestatus":"200"},{"url":"https://access.redhat.com/errata/RHSA-2015:0011","name":"https://access.redhat.com/errata/RHSA-2015:0011","refsource":"MISC","tags":[],"title":"Red Hat Customer Portal - Access to 24x7 support and knowledge","mime":"text/html","httpstatus":"404","archivestatus":"404"},{"url":"http://www.securitytracker.com/id/1031096","name":"1031096","refsource":"SECTRACK","tags":["Third Party Advisory","VDB Entry"],"title":"Cisco TelePresence SSL 3.0 Protocol Downgrade Flaw Lets Remote Users Decrypt SSL Traffic - SecurityTracker","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://rhn.redhat.com/errata/RHSA-2014-1882.html","name":"RHSA-2014:1882","refsource":"REDHAT","tags":["Third Party Advisory"],"title":"Red Hat Customer Portal","mime":"text/html","httpstatus":"-1","archivestatus":"200"},{"url":"http://secunia.com/advisories/61345","name":"61345","refsource":"SECUNIA","tags":["Third Party Advisory"],"title":"About Secunia Research | Flexera","mime":"text/plain","httpstatus":"200","archivestatus":"200"},{"url":"http://marc.info/?l=bugtraq&m=141450452204552&w=2","name":"HPSBMU03152","refsource":"HP","tags":["Third Party Advisory"],"title":"'[security bulletin] HPSBMU03152 rev.1 - HP Operations Orchestration running SSL, Remote Disclosure o' - MARC","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.securitytracker.com/id/1031132","name":"1031132","refsource":"SECTRACK","tags":["Third Party Advisory","VDB Entry"],"title":"Citrix XenMobile Device Manager SSL 3.0 Protocol Downgrade Flaw Lets Remote Users Decrypt SSL Traffic - SecurityTracker","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://lists.apache.org/thread.html/rec7160382badd3ef4ad017a22f64a266c7188b9ba71394f0d321e2d4%40%3Ccommits.cxf.apache.org%3E","name":"https://lists.apache.org/thread.html/rec7160382badd3ef4ad017a22f64a266c7188b9ba71394f0d321e2d4%40%3Ccommits.cxf.apache.org%3E","refsource":"MISC","tags":[],"title":"","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05301946","name":"https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05301946","refsource":"CONFIRM","tags":["Third Party Advisory"],"title":"Document Display | HPE Support Center","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"http://downloads.asterisk.org/pub/security/AST-2014-011.html","name":"http://downloads.asterisk.org/pub/security/AST-2014-011.html","refsource":"CONFIRM","tags":["Third Party Advisory"],"title":"AST-2014-011","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://support.citrix.com/article/CTX200238","name":"http://support.citrix.com/article/CTX200238","refsource":"CONFIRM","tags":["Third Party Advisory"],"title":"Citrix Security Advisory for CVE-2014-3566 - SSLv3 Protocol Flaw","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://archives.neohapsis.com/archives/bugtraq/2014-10/0101.html","name":"APPLE-SA-2014-10-16-1","refsource":"APPLE","tags":["Third Party Advisory"],"title":"NEOHAPSIS - Peace of Mind Through Integrity and Insight","mime":"text/html","httpstatus":"-1","archivestatus":"200"},{"url":"https://groups.google.com/forum/#!topic/docker-user/oYm0i3xShJU","name":"https://groups.google.com/forum/#!topic/docker-user/oYm0i3xShJU","refsource":"CONFIRM","tags":["Third Party Advisory"],"title":"Google Groups","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2014-015.txt.asc","name":"NetBSD-SA2014-015","refsource":"NETBSD","tags":["Third Party Advisory"],"title":"","mime":"text/plain","httpstatus":"200","archivestatus":"200"},{"url":"https://www.cloudera.com/documentation/other/security-bulletins/topics/csb_topic_1.html","name":"https://www.cloudera.com/documentation/other/security-bulletins/topics/csb_topic_1.html","refsource":"CONFIRM","tags":["Third Party Advisory"],"title":"CDH Issues","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www-01.ibm.com/support/docview.wss?uid=isg3T1021439","name":"http://www-01.ibm.com/support/docview.wss?uid=isg3T1021439","refsource":"CONFIRM","tags":["Third Party Advisory"],"title":"IBM Update: Security Bulletin: Vulnerability in SSLv3 affects IBM® SDK, Java Technology Edition for AIX/VIOS (CVE-2014-3566) - United States","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00000.html","name":"SUSE-SU-2016:1459","refsource":"SUSE","tags":["Third Party Advisory"],"title":"[security-announce] SUSE-SU-2016:1459-1: important: Security update for","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://askubuntu.com/questions/537196/how-do-i-patch-workaround-sslv3-poodle-vulnerability-cve-2014-3566","name":"http://askubuntu.com/questions/537196/how-do-i-patch-workaround-sslv3-poodle-vulnerability-cve-2014-3566","refsource":"MISC","tags":["Third Party Advisory"],"title":"security - How do I patch/workaround SSLv3 POODLE vulnerability (CVE­-2014­-3566)? - Ask Ubuntu","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00001.html","name":"openSUSE-SU-2015:0190","refsource":"SUSE","tags":["Third Party Advisory"],"title":"[security-announce] openSUSE-SU-2015:0190-1: important: Security update","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.oracle.com/technetwork/topics/security/bulletinjul2015-2511963.html","name":"http://www.oracle.com/technetwork/topics/security/bulletinjul2015-2511963.html","refsource":"CONFIRM","tags":["Third Party Advisory"],"title":"Oracle Solaris Third Party Bulletin - July 2015","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://blog.cryptographyengineering.com/2014/10/attack-of-week-poodle.html","name":"http://blog.cryptographyengineering.com/2014/10/attack-of-week-poodle.html","refsource":"MISC","tags":["Third Party Advisory"],"title":"A Few Thoughts on Cryptographic Engineering: Attack of the week: POODLE","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://rhn.redhat.com/errata/RHSA-2015-0264.html","name":"RHSA-2015:0264","refsource":"REDHAT","tags":["Third Party Advisory"],"title":"Red Hat Customer Portal","mime":"text/html","httpstatus":"-1","archivestatus":"200"},{"url":"http://marc.info/?l=bugtraq&m=144101915224472&w=2","name":"HPSBMU03416","refsource":"HP","tags":["Third Party Advisory"],"title":"'[security bulletin] HPSBMU03416 rev.1 - HP Data Protector, Remote Disclosure of Information' - MARC","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://access.redhat.com/errata/RHSA-2015:0086","name":"https://access.redhat.com/errata/RHSA-2015:0086","refsource":"MISC","tags":[],"title":"Red Hat Customer Portal","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.mandriva.com/security/advisories?name=MDVSA-2015:062","name":"MDVSA-2015:062","refsource":"MANDRIVA","tags":["Third Party Advisory"],"title":"Support / Security / Advisories /  / MDVSA-2015:062 | Mandriva","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://marc.info/?l=bugtraq&m=141703183219781&w=2","name":"HPSBGN03202","refsource":"HP","tags":["Third Party Advisory"],"title":"'[security bulletin] HPSBGN03202 rev.1 - HP CMS: Configuration Manager running OpenSSL, Remote Disclo' - MARC","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://marc.info/?l=bugtraq&m=144294141001552&w=2","name":"HPSBGN03391","refsource":"HP","tags":["Third Party Advisory"],"title":"'[security bulletin] HPSBGN03391 rev.1 - HP Universal CMDB Foundation, Discovery, Configuration Manag' - MARC","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://secunia.com/advisories/60056","name":"60056","refsource":"SECUNIA","tags":["Third Party Advisory"],"title":"About Secunia Research | Flexera","mime":"text/plain","httpstatus":"200","archivestatus":"200"},{"url":"http://www-01.ibm.com/support/docview.wss?uid=swg21687611","name":"http://www-01.ibm.com/support/docview.wss?uid=swg21687611","refsource":"CONFIRM","tags":["Third Party Advisory"],"title":"IBM Security Bulletin: Vulnerability in SSLv3 affects Directory Server (CVE-2014-3566) - United States","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://kc.mcafee.com/corporate/index?page=content&id=SB10104","name":"https://kc.mcafee.com/corporate/index?page=content&id=SB10104","refsource":"CONFIRM","tags":["Third Party Advisory"],"title":"McAfee KnowledgeBase - McAfee Security Bulletin - ePO update fixes multiple Oracle Java vulnerabilities","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.securitytracker.com/id/1031029","name":"1031029","refsource":"SECTRACK","tags":["Third Party Advisory","VDB Entry"],"title":"OpenSSL SSL 3.0 Protocol Downgrade Flaw Lets Remote Users Decrypt SSL Traffic - SecurityTracker","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://rhn.redhat.com/errata/RHSA-2015-0079.html","name":"RHSA-2015:0079","refsource":"REDHAT","tags":["Third Party Advisory"],"title":"Red Hat Customer Portal","mime":"text/html","httpstatus":"-1","archivestatus":"200"},{"url":"https://devcentral.f5.com/articles/cve-2014-3566-removing-sslv3-from-big-ip","name":"https://devcentral.f5.com/articles/cve-2014-3566-removing-sslv3-from-big-ip","refsource":"CONFIRM","tags":["Third Party Advisory"],"title":"CVE-2014-3566: Removing SSLv3 from BIG-IP","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://lists.apache.org/thread.html/rfb87e0bf3995e7d560afeed750fac9329ff5f1ad49da365129b7f89e%40%3Ccommits.cxf.apache.org%3E","name":"https://lists.apache.org/thread.html/rfb87e0bf3995e7d560afeed750fac9329ff5f1ad49da365129b7f89e%40%3Ccommits.cxf.apache.org%3E","refsource":"MISC","tags":[],"title":"","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.debian.org/security/2015/dsa-3144","name":"DSA-3144","refsource":"DEBIAN","tags":["Third Party Advisory"],"title":"Debian -- Security Information -- DSA-3144-1 openjdk-7","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://secunia.com/advisories/59627","name":"59627","refsource":"SECUNIA","tags":["Third Party Advisory"],"title":"About Secunia Research | Flexera","mime":"text/plain","httpstatus":"200","archivestatus":"200"},{"url":"http://secunia.com/advisories/61359","name":"61359","refsource":"SECUNIA","tags":["Third Party Advisory"],"title":"About Secunia Research | Flexera","mime":"text/plain","httpstatus":"200","archivestatus":"200"},{"url":"http://marc.info/?l=bugtraq&m=142350196615714&w=2","name":"SSRT101897","refsource":"HP","tags":["Third Party Advisory"],"title":"'[security bulletin] HPSBGN03253 rev.1 - HP Business Process Insight (BPI) running SSLv3, Remote Disc' - MARC","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.debian.org/security/2016/dsa-3489","name":"DSA-3489","refsource":"DEBIAN","tags":["Third Party Advisory"],"title":"Debian -- Security Information -- DSA-3489-1 lighttpd","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://lists.apache.org/thread.html/rff42cfa5e7d75b7c1af0e37589140a8f1999e578a75738740b244bd4@%3Ccommits.cxf.apache.org%3E","name":"[cxf-commits] 20200401 svn commit: r1058573 - in /websites/production/cxf/content: cache/main.pageCache index.html security-advisories.data/CVE-2020-1954.txt.asc security-advisories.html","refsource":"MLIST","tags":[],"title":"Pony Mail!","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www-01.ibm.com/support/docview.wss?uid=swg21692299","name":"http://www-01.ibm.com/support/docview.wss?uid=swg21692299","refsource":"CONFIRM","tags":["Third Party Advisory"],"title":"Security Bulletin: Multiple vulnerabilities in IBM Java Runtime affect Content Manager Enterprise Edition (CVE-2014-3566, CVE-2014-6457, CVE-2014-6468)","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"http://marc.info/?l=bugtraq&m=143290371927178&w=2","name":"HPSBGN03332","refsource":"HP","tags":["Third Party Advisory"],"title":"'[security bulletin] HPSBGN03332 rev.1 - HP Operations Analytics running SSLv3, Remote Denial of Serv' - MARC","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://marc.info/?l=bugtraq&m=141697676231104&w=2","name":"HPSBGN03203","refsource":"HP","tags":["Third Party Advisory"],"title":"'[security bulletin] HPSBGN03203 rev.1 - HP CMS: UCMDB Browser running OpenSSL, Remote Disclosure of ' - MARC","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://rhn.redhat.com/errata/RHSA-2014-1920.html","name":"RHSA-2014:1920","refsource":"REDHAT","tags":["Third Party Advisory"],"title":"Red Hat Customer Portal","mime":"text/html","httpstatus":"-1","archivestatus":"200"},{"url":"https://access.redhat.com/errata/RHSA-2015:0067","name":"https://access.redhat.com/errata/RHSA-2015:0067","refsource":"MISC","tags":[],"title":"Red Hat Customer Portal","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://secunia.com/advisories/61130","name":"61130","refsource":"SECUNIA","tags":["Third Party Advisory"],"title":"About Secunia Research | Flexera","mime":"text/plain","httpstatus":"200","archivestatus":"200"},{"url":"http://marc.info/?l=openssl-dev&m=141333049205629&w=2","name":"[openssl-dev] 20141014 Patch to mitigate CVE-2014-3566 (\"POODLE\")","refsource":"MLIST","tags":["Third Party Advisory"],"title":"'Patch to mitigate CVE-2014-3566 (\"POODLE\")' - MARC","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www-01.ibm.com/support/docview.wss?uid=isg3T1021431","name":"http://www-01.ibm.com/support/docview.wss?uid=isg3T1021431","refsource":"CONFIRM","tags":["Third Party Advisory"],"title":"IBM Security Bulletin: A security vulnerability has been identified in IBM Tivoli Directory Server shipped with AIX/VIOS (CVE-2014-3566) - United States","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://rhn.redhat.com/errata/RHSA-2014-1880.html","name":"RHSA-2014:1880","refsource":"REDHAT","tags":["Third Party Advisory"],"title":"Red Hat Customer Portal","mime":"text/html","httpstatus":"-1","archivestatus":"200"},{"url":"http://www-01.ibm.com/support/docview.wss?uid=swg21688283","name":"http://www-01.ibm.com/support/docview.wss?uid=swg21688283","refsource":"CONFIRM","tags":["Third Party Advisory"],"title":"IBM Security Bulletin: Multiple vulnerabilities in current releases of the IBM® SDK, Java™ Technology Edition - United States","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://marc.info/?l=bugtraq&m=142607790919348&w=2","name":"SSRT101968","refsource":"HP","tags":["Third Party Advisory"],"title":"'[security bulletin] HPSBUX03281 SSRT101968 rev.1 - HP-UX running Java7, Remote Unauthorized Access, ' - MARC","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://www.suse.com/support/kb/doc.php?id=7015773","name":"https://www.suse.com/support/kb/doc.php?id=7015773","refsource":"CONFIRM","tags":["Third Party Advisory"],"title":"Support | The POODLE weakness in the SSL protocol (CVE-2014-3566)","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://lists.opensuse.org/opensuse-security-announce/2014-10/msg00008.html","name":"openSUSE-SU-2014:1331","refsource":"SUSE","tags":["Third Party Advisory"],"title":"[security-announce] openSUSE-SU-2014:1331-1: important: update for opens","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://rhn.redhat.com/errata/RHSA-2015-0698.html","name":"RHSA-2015:0698","refsource":"REDHAT","tags":["Third Party Advisory"],"title":"Red Hat Customer Portal","mime":"text/html","httpstatus":"-1","archivestatus":"200"},{"url":"https://support.apple.com/kb/HT6541","name":"https://support.apple.com/kb/HT6541","refsource":"CONFIRM","tags":["Vendor Advisory"],"title":"About the security content of iOS 8.1 - Apple Support","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://marc.info/?l=bugtraq&m=142103967620673&w=2","name":"HPSBOV03227","refsource":"HP","tags":["Third Party Advisory"],"title":"'[security bulletin] HPSBOV03227 rev.1 - HP SSL for OpenVMS, Remote Disclosure of Information, Denial' - MARC","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://lists.fedoraproject.org/pipermail/package-announce/2014-October/141158.html","name":"FEDORA-2014-13012","refsource":"FEDORA","tags":["Third Party Advisory"],"title":"[SECURITY] Fedora 19 Update: openssl-1.0.1e-40.fc19","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://lists.apache.org/thread.html/rc774278135816e7afc943dc9fc78eb0764f2c84a2b96470a0187315c%40%3Ccommits.cxf.apache.org%3E","name":"https://lists.apache.org/thread.html/rc774278135816e7afc943dc9fc78eb0764f2c84a2b96470a0187315c%40%3Ccommits.cxf.apache.org%3E","refsource":"MISC","tags":[],"title":"Pony Mail!","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://lists.fedoraproject.org/pipermail/package-announce/2014-November/142330.html","name":"FEDORA-2014-12951","refsource":"FEDORA","tags":["Third Party Advisory"],"title":"[SECURITY] Fedora 21 Update: openssl-1.0.1j-1.fc21","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00027.html","name":"SUSE-SU-2015:0345","refsource":"SUSE","tags":["Third Party Advisory"],"title":"[security-announce] SUSE-SU-2015:0345-1: important: Security update for","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://lists.opensuse.org/opensuse-security-announce/2014-11/msg00001.html","name":"SUSE-SU-2014:1357","refsource":"SUSE","tags":["Third Party Advisory"],"title":"[security-announce] SUSE-SU-2014:1357-1: important: Security update for","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://secunia.com/advisories/61303","name":"61303","refsource":"SECUNIA","tags":["Third Party Advisory"],"title":"About Secunia Research | Flexera","mime":"text/plain","httpstatus":"200","archivestatus":"200"},{"url":"http://www.securitytracker.com/id/1031131","name":"1031131","refsource":"SECTRACK","tags":["Third Party Advisory","VDB Entry"],"title":"Citrix Secure Gateway SSL 3.0 Protocol Downgrade Flaw Lets Remote Users Decrypt SSL Traffic - SecurityTracker","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1152789","name":"https://bugzilla.redhat.com/show_bug.cgi?id=1152789","refsource":"CONFIRM","tags":["Issue Tracking"],"title":"Bug 1152789 – CVE-2014-3566 SSL/TLS: Padding Oracle On Downgraded Legacy Encryption attack","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://www.openssl.org/~bodo/ssl-poodle.pdf","name":"https://www.openssl.org/~bodo/ssl-poodle.pdf","refsource":"MISC","tags":["Vendor Advisory"],"title":"","mime":"application/pdf","httpstatus":"200","archivestatus":"200"},{"url":"http://www.securityfocus.com/archive/1/533746","name":"APPLE-SA-2014-10-20-2","refsource":"APPLE","tags":["Third Party Advisory","VDB Entry"],"title":"SecurityFocus","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://lists.apache.org/thread.html/rfb87e0bf3995e7d560afeed750fac9329ff5f1ad49da365129b7f89e@%3Ccommits.cxf.apache.org%3E","name":"[cxf-commits] 20210616 svn commit: r1075801 - in /websites/production/cxf/content: cache/main.pageCache index.html security-advisories.data/CVE-2021-30468.txt.asc security-advisories.html","refsource":"MLIST","tags":[],"title":"Pony Mail!","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"http://lists.opensuse.org/opensuse-security-announce/2014-12/msg00002.html","name":"SUSE-SU-2014:1549","refsource":"SUSE","tags":["Third Party Advisory"],"title":"[security-announce] SUSE-SU-2014:1549-1: important: Security update for","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.securitytracker.com/id/1031095","name":"1031095","refsource":"SECTRACK","tags":["Third Party Advisory","VDB Entry"],"title":"Cisco Unified Communications Manager SSL 3.0 Protocol Downgrade Flaw Lets Remote Users Decrypt SSL Traffic - SecurityTracker","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://secunia.com/advisories/61819","name":"61819","refsource":"SECUNIA","tags":["Third Party Advisory"],"title":"About Secunia Research | Flexera","mime":"text/plain","httpstatus":"200","archivestatus":"200"},{"url":"http://marc.info/?l=bugtraq&m=142962817202793&w=2","name":"HPSBGN03305","refsource":"HP","tags":["Third Party Advisory"],"title":"'[security bulletin] HPSBGN03305 rev.1 - HP Business Service Management (BSM) products running SSLv3,' - MARC","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://lists.apache.org/thread.html/rd49aabd984ed540c8ff7916d4d79405f3fa311d2fdbcf9ed307839a6@%3Ccommits.cxf.apache.org%3E","name":"[cxf-commits] 20201112 svn commit: r1067927 - in /websites/production/cxf/content: cache/main.pageCache security-advisories.data/CVE-2020-13954.txt.asc security-advisories.html","refsource":"MLIST","tags":[],"title":"Pony Mail!","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.securitytracker.com/id/1031123","name":"1031123","refsource":"SECTRACK","tags":["Third Party Advisory","VDB Entry"],"title":"HP Operations Orchestration SSL 3.0 Protocol Downgrade Flaw Lets Remote Users Decrypt SSL Traffic - SecurityTracker","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.securitytracker.com/id/1031093","name":"1031093","refsource":"SECTRACK","tags":["Third Party Advisory","VDB Entry"],"title":"Cisco IOS SSL 3.0 Protocol Downgrade Flaw Lets Remote Users Decrypt SSL Traffic - SecurityTracker","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://access.redhat.com/errata/RHSA-2014:1877","name":"https://access.redhat.com/errata/RHSA-2014:1877","refsource":"MISC","tags":[],"title":"Red Hat Customer Portal","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.securitytracker.com/id/1031087","name":"1031087","refsource":"SECTRACK","tags":["Third Party Advisory","VDB Entry"],"title":"Cisco Application Control Engine SSL 3.0 Protocol Downgrade Flaw Lets Remote Users Decrypt SSL Traffic - SecurityTracker","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://security.gentoo.org/glsa/201507-14","name":"GLSA-201507-14","refsource":"GENTOO","tags":["Third Party Advisory"],"title":"Oracle JRE/JDK: Multiple vulnerabilities (GLSA 201507-14) — Gentoo Security","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://secunia.com/advisories/61995","name":"61995","refsource":"SECUNIA","tags":["Third Party Advisory"],"title":"About Secunia Research | Flexera","mime":"text/plain","httpstatus":"200","archivestatus":"200"},{"url":"http://lists.fedoraproject.org/pipermail/package-announce/2014-October/141114.html","name":"FEDORA-2014-13069","refsource":"FEDORA","tags":["Third Party Advisory"],"title":"[SECURITY] Fedora 20 Update: openssl-1.0.1e-40.fc20","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://marc.info/?l=bugtraq&m=142791032306609&w=2","name":"HPSBMU03304","refsource":"HP","tags":["Third Party Advisory"],"title":"'[security bulletin] HPSBMU03304 rev.1 - HP Insight Control server deployment on Linux and Windows, R' - MARC","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html","name":"http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html","refsource":"CONFIRM","tags":["Third Party Advisory"],"title":"Oracle Critical Patch Update - April 2015","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://rhn.redhat.com/errata/RHSA-2014-1653.html","name":"RHSA-2014:1653","refsource":"REDHAT","tags":["Third Party Advisory"],"title":"Red Hat Customer Portal","mime":"text/html","httpstatus":"-1","archivestatus":"200"},{"url":"http://rhn.redhat.com/errata/RHSA-2015-0085.html","name":"RHSA-2015:0085","refsource":"REDHAT","tags":["Third Party Advisory"],"title":"Red Hat Customer Portal","mime":"text/html","httpstatus":"-1","archivestatus":"200"},{"url":"https://support.apple.com/kb/HT6536","name":"https://support.apple.com/kb/HT6536","refsource":"CONFIRM","tags":["Vendor Advisory"],"title":"About the security content of OS X Server v4.0 - Apple Support","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://access.redhat.com/articles/1232123","name":"https://access.redhat.com/articles/1232123","refsource":"CONFIRM","tags":["Third Party Advisory"],"title":"POODLE: SSLv3 vulnerability (CVE-2014-3566) - Red Hat Customer Portal","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://lists.fedoraproject.org/pipermail/package-announce/2015-October/169361.html","name":"FEDORA-2015-9110","refsource":"FEDORA","tags":["Third Party Advisory"],"title":"[SECURITY] Fedora 22 Update: fossil-1.33-1.fc22","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00011.html","name":"openSUSE-SU-2016:0640","refsource":"SUSE","tags":["Third Party Advisory"],"title":"[security-announce] openSUSE-SU-2016:0640-1: important: Security update","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://access.redhat.com/errata/RHSA-2015:0080","name":"https://access.redhat.com/errata/RHSA-2015:0080","refsource":"MISC","tags":[],"title":"Red Hat Customer Portal","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://marc.info/?l=bugtraq&m=141576815022399&w=2","name":"HPSBGN03191","refsource":"HP","tags":["Third Party Advisory"],"title":"'[security bulletin] HPSBGN03191 rev.1 - HP Remote Device Access: Virtual Customer Access System (vCA' - MARC","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://bto.bluecoat.com/security-advisory/sa83","name":"https://bto.bluecoat.com/security-advisory/sa83","refsource":"CONFIRM","tags":["Third Party Advisory"],"title":"Home | Blue Coat Systems, Inc.","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.securitytracker.com/id/1031106","name":"1031106","refsource":"SECTRACK","tags":["Third Party Advisory","VDB Entry"],"title":"Blue Coat PacketShaper SSL 3.0 Protocol Downgrade Flaw Lets Remote Users Decrypt SSL Traffic - SecurityTracker","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://marc.info/?l=bugtraq&m=142354438527235&w=2","name":"HPSBGN03251","refsource":"HP","tags":["Third Party Advisory"],"title":"'[security bulletin] HPSBGN03251 rev.1 - HP Storage Essentials running SSLv3, Remote Disclosure of In' - MARC","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://aix.software.ibm.com/aix/efixes/security/openssl_advisory11.asc","name":"http://aix.software.ibm.com/aix/efixes/security/openssl_advisory11.asc","refsource":"CONFIRM","tags":["Third Party Advisory"],"title":"","mime":"text/plain","httpstatus":"200","archivestatus":"200"},{"url":"http://rhn.redhat.com/errata/RHSA-2015-0068.html","name":"RHSA-2015:0068","refsource":"REDHAT","tags":["Third Party Advisory"],"title":"Red Hat Customer Portal","mime":"text/html","httpstatus":"-1","archivestatus":"200"},{"url":"http://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c04779034","name":"http://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c04779034","refsource":"CONFIRM","tags":["Third Party Advisory"],"title":"Document Display | HPE Support Center","mime":"text/html","httpstatus":"200","archivestatus":"403"},{"url":"https://puppet.com/security/cve/poodle-sslv3-vulnerability","name":"https://puppet.com/security/cve/poodle-sslv3-vulnerability","refsource":"CONFIRM","tags":["Third Party Advisory"],"title":"CVE-2014-3566 - POODLE SSLv3 Vulnerability | Puppet","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00018.html","name":"SUSE-SU-2015:0503","refsource":"SUSE","tags":["Third Party Advisory"],"title":"[security-announce] SUSE-SU-2015:0503-1: important: Security update for","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://access.redhat.com/errata/RHSA-2015:0079","name":"https://access.redhat.com/errata/RHSA-2015:0079","refsource":"MISC","tags":[],"title":"Red Hat Customer Portal","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://www-01.ibm.com/support/docview.wss?uid=swg21688165","name":"https://www-01.ibm.com/support/docview.wss?uid=swg21688165","refsource":"CONFIRM","tags":["Third Party Advisory"],"title":"IBM SDK, Java Technology Edition fixes to mitigate against the POODLE security vulnerability (CVE-2014-3566) - United States","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://secunia.com/advisories/61926","name":"61926","refsource":"SECUNIA","tags":["Third Party Advisory"],"title":"About Secunia Research | Flexera","mime":"text/plain","httpstatus":"200","archivestatus":"200"},{"url":"http://marc.info/?l=bugtraq&m=142721830231196&w=2","name":"HPSBMU03301","refsource":"HP","tags":["Third Party Advisory"],"title":"'[security bulletin] HPSBMU03301 rev.1 - HP BladeSystem c-Class Onboard Administrator running OpenSSL' - MARC","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://rhn.redhat.com/errata/RHSA-2014-1877.html","name":"RHSA-2014:1877","refsource":"REDHAT","tags":["Third Party Advisory"],"title":"Red Hat Customer Portal","mime":"text/html","httpstatus":"-1","archivestatus":"200"},{"url":"http://marc.info/?l=bugtraq&m=142721887231400&w=2","name":"SSRT101790","refsource":"HP","tags":["Third Party Advisory"],"title":"'[security bulletin] HPSBHF03275 rev.1 - HP Integrated Lights-Out 2, 3, and 4 (iLO 2, iLO 3, iLO 4), ' - MARC","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://secunia.com/advisories/61019","name":"61019","refsource":"SECUNIA","tags":["Third Party Advisory"],"title":"About Secunia Research | Flexera","mime":"text/plain","httpstatus":"200","archivestatus":"200"},{"url":"http://lists.apple.com/archives/security-announce/2015/Jan/msg00003.html","name":"APPLE-SA-2015-01-27-4","refsource":"APPLE","tags":["Mailing List","Third Party Advisory"],"title":"APPLE-SA-2015-01-27-4 OS X 10.10.2 and Security Update 2015-001","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://marc.info/?l=bugtraq&m=141477196830952&w=2","name":"HPSBUX03162","refsource":"HP","tags":["Third Party Advisory"],"title":"'[security bulletin] HPSBUX03162 SSRT101767 rev.1 - HP-UX Running OpenSSL, Remote Denial of Service (' - MARC","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://marc.info/?l=bugtraq&m=142804214608580&w=2","name":"HPSBHF03300","refsource":"HP","tags":["Third Party Advisory"],"title":"'[security bulletin] HPSBHF03300 rev.1 - HP Network Products running OpenSSL, Remote Denial of Servic' - MARC","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://rhn.redhat.com/errata/RHSA-2015-0080.html","name":"RHSA-2015:0080","refsource":"REDHAT","tags":["Third Party Advisory"],"title":"Red Hat Customer Portal","mime":"text/html","httpstatus":"-1","archivestatus":"200"},{"url":"https://kc.mcafee.com/corporate/index?page=content&id=SB10090","name":"https://kc.mcafee.com/corporate/index?page=content&id=SB10090","refsource":"CONFIRM","tags":["Third Party Advisory"],"title":"McAfee KnowledgeBase - McAfee Security Bulletin - POODLE Vulnerability","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html","name":"http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html","refsource":"CONFIRM","tags":["Third Party Advisory"],"title":"Oracle Solaris Third Party Bulletin - April 2015","mime":"text/html","httpstatus":"-1","archivestatus":"200"},{"url":"https://www.imperialviolet.org/2014/10/14/poodle.html","name":"https://www.imperialviolet.org/2014/10/14/poodle.html","refsource":"MISC","tags":["Third Party Advisory"],"title":"ImperialViolet - POODLE attacks on SSLv3","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://access.redhat.com/errata/RHSA-2015:0085","name":"https://access.redhat.com/errata/RHSA-2015:0085","refsource":"MISC","tags":[],"title":"Red Hat Customer Portal","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www-01.ibm.com/support/docview.wss?uid=swg21687172","name":"http://www-01.ibm.com/support/docview.wss?uid=swg21687172","refsource":"CONFIRM","tags":["Third Party Advisory"],"title":"IBM Security Bulletin: Vulnerability in SSLv3 affects IBM HTTP Server (CVE-2014-3566) - United States","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://marc.info/?l=bugtraq&m=141450973807288&w=2","name":"HPSBHF03156","refsource":"HP","tags":["Third Party Advisory"],"title":"'[security bulletin] HPSBHF03156 rev.1 - HP TippingPoint Intrusion Prevention System (IPS) Local Secu' - MARC","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://lists.apache.org/thread.html/rff42cfa5e7d75b7c1af0e37589140a8f1999e578a75738740b244bd4%40%3Ccommits.cxf.apache.org%3E","name":"https://lists.apache.org/thread.html/rff42cfa5e7d75b7c1af0e37589140a8f1999e578a75738740b244bd4%40%3Ccommits.cxf.apache.org%3E","refsource":"MISC","tags":[],"title":"Pony Mail!","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://secunia.com/advisories/60859","name":"60859","refsource":"SECUNIA","tags":["Third Party Advisory"],"title":"About Secunia Research | Flexera","mime":"text/plain","httpstatus":"200","archivestatus":"200"},{"url":"http://marc.info/?l=bugtraq&m=143558192010071&w=2","name":"HPSBPI03360","refsource":"HP","tags":["Third Party Advisory"],"title":"'[security bulletin] HPSBPI03360 rev.2 - HP LaserJet Printers and MFPs, HP OfficeJet Printers and MFP' - MARC","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://marc.info/?l=bugtraq&m=142495837901899&w=2","name":"HPSBMU03260","refsource":"HP","tags":["Third Party Advisory"],"title":"'[security bulletin] HPSBMU03260 rev.1 - HP System Management Homepage running OpenSSL on Linux and W' - MARC","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html","name":"http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html","refsource":"CONFIRM","tags":["Patch","Third Party Advisory"],"title":"Oracle Critical Patch Update - July 2017","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://access.redhat.com/errata/RHSA-2014:1876","name":"https://access.redhat.com/errata/RHSA-2014:1876","refsource":"MISC","tags":[],"title":"Red Hat Customer Portal","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.securitytracker.com/id/1031089","name":"1031089","refsource":"SECTRACK","tags":["Third Party Advisory","VDB Entry"],"title":"Cisco ASA SSL 3.0 Protocol Downgrade Flaw Lets Remote Users Decrypt SSL Traffic - SecurityTracker","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.securitytracker.com/id/1031105","name":"1031105","refsource":"SECTRACK","tags":["Third Party Advisory","VDB Entry"],"title":"Blue Coat ProxySG SSL 3.0 Protocol Downgrade Flaw Lets Remote Users Decrypt SSL Traffic - SecurityTracker","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://marc.info/?l=bugtraq&m=142357976805598&w=2","name":"HPSBGN03255","refsource":"HP","tags":["Third Party Advisory"],"title":"'[security bulletin] HPSBGN03255 rev.1 - HP OpenCall Media Platform (OCMP) running SSLv3, Remote Deni' - MARC","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10705","name":"http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10705","refsource":"CONFIRM","tags":["Third Party Advisory"],"title":"Juniper Networks - 2015-10 Security Bulletin: CTPView: Multiple Vulnerabilities in CTPView","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://marc.info/?l=bugtraq&m=145983526810210&w=2","name":"HPSBGN03569","refsource":"HP","tags":["Third Party Advisory"],"title":"'[security bulletin] HPSBGN03569 rev.1 - HPE OneView for VMware vCenter (OV4VC), Remote Disclosure of' - MARC","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://lists.apache.org/thread.html/rd49aabd984ed540c8ff7916d4d79405f3fa311d2fdbcf9ed307839a6%40%3Ccommits.cxf.apache.org%3E","name":"https://lists.apache.org/thread.html/rd49aabd984ed540c8ff7916d4d79405f3fa311d2fdbcf9ed307839a6%40%3Ccommits.cxf.apache.org%3E","refsource":"MISC","tags":[],"title":"Pony Mail!","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://marc.info/?l=bugtraq&m=142296755107581&w=2","name":"SSRT101854","refsource":"HP","tags":["Third Party Advisory"],"title":"'[security bulletin] HPSBGN03237 rev.1 - HP Insight Remote Support v7 Clients running SSLv3, Remote D' - MARC","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://secunia.com/advisories/60206","name":"60206","refsource":"SECUNIA","tags":["Third Party Advisory"],"title":"About Secunia Research | Flexera","mime":"text/plain","httpstatus":"200","archivestatus":"200"},{"url":"http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00024.html","name":"SUSE-SU-2015:0336","refsource":"SUSE","tags":["Third Party Advisory"],"title":"[security-announce] SUSE-SU-2015:0336-1: important: Security update for","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://marc.info/?l=bugtraq&m=143290522027658&w=2","name":"HPSBMU03261","refsource":"HP","tags":["Third Party Advisory"],"title":"'[security bulletin] HPSBMU03261 rev.2 - HP Systems Insight Manager running OpenSSL on Linux and Wind' - MARC","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.debian.org/security/2014/dsa-3053","name":"DSA-3053","refsource":"DEBIAN","tags":["Third Party Advisory"],"title":"Debian -- Security Information -- DSA-3053-1 openssl","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://rhn.redhat.com/errata/RHSA-2015-1545.html","name":"RHSA-2015:1545","refsource":"REDHAT","tags":["Third Party Advisory"],"title":"Red Hat Customer Portal","mime":"text/html","httpstatus":"-1","archivestatus":"200"},{"url":"http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html","name":"http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html","refsource":"CONFIRM","tags":["Third Party Advisory"],"title":"Oracle Solaris Bulletin - January 2016","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.securitytracker.com/id/1031090","name":"1031090","refsource":"SECTRACK","tags":["Third Party Advisory","VDB Entry"],"title":"Cisco Email Security Appliance SSL 3.0 Protocol Downgrade Flaw Lets Remote Users Decrypt SSL Traffic - SecurityTracker","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://secunia.com/advisories/61825","name":"61825","refsource":"SECUNIA","tags":["Third Party Advisory"],"title":"About Secunia Research | Flexera","mime":"text/plain","httpstatus":"200","archivestatus":"200"},{"url":"http://www.kb.cert.org/vuls/id/577193","name":"VU#577193","refsource":"CERT-VN","tags":["Third Party Advisory","US Government Resource"],"title":"Vulnerability Note VU#577193 - POODLE vulnerability in SSL 3.0","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://security.gentoo.org/glsa/201606-11","name":"GLSA-201606-11","refsource":"GENTOO","tags":["Third Party Advisory"],"title":"claws-mail: Multiple Vulnerabilities (GLSA 201606-11) — Gentoo security","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.securitytracker.com/id/1031120","name":"1031120","refsource":"SECTRACK","tags":["Third Party Advisory","VDB Entry"],"title":"IBM Tivoli Directory Server SSL 3.0 Protocol Downgrade Flaw Lets Remote Users Decrypt SSL Traffic - SecurityTracker","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://www.cve.org/CVERecord?id=CVE-2014-3566","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2014-3566","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2014","cve_id":"3566","vulnerable":"1","versionEndIncluding":"10.10.1","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"apple","cpe5":"mac_os_x","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"3566","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"debian","cpe5":"debian_linux","cpe6":"7.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"3566","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"debian","cpe5":"debian_linux","cpe6":"8.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"3566","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"debian","cpe5":"debian_linux","cpe6":"7.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"3566","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"debian","cpe5":"debian_linux","cpe6":"8.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"3566","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"fedoraproject","cpe5":"fedora","cpe6":"19","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"3566","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"fedoraproject","cpe5":"fedora","cpe6":"20","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"3566","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"fedoraproject","cpe5":"fedora","cpe6":"21","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"3566","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"fedoraproject","cpe5":"fedora","cpe6":"19","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"3566","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"fedoraproject","cpe5":"fedora","cpe6":"20","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"3566","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"fedoraproject","cpe5":"fedora","cpe6":"21","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"3566","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"ibm","cpe5":"aix","cpe6":"5.3","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"3566","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"ibm","cpe5":"aix","cpe6":"6.1","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"3566","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"ibm","cpe5":"aix","cpe6":"7.1","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"3566","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"ibm","cpe5":"aix","cpe6":"5.3","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"3566","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"ibm","cpe5":"aix","cpe6":"6.1","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"3566","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"ibm","cpe5":"aix","cpe6":"7.1","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"3566","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"ibm","cpe5":"vios","cpe6":"2.2.0.10","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"3566","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"ibm","cpe5":"vios","cpe6":"2.2.0.11","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"3566","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"ibm","cpe5":"vios","cpe6":"2.2.0.12","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"3566","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"ibm","cpe5":"vios","cpe6":"2.2.0.13","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"3566","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"ibm","cpe5":"vios","cpe6":"2.2.1.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"3566","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"ibm","cpe5":"vios","cpe6":"2.2.1.1","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"3566","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"ibm","cpe5":"vios","cpe6":"2.2.1.3","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"3566","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"ibm","cpe5":"vios","cpe6":"2.2.1.4","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"3566","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"ibm","cpe5":"vios","cpe6":"2.2.1.5","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"3566","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"ibm","cpe5":"vios","cpe6":"2.2.1.6","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"3566","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"ibm","cpe5":"vios","cpe6":"2.2.1.7","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"3566","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"ibm","cpe5":"vios","cpe6":"2.2.1.8","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"3566","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"ibm","cpe5":"vios","cpe6":"2.2.1.9","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"3566","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"ibm","cpe5":"vios","cpe6":"2.2.2.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"3566","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"ibm","cpe5":"vios","cpe6":"2.2.2.1","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"3566","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"ibm","cpe5":"vios","cpe6":"2.2.2.2","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"3566","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"ibm","cpe5":"vios","cpe6":"2.2.2.3","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"3566","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"ibm","cpe5":"vios","cpe6":"2.2.2.4","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"3566","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"ibm","cpe5":"vios","cpe6":"2.2.2.5","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"3566","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"ibm","cpe5":"vios","cpe6":"2.2.3.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"3566","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"ibm","cpe5":"vios","cpe6":"2.2.3.1","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"3566","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"ibm","cpe5":"vios","cpe6":"2.2.3.2","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"3566","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"ibm","cpe5":"vios","cpe6":"2.2.3.3","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"3566","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"ibm","cpe5":"vios","cpe6":"2.2.3.4","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"3566","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"ibm","cpe5":"vios","cpe6":"2.2.0.10","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"3566","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"ibm","cpe5":"vios","cpe6":"2.2.0.11","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"3566","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"ibm","cpe5":"vios","cpe6":"2.2.0.12","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"3566","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"ibm","cpe5":"vios","cpe6":"2.2.0.13","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"3566","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"ibm","cpe5":"vios","cpe6":"2.2.1.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"3566","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"ibm","cpe5":"vios","cpe6":"2.2.1.1","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"3566","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"ibm","cpe5":"vios","cpe6":"2.2.1.3","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"3566","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"ibm","cpe5":"vios","cpe6":"2.2.1.4","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"3566","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"ibm","cpe5":"vios","cpe6":"2.2.1.5","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"3566","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"ibm","cpe5":"vios","cpe6":"2.2.1.6","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"3566","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"ibm","cpe5":"vios","cpe6":"2.2.1.7","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"3566","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"ibm","cpe5":"vios","cpe6":"2.2.1.8","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"3566","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"ibm","cpe5":"vios","cpe6":"2.2.1.9","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"3566","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"ibm","cpe5":"vios","cpe6":"2.2.2.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"3566","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"ibm","cpe5":"vios","cpe6":"2.2.2.1","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"3566","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"ibm","cpe5":"vios","cpe6":"2.2.2.2","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"3566","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"ibm","cpe5":"vios","cpe6":"2.2.2.3","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"3566","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"ibm","cpe5":"vios","cpe6":"2.2.2.4","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"3566","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"ibm","cpe5":"vios","cpe6":"2.2.2.5","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"3566","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"ibm","cpe5":"vios","cpe6":"2.2.3.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"3566","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"ibm","cpe5":"vios","cpe6":"2.2.3.1","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"3566","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"ibm","cpe5":"vios","cpe6":"2.2.3.2","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"3566","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"ibm","cpe5":"vios","cpe6":"2.2.3.3","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"3566","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"ibm","cpe5":"vios","cpe6":"2.2.3.4","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"3566","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"ibm","cpe5":"vios","cpe6":"2.2.0.10","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"3566","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"ibm","cpe5":"vios","cpe6":"2.2.0.11","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"3566","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"ibm","cpe5":"vios","cpe6":"2.2.0.12","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"3566","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"ibm","cpe5":"vios","cpe6":"2.2.0.13","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"3566","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"ibm","cpe5":"vios","cpe6":"2.2.1.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"3566","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"ibm","cpe5":"vios","cpe6":"2.2.1.1","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"3566","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"ibm","cpe5":"vios","cpe6":"2.2.1.3","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"3566","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"ibm","cpe5":"vios","cpe6":"2.2.1.4","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"3566","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"ibm","cpe5":"vios","cpe6":"2.2.1.5","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"3566","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"ibm","cpe5":"vios","cpe6":"2.2.1.6","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"3566","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"ibm","cpe5":"vios","cpe6":"2.2.1.7","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"3566","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"ibm","cpe5":"vios","cpe6":"2.2.1.8","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"3566","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"ibm","cpe5":"vios","cpe6":"2.2.1.9","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"3566","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"ibm","cpe5":"vios","cpe6":"2.2.2.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"3566","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"ibm","cpe5":"vios","cpe6":"2.2.2.1","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"3566","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"ibm","cpe5":"vios","cpe6":"2.2.2.2","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"3566","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"ibm","cpe5":"vios","cpe6":"2.2.2.3","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"3566","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"ibm","cpe5":"vios","cpe6":"2.2.2.4","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"3566","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"ibm","cpe5":"vios","cpe6":"2.2.2.5","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"3566","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"ibm","cpe5":"vios","cpe6":"2.2.3.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"3566","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"ibm","cpe5":"vios","cpe6":"2.2.3.1","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"3566","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"ibm","cpe5":"vios","cpe6":"2.2.3.2","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"3566","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"ibm","cpe5":"vios","cpe6":"2.2.3.3","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"3566","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"ibm","cpe5":"vios","cpe6":"2.2.3.4","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"3566","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"mageia","cpe5":"mageia","cpe6":"3.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"3566","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"mageia","cpe5":"mageia","cpe6":"4.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"3566","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"mageia","cpe5":"mageia","cpe6":"3.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"3566","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"mageia","cpe5":"mageia","cpe6":"4.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"3566","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"netbsd","cpe5":"netbsd","cpe6":"5.1","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"3566","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"netbsd","cpe5":"netbsd","cpe6":"5.1.1","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"3566","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"netbsd","cpe5":"netbsd","cpe6":"5.1.2","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"3566","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"netbsd","cpe5":"netbsd","cpe6":"5.1.3","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"3566","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"netbsd","cpe5":"netbsd","cpe6":"5.1.4","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"3566","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"netbsd","cpe5":"netbsd","cpe6":"5.2","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"3566","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"netbsd","cpe5":"netbsd","cpe6":"5.2.1","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"3566","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"netbsd","cpe5":"netbsd","cpe6":"5.2.2","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"3566","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"netbsd","cpe5":"netbsd","cpe6":"6.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"3566","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"netbsd","cpe5":"netbsd","cpe6":"6.0","cpe7":"beta","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"3566","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"netbsd","cpe5":"netbsd","cpe6":"6.0.1","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"3566","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"netbsd","cpe5":"netbsd","cpe6":"6.0.2","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"3566","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"netbsd","cpe5":"netbsd","cpe6":"6.0.3","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"3566","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"netbsd","cpe5":"netbsd","cpe6":"6.0.4","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"3566","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"netbsd","cpe5":"netbsd","cpe6":"6.0.5","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"3566","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"netbsd","cpe5":"netbsd","cpe6":"6.0.6","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"3566","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"netbsd","cpe5":"netbsd","cpe6":"6.1","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"3566","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"netbsd","cpe5":"netbsd","cpe6":"6.1.1","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"3566","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"netbsd","cpe5":"netbsd","cpe6":"6.1.2","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"3566","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"netbsd","cpe5":"netbsd","cpe6":"6.1.3","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"3566","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"netbsd","cpe5":"netbsd","cpe6":"6.1.4","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"3566","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"netbsd","cpe5":"netbsd","cpe6":"6.1.5","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"3566","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"netbsd","cpe5":"netbsd","cpe6":"5.1","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"3566","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"netbsd","cpe5":"netbsd","cpe6":"5.1.1","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"3566","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"netbsd","cpe5":"netbsd","cpe6":"5.1.2","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"3566","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"netbsd","cpe5":"netbsd","cpe6":"5.1.3","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"3566","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"netbsd","cpe5":"netbsd","cpe6":"5.1.4","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"3566","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"netbsd","cpe5":"netbsd","cpe6":"5.2","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"3566","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"netbsd","cpe5":"netbsd","cpe6":"5.2.1","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"3566","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"netbsd","cpe5":"netbsd","cpe6":"5.2.2","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"3566","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"netbsd","cpe5":"netbsd","cpe6":"6.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"3566","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"netbsd","cpe5":"netbsd","cpe6":"6.0","cpe7":"beta","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"3566","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"netbsd","cpe5":"netbsd","cpe6":"6.0.1","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"3566","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"netbsd","cpe5":"netbsd","cpe6":"6.0.2","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"3566","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"netbsd","cpe5":"netbsd","cpe6":"6.0.3","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"3566","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"netbsd","cpe5":"netbsd","cpe6":"6.0.4","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"3566","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"netbsd","cpe5":"netbsd","cpe6":"6.0.5","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"3566","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"netbsd","cpe5":"netbsd","cpe6":"6.0.6","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"3566","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"netbsd","cpe5":"netbsd","cpe6":"6.1","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"3566","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"netbsd","cpe5":"netbsd","cpe6":"6.1.1","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"3566","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"netbsd","cpe5":"netbsd","cpe6":"6.1.2","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"3566","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"netbsd","cpe5":"netbsd","cpe6":"6.1.3","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"3566","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"netbsd","cpe5":"netbsd","cpe6":"6.1.4","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"3566","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"netbsd","cpe5":"netbsd","cpe6":"6.1.5","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"3566","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"novell","cpe5":"suse_linux_enterprise_desktop","cpe6":"10.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"3566","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"novell","cpe5":"suse_linux_enterprise_desktop","cpe6":"11.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"3566","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"novell","cpe5":"suse_linux_enterprise_desktop","cpe6":"12.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"3566","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"novell","cpe5":"suse_linux_enterprise_desktop","cpe6":"9.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"3566","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"novell","cpe5":"suse_linux_enterprise_desktop","cpe6":"10.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"3566","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"novell","cpe5":"suse_linux_enterprise_desktop","cpe6":"11.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"3566","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"novell","cpe5":"suse_linux_enterprise_desktop","cpe6":"12.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"3566","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"novell","cpe5":"suse_linux_enterprise_desktop","cpe6":"9.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"3566","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"novell","cpe5":"suse_linux_enterprise_server","cpe6":"11.0","cpe7":"sp3","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"3566","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"novell","cpe5":"suse_linux_enterprise_server","cpe6":"11.0","cpe7":"sp3","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"vmware","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"3566","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"novell","cpe5":"suse_linux_enterprise_server","cpe6":"12.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"3566","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"novell","cpe5":"suse_linux_enterprise_server","cpe6":"11.0","cpe7":"sp3","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"3566","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"novell","cpe5":"suse_linux_enterprise_server","cpe6":"11.0","cpe7":"sp3","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"vmware","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"3566","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"novell","cpe5":"suse_linux_enterprise_server","cpe6":"12.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"3566","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"novell","cpe5":"suse_linux_enterprise_software_development_kit","cpe6":"11.0","cpe7":"sp3","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"3566","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"novell","cpe5":"suse_linux_enterprise_software_development_kit","cpe6":"12.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"3566","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"novell","cpe5":"suse_linux_enterprise_software_development_kit","cpe6":"11.0","cpe7":"sp3","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"3566","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"novell","cpe5":"suse_linux_enterprise_software_development_kit","cpe6":"12.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"3566","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"novell","cpe5":"suse_linux_enterprise_software_development_kit","cpe6":"11.0","cpe7":"sp3","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"3566","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"novell","cpe5":"suse_linux_enterprise_software_development_kit","cpe6":"12.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"3566","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"openssl","cpe5":"openssl","cpe6":"0.9.8","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"3566","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"openssl","cpe5":"openssl","cpe6":"0.9.8a","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"3566","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"openssl","cpe5":"openssl","cpe6":"0.9.8b","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"3566","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"openssl","cpe5":"openssl","cpe6":"0.9.8c","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"3566","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"openssl","cpe5":"openssl","cpe6":"0.9.8d","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"3566","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"openssl","cpe5":"openssl","cpe6":"0.9.8e","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"3566","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"openssl","cpe5":"openssl","cpe6":"0.9.8f","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"3566","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"openssl","cpe5":"openssl","cpe6":"0.9.8g","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"3566","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"openssl","cpe5":"openssl","cpe6":"0.9.8h","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"3566","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"openssl","cpe5":"openssl","cpe6":"0.9.8i","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"3566","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"openssl","cpe5":"openssl","cpe6":"0.9.8j","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"3566","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"openssl","cpe5":"openssl","cpe6":"0.9.8k","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"3566","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"openssl","cpe5":"openssl","cpe6":"0.9.8l","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"3566","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"openssl","cpe5":"openssl","cpe6":"0.9.8m","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"3566","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"openssl","cpe5":"openssl","cpe6":"0.9.8m","cpe7":"beta1","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"3566","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"openssl","cpe5":"openssl","cpe6":"0.9.8n","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"3566","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"openssl","cpe5":"openssl","cpe6":"0.9.8o","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"3566","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"openssl","cpe5":"openssl","cpe6":"0.9.8p","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"3566","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"openssl","cpe5":"openssl","cpe6":"0.9.8q","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"3566","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"openssl","cpe5":"openssl","cpe6":"0.9.8r","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"3566","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"openssl","cpe5":"openssl","cpe6":"0.9.8s","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"3566","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"openssl","cpe5":"openssl","cpe6":"0.9.8t","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"3566","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"openssl","cpe5":"openssl","cpe6":"0.9.8u","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"3566","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"openssl","cpe5":"openssl","cpe6":"0.9.8v","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"3566","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"openssl","cpe5":"openssl","cpe6":"0.9.8w","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"3566","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"openssl","cpe5":"openssl","cpe6":"0.9.8x","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"3566","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"openssl","cpe5":"openssl","cpe6":"0.9.8y","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"3566","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"openssl","cpe5":"openssl","cpe6":"0.9.8z","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"3566","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"openssl","cpe5":"openssl","cpe6":"0.9.8za","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"3566","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"openssl","cpe5":"openssl","cpe6":"0.9.8zb","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"3566","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"openssl","cpe5":"openssl","cpe6":"1.0.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"3566","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"openssl","cpe5":"openssl","cpe6":"1.0.0","cpe7":"beta1","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"3566","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"openssl","cpe5":"openssl","cpe6":"1.0.0","cpe7":"beta2","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"3566","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"openssl","cpe5":"openssl","cpe6":"1.0.0","cpe7":"beta3","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"3566","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"openssl","cpe5":"openssl","cpe6":"1.0.0","cpe7":"beta4","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"3566","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"openssl","cpe5":"openssl","cpe6":"1.0.0","cpe7":"beta5","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"3566","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"openssl","cpe5":"openssl","cpe6":"1.0.0a","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"3566","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"openssl","cpe5":"openssl","cpe6":"1.0.0b","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"3566","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"openssl","cpe5":"openssl","cpe6":"1.0.0c","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"3566","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"openssl","cpe5":"openssl","cpe6":"1.0.0d","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"3566","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"openssl","cpe5":"openssl","cpe6":"1.0.0e","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"3566","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"openssl","cpe5":"openssl","cpe6":"1.0.0f","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"3566","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"openssl","cpe5":"openssl","cpe6":"1.0.0g","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"3566","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"openssl","cpe5":"openssl","cpe6":"1.0.0h","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"3566","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"openssl","cpe5":"openssl","cpe6":"1.0.0i","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"3566","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"openssl","cpe5":"openssl","cpe6":"1.0.0j","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"3566","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"openssl","cpe5":"openssl","cpe6":"1.0.0k","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"3566","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"openssl","cpe5":"openssl","cpe6":"1.0.0l","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"3566","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"openssl","cpe5":"openssl","cpe6":"1.0.0m","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"3566","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"openssl","cpe5":"openssl","cpe6":"1.0.0n","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"3566","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"openssl","cpe5":"openssl","cpe6":"1.0.1","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"3566","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"openssl","cpe5":"openssl","cpe6":"1.0.1","cpe7":"beta1","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"3566","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"openssl","cpe5":"openssl","cpe6":"1.0.1","cpe7":"beta2","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"3566","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"openssl","cpe5":"openssl","cpe6":"1.0.1","cpe7":"beta3","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"3566","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"openssl","cpe5":"openssl","cpe6":"1.0.1a","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"3566","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"openssl","cpe5":"openssl","cpe6":"1.0.1b","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"3566","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"openssl","cpe5":"openssl","cpe6":"1.0.1c","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"3566","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"openssl","cpe5":"openssl","cpe6":"1.0.1d","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"3566","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"openssl","cpe5":"openssl","cpe6":"1.0.1e","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"3566","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"openssl","cpe5":"openssl","cpe6":"1.0.1f","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"3566","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"openssl","cpe5":"openssl","cpe6":"1.0.1g","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"3566","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"openssl","cpe5":"openssl","cpe6":"1.0.1h","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"3566","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"openssl","cpe5":"openssl","cpe6":"1.0.1i","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"3566","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"openssl","cpe5":"openssl","cpe6":"0.9.8","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"3566","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"openssl","cpe5":"openssl","cpe6":"0.9.8a","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"3566","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"openssl","cpe5":"openssl","cpe6":"0.9.8b","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"3566","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"openssl","cpe5":"openssl","cpe6":"0.9.8c","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"3566","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"openssl","cpe5":"openssl","cpe6":"0.9.8d","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"3566","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"openssl","cpe5":"openssl","cpe6":"0.9.8e","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"3566","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"openssl","cpe5":"openssl","cpe6":"0.9.8f","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"3566","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"openssl","cpe5":"openssl","cpe6":"0.9.8g","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"3566","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"openssl","cpe5":"openssl","cpe6":"0.9.8h","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"3566","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"openssl","cpe5":"openssl","cpe6":"0.9.8i","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"3566","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"openssl","cpe5":"openssl","cpe6":"0.9.8j","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"3566","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"openssl","cpe5":"openssl","cpe6":"0.9.8k","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"3566","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"openssl","cpe5":"openssl","cpe6":"0.9.8l","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"3566","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"openssl","cpe5":"openssl","cpe6":"0.9.8m","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"3566","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"openssl","cpe5":"openssl","cpe6":"0.9.8m","cpe7":"beta1","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"3566","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"openssl","cpe5":"openssl","cpe6":"0.9.8n","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"3566","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"openssl","cpe5":"openssl","cpe6":"0.9.8o","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"3566","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"openssl","cpe5":"openssl","cpe6":"0.9.8p","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"3566","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"openssl","cpe5":"openssl","cpe6":"0.9.8q","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"3566","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"openssl","cpe5":"openssl","cpe6":"0.9.8r","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"3566","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"openssl","cpe5":"openssl","cpe6":"0.9.8s","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"3566","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"openssl","cpe5":"openssl","cpe6":"0.9.8t","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"3566","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"openssl","cpe5":"openssl","cpe6":"0.9.8u","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"3566","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"openssl","cpe5":"openssl","cpe6":"0.9.8v","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"3566","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"openssl","cpe5":"openssl","cpe6":"0.9.8w","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"3566","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"openssl","cpe5":"openssl","cpe6":"0.9.8x","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"3566","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"openssl","cpe5":"openssl","cpe6":"0.9.8y","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"3566","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"openssl","cpe5":"openssl","cpe6":"0.9.8z","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"3566","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"openssl","cpe5":"openssl","cpe6":"0.9.8za","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"3566","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"openssl","cpe5":"openssl","cpe6":"0.9.8zb","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"3566","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"openssl","cpe5":"openssl","cpe6":"1.0.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"3566","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"openssl","cpe5":"openssl","cpe6":"1.0.0","cpe7":"beta1","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"3566","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"openssl","cpe5":"openssl","cpe6":"1.0.0","cpe7":"beta2","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"3566","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"openssl","cpe5":"openssl","cpe6":"1.0.0","cpe7":"beta3","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"3566","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"openssl","cpe5":"openssl","cpe6":"1.0.0","cpe7":"beta4","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"3566","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"openssl","cpe5":"openssl","cpe6":"1.0.0","cpe7":"beta5","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"3566","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"openssl","cpe5":"openssl","cpe6":"1.0.0a","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"3566","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"openssl","cpe5":"openssl","cpe6":"1.0.0b","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"3566","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"openssl","cpe5":"openssl","cpe6":"1.0.0c","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"3566","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"openssl","cpe5":"openssl","cpe6":"1.0.0d","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"3566","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"openssl","cpe5":"openssl","cpe6":"1.0.0e","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"3566","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"openssl","cpe5":"openssl","cpe6":"1.0.0f","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"3566","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"openssl","cpe5":"openssl","cpe6":"1.0.0g","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"3566","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"openssl","cpe5":"openssl","cpe6":"1.0.0h","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"3566","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"openssl","cpe5":"openssl","cpe6":"1.0.0i","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"3566","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"openssl","cpe5":"openssl","cpe6":"1.0.0j","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"3566","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"openssl","cpe5":"openssl","cpe6":"1.0.0k","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"3566","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"openssl","cpe5":"openssl","cpe6":"1.0.0l","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"3566","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"openssl","cpe5":"openssl","cpe6":"1.0.0m","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"3566","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"openssl","cpe5":"openssl","cpe6":"1.0.0n","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"3566","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"openssl","cpe5":"openssl","cpe6":"1.0.1","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"3566","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"openssl","cpe5":"openssl","cpe6":"1.0.1","cpe7":"beta1","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"3566","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"openssl","cpe5":"openssl","cpe6":"1.0.1","cpe7":"beta2","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"3566","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"openssl","cpe5":"openssl","cpe6":"1.0.1","cpe7":"beta3","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"3566","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"openssl","cpe5":"openssl","cpe6":"1.0.1a","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"3566","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"openssl","cpe5":"openssl","cpe6":"1.0.1b","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"3566","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"openssl","cpe5":"openssl","cpe6":"1.0.1c","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"3566","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"openssl","cpe5":"openssl","cpe6":"1.0.1d","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"3566","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"openssl","cpe5":"openssl","cpe6":"1.0.1e","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"3566","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"openssl","cpe5":"openssl","cpe6":"1.0.1f","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"3566","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"openssl","cpe5":"openssl","cpe6":"1.0.1g","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"3566","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"openssl","cpe5":"openssl","cpe6":"1.0.1h","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"3566","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"openssl","cpe5":"openssl","cpe6":"1.0.1i","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"3566","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"opensuse","cpe5":"opensuse","cpe6":"12.3","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"3566","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"opensuse","cpe5":"opensuse","cpe6":"13.1","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"3566","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"opensuse","cpe5":"opensuse","cpe6":"12.3","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"3566","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"opensuse","cpe5":"opensuse","cpe6":"13.1","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"3566","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"oracle","cpe5":"database","cpe6":"11.2.0.4","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"3566","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"oracle","cpe5":"database","cpe6":"12.1.0.2","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"3566","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"oracle","cpe5":"database","cpe6":"11.2.0.4","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"3566","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"oracle","cpe5":"database","cpe6":"12.1.0.2","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"3566","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"redhat","cpe5":"enterprise_linux","cpe6":"5","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"3566","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"redhat","cpe5":"enterprise_linux","cpe6":"5","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"3566","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"redhat","cpe5":"enterprise_linux_desktop","cpe6":"6.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"3566","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"redhat","cpe5":"enterprise_linux_desktop","cpe6":"7.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"3566","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"redhat","cpe5":"enterprise_linux_desktop","cpe6":"6.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"3566","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"redhat","cpe5":"enterprise_linux_desktop","cpe6":"7.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"3566","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"redhat","cpe5":"enterprise_linux_desktop_supplementary","cpe6":"5.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"3566","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"redhat","cpe5":"enterprise_linux_desktop_supplementary","cpe6":"6.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"3566","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"redhat","cpe5":"enterprise_linux_desktop_supplementary","cpe6":"5.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"3566","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"redhat","cpe5":"enterprise_linux_desktop_supplementary","cpe6":"6.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"3566","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"redhat","cpe5":"enterprise_linux_server","cpe6":"6.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"3566","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"redhat","cpe5":"enterprise_linux_server","cpe6":"7.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"3566","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"redhat","cpe5":"enterprise_linux_server","cpe6":"6.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"3566","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"redhat","cpe5":"enterprise_linux_server","cpe6":"7.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"3566","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"redhat","cpe5":"enterprise_linux_server_supplementary","cpe6":"5.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"3566","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"redhat","cpe5":"enterprise_linux_server_supplementary","cpe6":"6.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"3566","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"redhat","cpe5":"enterprise_linux_server_supplementary","cpe6":"7.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"3566","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"redhat","cpe5":"enterprise_linux_server_supplementary","cpe6":"5.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"3566","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"redhat","cpe5":"enterprise_linux_server_supplementary","cpe6":"6.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"3566","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"redhat","cpe5":"enterprise_linux_server_supplementary","cpe6":"7.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"3566","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"redhat","cpe5":"enterprise_linux_workstation","cpe6":"6.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"3566","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"redhat","cpe5":"enterprise_linux_workstation","cpe6":"7.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"3566","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"redhat","cpe5":"enterprise_linux_workstation","cpe6":"6.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"3566","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"redhat","cpe5":"enterprise_linux_workstation","cpe6":"7.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"3566","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"redhat","cpe5":"enterprise_linux_workstation_supplementary","cpe6":"6.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"3566","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"redhat","cpe5":"enterprise_linux_workstation_supplementary","cpe6":"7.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"3566","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"redhat","cpe5":"enterprise_linux_workstation_supplementary","cpe6":"6.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"3566","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"redhat","cpe5":"enterprise_linux_workstation_supplementary","cpe6":"7.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[{"cve":"CVE-2014-3566","qid":"390226","title":"Oracle Managed Virtualization (VM) Server for x86 Security Update for Open Secure Sockets Layer (OpenSSL) (OVMSA-2021-0011)"},{"cve":"CVE-2014-3566","qid":"390284","title":"Oracle Managed Virtualization (VM) Server for x86 Security Update for Open Secure Sockets Layer (OpenSSL) (OVMSA-2023-0013)"},{"cve":"CVE-2014-3566","qid":"590349","title":"Rockwell Automation Stratix 5900 Multiple Vulnerabilities (ICSA-17-094-04)"},{"cve":"CVE-2014-3566","qid":"590888","title":"Phoenix Contact Innominate mGuard Secure Sockets Layer (SSL) protocol 3.0 Security Vulnerability (20141022_001)"},{"cve":"CVE-2014-3566","qid":"590920","title":"ABB Relion 650 series Secure Sockets Layer (SSL) 3.0 Protocol and POODLE Attack Multiple Vulnerabilities (ABB-VU-PSAC-1MRG018009)"},{"cve":"CVE-2014-3566","qid":"591002","title":"ABB ETL600 series POODLE Attack and Secure Sockets Layer (SSL) 3.0 Protocol Vulnerability (ABB-VU-PSAC- 1KHW028571)"},{"cve":"CVE-2014-3566","qid":"591311","title":"Bosch Rexroth PRA-ES8P2S Ethernet-Switch Multiple Vulnerabilities (BOSCH-SA-247053-BT)"},{"cve":"CVE-2014-3566","qid":"591350","title":"General Electric D20MX Open Secure Sockets Layer (OpenSSL) Multiple Vulnerabilities (PRSN-0006)"},{"cve":"CVE-2014-3566","qid":"591378","title":"ABB RTU500 series Secure Sockets Layer (SSL) 3.0 Protocol and POODLE Attack in the webserver component Vulnerability (ABB-VU-PSAC-1KGT090264)"},{"cve":"CVE-2014-3566","qid":"591388","title":"ABB AFx series Secure Sockets Layer (SSL) 3.0 Protocol and POODLE Attack Vulnerability (ABB-VU-PSAC- 1KHW028569)"},{"cve":"CVE-2014-3566","qid":"671109","title":"EulerOS Security Update for Open Secure Sockets Layer098e (OpenSSL098e) (EulerOS-SA-2019-2509)"}]},"source_records":{"cve_program":{"data_version":"4.0","data_type":"CVE","data_format":"MITRE","CVE_data_meta":{"ID":"CVE-2014-3566","ASSIGNER":"secalert@redhat.com","STATE":"PUBLIC"},"description":{"description_data":[{"lang":"eng","value":"The SSL protocol 3.0, as used in OpenSSL through 1.0.1i and other products, uses nondeterministic CBC padding, which makes it easier for man-in-the-middle attackers to obtain cleartext data via a padding-oracle attack, aka the \"POODLE\" issue."}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"n/a"}]}]},"affects":{"vendor":{"vendor_data":[{"vendor_name":"n/a","product":{"product_data":[{"product_name":"n/a","version":{"version_data":[{"version_affected":"=","version_value":"n/a"}]}}]}}]}},"references":{"reference_data":[{"url":"https://ics-cert.us-cert.gov/advisories/ICSMA-18-058-02","refsource":"MISC","name":"https://ics-cert.us-cert.gov/advisories/ICSMA-18-058-02"},{"url":"http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10705","refsource":"MISC","name":"http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10705"},{"url":"https://lists.apache.org/thread.html/r36e44ffc1a9b365327df62cdfaabe85b9a5637de102cea07d79b2dbf%40%3Ccommits.cxf.apache.org%3E","refsource":"MISC","name":"https://lists.apache.org/thread.html/r36e44ffc1a9b365327df62cdfaabe85b9a5637de102cea07d79b2dbf%40%3Ccommits.cxf.apache.org%3E"},{"url":"https://lists.apache.org/thread.html/rd49aabd984ed540c8ff7916d4d79405f3fa311d2fdbcf9ed307839a6%40%3Ccommits.cxf.apache.org%3E","refsource":"MISC","name":"https://lists.apache.org/thread.html/rd49aabd984ed540c8ff7916d4d79405f3fa311d2fdbcf9ed307839a6%40%3Ccommits.cxf.apache.org%3E"},{"url":"https://lists.apache.org/thread.html/rec7160382badd3ef4ad017a22f64a266c7188b9ba71394f0d321e2d4%40%3Ccommits.cxf.apache.org%3E","refsource":"MISC","name":"https://lists.apache.org/thread.html/rec7160382badd3ef4ad017a22f64a266c7188b9ba71394f0d321e2d4%40%3Ccommits.cxf.apache.org%3E"},{"url":"https://lists.apache.org/thread.html/rfb87e0bf3995e7d560afeed750fac9329ff5f1ad49da365129b7f89e%40%3Ccommits.cxf.apache.org%3E","refsource":"MISC","name":"https://lists.apache.org/thread.html/rfb87e0bf3995e7d560afeed750fac9329ff5f1ad49da365129b7f89e%40%3Ccommits.cxf.apache.org%3E"},{"url":"https://lists.apache.org/thread.html/rff42cfa5e7d75b7c1af0e37589140a8f1999e578a75738740b244bd4%40%3Ccommits.cxf.apache.org%3E","refsource":"MISC","name":"https://lists.apache.org/thread.html/rff42cfa5e7d75b7c1af0e37589140a8f1999e578a75738740b244bd4%40%3Ccommits.cxf.apache.org%3E"},{"url":"http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html","refsource":"MISC","name":"http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html"},{"url":"http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html","refsource":"MISC","name":"http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html"},{"url":"http://archives.neohapsis.com/archives/bugtraq/2014-10/0101.html","refsource":"MISC","name":"http://archives.neohapsis.com/archives/bugtraq/2014-10/0101.html"},{"url":"https://support.apple.com/kb/HT6535","refsource":"MISC","name":"https://support.apple.com/kb/HT6535"},{"url":"http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html","refsource":"MISC","name":"http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html"},{"url":"http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html","refsource":"MISC","name":"http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html"},{"url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00066.html","refsource":"MISC","name":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00066.html"},{"url":"http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00000.html","refsource":"MISC","name":"http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00000.html"},{"url":"https://lists.apache.org/thread.html/rc774278135816e7afc943dc9fc78eb0764f2c84a2b96470a0187315c%40%3Ccommits.cxf.apache.org%3E","refsource":"MISC","name":"https://lists.apache.org/thread.html/rc774278135816e7afc943dc9fc78eb0764f2c84a2b96470a0187315c%40%3Ccommits.cxf.apache.org%3E"},{"url":"http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html","refsource":"MISC","name":"http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html"},{"url":"http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html","refsource":"MISC","name":"http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html"},{"url":"http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html","refsource":"MISC","name":"http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html"},{"url":"http://archives.neohapsis.com/archives/bugtraq/2014-10/0103.html","refsource":"MISC","name":"http://archives.neohapsis.com/archives/bugtraq/2014-10/0103.html"},{"url":"https://support.apple.com/kb/HT6536","refsource":"MISC","name":"https://support.apple.com/kb/HT6536"},{"url":"http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html","refsource":"MISC","name":"http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html"},{"url":"http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00011.html","refsource":"MISC","name":"http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00011.html"},{"url":"http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html","refsource":"MISC","name":"http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html"},{"url":"http://www.oracle.com/technetwork/topics/security/bulletinjul2015-2511963.html","refsource":"MISC","name":"http://www.oracle.com/technetwork/topics/security/bulletinjul2015-2511963.html"},{"url":"https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05157667","refsource":"MISC","name":"https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05157667"},{"url":"https://support.citrix.com/article/CTX216642","refsource":"MISC","name":"https://support.citrix.com/article/CTX216642"},{"url":"http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html","refsource":"MISC","name":"http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html"},{"url":"http://marc.info/?l=bugtraq&m=142660345230545&w=2","refsource":"MISC","name":"http://marc.info/?l=bugtraq&m=142660345230545&w=2"},{"url":"http://www.debian.org/security/2015/dsa-3253","refsource":"MISC","name":"http://www.debian.org/security/2015/dsa-3253"},{"url":"http://marc.info/?l=bugtraq&m=141576815022399&w=2","refsource":"MISC","name":"http://marc.info/?l=bugtraq&m=141576815022399&w=2"},{"url":"http://www.mandriva.com/security/advisories?name=MDVSA-2015:062","refsource":"MISC","name":"http://www.mandriva.com/security/advisories?name=MDVSA-2015:062"},{"url":"https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05301946","refsource":"MISC","name":"https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05301946"},{"url":"http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html","refsource":"MISC","name":"http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html"},{"url":"ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2014-015.txt.asc","refsource":"MISC","name":"ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2014-015.txt.asc"},{"url":"http://advisories.mageia.org/MGASA-2014-0416.html","refsource":"MISC","name":"http://advisories.mageia.org/MGASA-2014-0416.html"},{"url":"http://aix.software.ibm.com/aix/efixes/security/openssl_advisory11.asc","refsource":"MISC","name":"http://aix.software.ibm.com/aix/efixes/security/openssl_advisory11.asc"},{"url":"http://askubuntu.com/questions/537196/how-do-i-patch-workaround-sslv3-poodle-vulnerability-cve-2014-3566","refsource":"MISC","name":"http://askubuntu.com/questions/537196/how-do-i-patch-workaround-sslv3-poodle-vulnerability-cve-2014-3566"},{"url":"http://blog.cryptographyengineering.com/2014/10/attack-of-week-poodle.html","refsource":"MISC","name":"http://blog.cryptographyengineering.com/2014/10/attack-of-week-poodle.html"},{"url":"http://blog.nodejs.org/2014/10/23/node-v0-10-33-stable/","refsource":"MISC","name":"http://blog.nodejs.org/2014/10/23/node-v0-10-33-stable/"},{"url":"http://blogs.technet.com/b/msrc/archive/2014/10/14/security-advisory-3009008-released.aspx","refsource":"MISC","name":"http://blogs.technet.com/b/msrc/archive/2014/10/14/security-advisory-3009008-released.aspx"},{"url":"http://docs.ipswitch.com/MOVEit/DMZ82/ReleaseNotes/MOVEitReleaseNotes82.pdf","refsource":"MISC","name":"http://docs.ipswitch.com/MOVEit/DMZ82/ReleaseNotes/MOVEitReleaseNotes82.pdf"},{"url":"http://downloads.asterisk.org/pub/security/AST-2014-011.html","refsource":"MISC","name":"http://downloads.asterisk.org/pub/security/AST-2014-011.html"},{"url":"http://googleonlinesecurity.blogspot.com/2014/10/this-poodle-bites-exploiting-ssl-30.html","refsource":"MISC","name":"http://googleonlinesecurity.blogspot.com/2014/10/this-poodle-bites-exploiting-ssl-30.html"},{"url":"http://h20564.www2.hp.com/hpsc/doc/public/display?docId=emr_na-c04583581","refsource":"MISC","name":"http://h20564.www2.hp.com/hpsc/doc/public/display?docId=emr_na-c04583581"},{"url":"http://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c04779034","refsource":"MISC","name":"http://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c04779034"},{"url":"http://lists.apple.com/archives/security-announce/2015/Jan/msg00003.html","refsource":"MISC","name":"http://lists.apple.com/archives/security-announce/2015/Jan/msg00003.html"},{"url":"http://lists.apple.com/archives/security-announce/2015/Sep/msg00002.html","refsource":"MISC","name":"http://lists.apple.com/archives/security-announce/2015/Sep/msg00002.html"},{"url":"http://lists.fedoraproject.org/pipermail/package-announce/2014-November/142330.html","refsource":"MISC","name":"http://lists.fedoraproject.org/pipermail/package-announce/2014-November/142330.html"},{"url":"http://lists.fedoraproject.org/pipermail/package-announce/2014-October/141114.html","refsource":"MISC","name":"http://lists.fedoraproject.org/pipermail/package-announce/2014-October/141114.html"},{"url":"http://lists.fedoraproject.org/pipermail/package-announce/2014-October/141158.html","refsource":"MISC","name":"http://lists.fedoraproject.org/pipermail/package-announce/2014-October/141158.html"},{"url":"http://lists.fedoraproject.org/pipermail/package-announce/2015-October/169361.html","refsource":"MISC","name":"http://lists.fedoraproject.org/pipermail/package-announce/2015-October/169361.html"},{"url":"http://lists.fedoraproject.org/pipermail/package-announce/2015-October/169374.html","refsource":"MISC","name":"http://lists.fedoraproject.org/pipermail/package-announce/2015-October/169374.html"},{"url":"http://lists.opensuse.org/opensuse-security-announce/2014-10/msg00008.html","refsource":"MISC","name":"http://lists.opensuse.org/opensuse-security-announce/2014-10/msg00008.html"},{"url":"http://lists.opensuse.org/opensuse-security-announce/2014-11/msg00001.html","refsource":"MISC","name":"http://lists.opensuse.org/opensuse-security-announce/2014-11/msg00001.html"},{"url":"http://lists.opensuse.org/opensuse-security-announce/2014-11/msg00003.html","refsource":"MISC","name":"http://lists.opensuse.org/opensuse-security-announce/2014-11/msg00003.html"},{"url":"http://lists.opensuse.org/opensuse-security-announce/2014-11/msg00021.html","refsource":"MISC","name":"http://lists.opensuse.org/opensuse-security-announce/2014-11/msg00021.html"},{"url":"http://lists.opensuse.org/opensuse-security-announce/2014-12/msg00002.html","refsource":"MISC","name":"http://lists.opensuse.org/opensuse-security-announce/2014-12/msg00002.html"},{"url":"http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00001.html","refsource":"MISC","name":"http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00001.html"},{"url":"http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00024.html","refsource":"MISC","name":"http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00024.html"},{"url":"http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00026.html","refsource":"MISC","name":"http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00026.html"},{"url":"http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00027.html","refsource":"MISC","name":"http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00027.html"},{"url":"http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00033.html","refsource":"MISC","name":"http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00033.html"},{"url":"http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00036.html","refsource":"MISC","name":"http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00036.html"},{"url":"http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00018.html","refsource":"MISC","name":"http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00018.html"},{"url":"http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00027.html","refsource":"MISC","name":"http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00027.html"},{"url":"http://marc.info/?l=bugtraq&m=141450452204552&w=2","refsource":"MISC","name":"http://marc.info/?l=bugtraq&m=141450452204552&w=2"},{"url":"http://marc.info/?l=bugtraq&m=141450973807288&w=2","refsource":"MISC","name":"http://marc.info/?l=bugtraq&m=141450973807288&w=2"},{"url":"http://marc.info/?l=bugtraq&m=141477196830952&w=2","refsource":"MISC","name":"http://marc.info/?l=bugtraq&m=141477196830952&w=2"},{"url":"http://marc.info/?l=bugtraq&m=141577087123040&w=2","refsource":"MISC","name":"http://marc.info/?l=bugtraq&m=141577087123040&w=2"},{"url":"http://marc.info/?l=bugtraq&m=141577350823734&w=2","refsource":"MISC","name":"http://marc.info/?l=bugtraq&m=141577350823734&w=2"},{"url":"http://marc.info/?l=bugtraq&m=141620103726640&w=2","refsource":"MISC","name":"http://marc.info/?l=bugtraq&m=141620103726640&w=2"},{"url":"http://marc.info/?l=bugtraq&m=141628688425177&w=2","refsource":"MISC","name":"http://marc.info/?l=bugtraq&m=141628688425177&w=2"},{"url":"http://marc.info/?l=bugtraq&m=141694355519663&w=2","refsource":"MISC","name":"http://marc.info/?l=bugtraq&m=141694355519663&w=2"},{"url":"http://marc.info/?l=bugtraq&m=141697638231025&w=2","refsource":"MISC","name":"http://marc.info/?l=bugtraq&m=141697638231025&w=2"},{"url":"http://marc.info/?l=bugtraq&m=141697676231104&w=2","refsource":"MISC","name":"http://marc.info/?l=bugtraq&m=141697676231104&w=2"},{"url":"http://marc.info/?l=bugtraq&m=141703183219781&w=2","refsource":"MISC","name":"http://marc.info/?l=bugtraq&m=141703183219781&w=2"},{"url":"http://marc.info/?l=bugtraq&m=141715130023061&w=2","refsource":"MISC","name":"http://marc.info/?l=bugtraq&m=141715130023061&w=2"},{"url":"http://marc.info/?l=bugtraq&m=141775427104070&w=2","refsource":"MISC","name":"http://marc.info/?l=bugtraq&m=141775427104070&w=2"},{"url":"http://marc.info/?l=bugtraq&m=141813976718456&w=2","refsource":"MISC","name":"http://marc.info/?l=bugtraq&m=141813976718456&w=2"},{"url":"http://marc.info/?l=bugtraq&m=141814011518700&w=2","refsource":"MISC","name":"http://marc.info/?l=bugtraq&m=141814011518700&w=2"},{"url":"http://marc.info/?l=bugtraq&m=141879378918327&w=2","refsource":"MISC","name":"http://marc.info/?l=bugtraq&m=141879378918327&w=2"},{"url":"http://marc.info/?l=bugtraq&m=142103967620673&w=2","refsource":"MISC","name":"http://marc.info/?l=bugtraq&m=142103967620673&w=2"},{"url":"http://marc.info/?l=bugtraq&m=142118135300698&w=2","refsource":"MISC","name":"http://marc.info/?l=bugtraq&m=142118135300698&w=2"},{"url":"http://marc.info/?l=bugtraq&m=142296755107581&w=2","refsource":"MISC","name":"http://marc.info/?l=bugtraq&m=142296755107581&w=2"},{"url":"http://marc.info/?l=bugtraq&m=142350196615714&w=2","refsource":"MISC","name":"http://marc.info/?l=bugtraq&m=142350196615714&w=2"},{"url":"http://marc.info/?l=bugtraq&m=142350298616097&w=2","refsource":"MISC","name":"http://marc.info/?l=bugtraq&m=142350298616097&w=2"},{"url":"http://marc.info/?l=bugtraq&m=142350743917559&w=2","refsource":"MISC","name":"http://marc.info/?l=bugtraq&m=142350743917559&w=2"},{"url":"http://marc.info/?l=bugtraq&m=142354438527235&w=2","refsource":"MISC","name":"http://marc.info/?l=bugtraq&m=142354438527235&w=2"},{"url":"http://marc.info/?l=bugtraq&m=142357976805598&w=2","refsource":"MISC","name":"http://marc.info/?l=bugtraq&m=142357976805598&w=2"},{"url":"http://marc.info/?l=bugtraq&m=142495837901899&w=2","refsource":"MISC","name":"http://marc.info/?l=bugtraq&m=142495837901899&w=2"},{"url":"http://marc.info/?l=bugtraq&m=142496355704097&w=2","refsource":"MISC","name":"http://marc.info/?l=bugtraq&m=142496355704097&w=2"},{"url":"http://marc.info/?l=bugtraq&m=142546741516006&w=2","refsource":"MISC","name":"http://marc.info/?l=bugtraq&m=142546741516006&w=2"},{"url":"http://marc.info/?l=bugtraq&m=142607790919348&w=2","refsource":"MISC","name":"http://marc.info/?l=bugtraq&m=142607790919348&w=2"},{"url":"http://marc.info/?l=bugtraq&m=142624590206005&w=2","refsource":"MISC","name":"http://marc.info/?l=bugtraq&m=142624590206005&w=2"},{"url":"http://marc.info/?l=bugtraq&m=142624619906067","refsource":"MISC","name":"http://marc.info/?l=bugtraq&m=142624619906067"},{"url":"http://marc.info/?l=bugtraq&m=142624619906067&w=2","refsource":"MISC","name":"http://marc.info/?l=bugtraq&m=142624619906067&w=2"},{"url":"http://marc.info/?l=bugtraq&m=142624679706236&w=2","refsource":"MISC","name":"http://marc.info/?l=bugtraq&m=142624679706236&w=2"},{"url":"http://marc.info/?l=bugtraq&m=142624719706349&w=2","refsource":"MISC","name":"http://marc.info/?l=bugtraq&m=142624719706349&w=2"},{"url":"http://marc.info/?l=bugtraq&m=142721830231196&w=2","refsource":"MISC","name":"http://marc.info/?l=bugtraq&m=142721830231196&w=2"},{"url":"http://marc.info/?l=bugtraq&m=142721887231400&w=2","refsource":"MISC","name":"http://marc.info/?l=bugtraq&m=142721887231400&w=2"},{"url":"http://marc.info/?l=bugtraq&m=142740155824959&w=2","refsource":"MISC","name":"http://marc.info/?l=bugtraq&m=142740155824959&w=2"},{"url":"http://marc.info/?l=bugtraq&m=142791032306609&w=2","refsource":"MISC","name":"http://marc.info/?l=bugtraq&m=142791032306609&w=2"},{"url":"http://marc.info/?l=bugtraq&m=142804214608580&w=2","refsource":"MISC","name":"http://marc.info/?l=bugtraq&m=142804214608580&w=2"},{"url":"http://marc.info/?l=bugtraq&m=142805027510172&w=2","refsource":"MISC","name":"http://marc.info/?l=bugtraq&m=142805027510172&w=2"},{"url":"http://marc.info/?l=bugtraq&m=142962817202793&w=2","refsource":"MISC","name":"http://marc.info/?l=bugtraq&m=142962817202793&w=2"},{"url":"http://marc.info/?l=bugtraq&m=143039249603103&w=2","refsource":"MISC","name":"http://marc.info/?l=bugtraq&m=143039249603103&w=2"},{"url":"http://marc.info/?l=bugtraq&m=143101048219218&w=2","refsource":"MISC","name":"http://marc.info/?l=bugtraq&m=143101048219218&w=2"},{"url":"http://marc.info/?l=bugtraq&m=143290371927178&w=2","refsource":"MISC","name":"http://marc.info/?l=bugtraq&m=143290371927178&w=2"},{"url":"http://marc.info/?l=bugtraq&m=143290437727362&w=2","refsource":"MISC","name":"http://marc.info/?l=bugtraq&m=143290437727362&w=2"},{"url":"http://marc.info/?l=bugtraq&m=143290522027658&w=2","refsource":"MISC","name":"http://marc.info/?l=bugtraq&m=143290522027658&w=2"},{"url":"http://marc.info/?l=bugtraq&m=143290583027876&w=2","refsource":"MISC","name":"http://marc.info/?l=bugtraq&m=143290583027876&w=2"},{"url":"http://marc.info/?l=bugtraq&m=143558137709884&w=2","refsource":"MISC","name":"http://marc.info/?l=bugtraq&m=143558137709884&w=2"},{"url":"http://marc.info/?l=bugtraq&m=143558192010071&w=2","refsource":"MISC","name":"http://marc.info/?l=bugtraq&m=143558192010071&w=2"},{"url":"http://marc.info/?l=bugtraq&m=143628269912142&w=2","refsource":"MISC","name":"http://marc.info/?l=bugtraq&m=143628269912142&w=2"},{"url":"http://marc.info/?l=bugtraq&m=144101915224472&w=2","refsource":"MISC","name":"http://marc.info/?l=bugtraq&m=144101915224472&w=2"},{"url":"http://marc.info/?l=bugtraq&m=144251162130364&w=2","refsource":"MISC","name":"http://marc.info/?l=bugtraq&m=144251162130364&w=2"},{"url":"http://marc.info/?l=bugtraq&m=144294141001552&w=2","refsource":"MISC","name":"http://marc.info/?l=bugtraq&m=144294141001552&w=2"},{"url":"http://marc.info/?l=bugtraq&m=145983526810210&w=2","refsource":"MISC","name":"http://marc.info/?l=bugtraq&m=145983526810210&w=2"},{"url":"http://marc.info/?l=openssl-dev&m=141333049205629&w=2","refsource":"MISC","name":"http://marc.info/?l=openssl-dev&m=141333049205629&w=2"},{"url":"http://people.canonical.com/~ubuntu-security/cve/2014/CVE-2014-3566.html","refsource":"MISC","name":"http://people.canonical.com/~ubuntu-security/cve/2014/CVE-2014-3566.html"},{"url":"http://rhn.redhat.com/errata/RHSA-2014-1652.html","refsource":"MISC","name":"http://rhn.redhat.com/errata/RHSA-2014-1652.html"},{"url":"http://rhn.redhat.com/errata/RHSA-2014-1653.html","refsource":"MISC","name":"http://rhn.redhat.com/errata/RHSA-2014-1653.html"},{"url":"http://rhn.redhat.com/errata/RHSA-2014-1692.html","refsource":"MISC","name":"http://rhn.redhat.com/errata/RHSA-2014-1692.html"},{"url":"http://rhn.redhat.com/errata/RHSA-2014-1876.html","refsource":"MISC","name":"http://rhn.redhat.com/errata/RHSA-2014-1876.html"},{"url":"http://rhn.redhat.com/errata/RHSA-2014-1877.html","refsource":"MISC","name":"http://rhn.redhat.com/errata/RHSA-2014-1877.html"},{"url":"http://rhn.redhat.com/errata/RHSA-2014-1880.html","refsource":"MISC","name":"http://rhn.redhat.com/errata/RHSA-2014-1880.html"},{"url":"http://rhn.redhat.com/errata/RHSA-2014-1881.html","refsource":"MISC","name":"http://rhn.redhat.com/errata/RHSA-2014-1881.html"},{"url":"http://rhn.redhat.com/errata/RHSA-2014-1882.html","refsource":"MISC","name":"http://rhn.redhat.com/errata/RHSA-2014-1882.html"},{"url":"http://rhn.redhat.com/errata/RHSA-2014-1920.html","refsource":"MISC","name":"http://rhn.redhat.com/errata/RHSA-2014-1920.html"},{"url":"http://rhn.redhat.com/errata/RHSA-2014-1948.html","refsource":"MISC","name":"http://rhn.redhat.com/errata/RHSA-2014-1948.html"},{"url":"http://rhn.redhat.com/errata/RHSA-2015-0068.html","refsource":"MISC","name":"http://rhn.redhat.com/errata/RHSA-2015-0068.html"},{"url":"http://rhn.redhat.com/errata/RHSA-2015-0079.html","refsource":"MISC","name":"http://rhn.redhat.com/errata/RHSA-2015-0079.html"},{"url":"http://rhn.redhat.com/errata/RHSA-2015-0080.html","refsource":"MISC","name":"http://rhn.redhat.com/errata/RHSA-2015-0080.html"},{"url":"http://rhn.redhat.com/errata/RHSA-2015-0085.html","refsource":"MISC","name":"http://rhn.redhat.com/errata/RHSA-2015-0085.html"},{"url":"http://rhn.redhat.com/errata/RHSA-2015-0086.html","refsource":"MISC","name":"http://rhn.redhat.com/errata/RHSA-2015-0086.html"},{"url":"http://rhn.redhat.com/errata/RHSA-2015-0264.html","refsource":"MISC","name":"http://rhn.redhat.com/errata/RHSA-2015-0264.html"},{"url":"http://rhn.redhat.com/errata/RHSA-2015-0698.html","refsource":"MISC","name":"http://rhn.redhat.com/errata/RHSA-2015-0698.html"},{"url":"http://rhn.redhat.com/errata/RHSA-2015-1545.html","refsource":"MISC","name":"http://rhn.redhat.com/errata/RHSA-2015-1545.html"},{"url":"http://rhn.redhat.com/errata/RHSA-2015-1546.html","refsource":"MISC","name":"http://rhn.redhat.com/errata/RHSA-2015-1546.html"},{"url":"http://secunia.com/advisories/59627","refsource":"MISC","name":"http://secunia.com/advisories/59627"},{"url":"http://secunia.com/advisories/60056","refsource":"MISC","name":"http://secunia.com/advisories/60056"},{"url":"http://secunia.com/advisories/60206","refsource":"MISC","name":"http://secunia.com/advisories/60206"},{"url":"http://secunia.com/advisories/60792","refsource":"MISC","name":"http://secunia.com/advisories/60792"},{"url":"http://secunia.com/advisories/60859","refsource":"MISC","name":"http://secunia.com/advisories/60859"},{"url":"http://secunia.com/advisories/61019","refsource":"MISC","name":"http://secunia.com/advisories/61019"},{"url":"http://secunia.com/advisories/61130","refsource":"MISC","name":"http://secunia.com/advisories/61130"},{"url":"http://secunia.com/advisories/61303","refsource":"MISC","name":"http://secunia.com/advisories/61303"},{"url":"http://secunia.com/advisories/61316","refsource":"MISC","name":"http://secunia.com/advisories/61316"},{"url":"http://secunia.com/advisories/61345","refsource":"MISC","name":"http://secunia.com/advisories/61345"},{"url":"http://secunia.com/advisories/61359","refsource":"MISC","name":"http://secunia.com/advisories/61359"},{"url":"http://secunia.com/advisories/61782","refsource":"MISC","name":"http://secunia.com/advisories/61782"},{"url":"http://secunia.com/advisories/61810","refsource":"MISC","name":"http://secunia.com/advisories/61810"},{"url":"http://secunia.com/advisories/61819","refsource":"MISC","name":"http://secunia.com/advisories/61819"},{"url":"http://secunia.com/advisories/61825","refsource":"MISC","name":"http://secunia.com/advisories/61825"},{"url":"http://secunia.com/advisories/61827","refsource":"MISC","name":"http://secunia.com/advisories/61827"},{"url":"http://secunia.com/advisories/61926","refsource":"MISC","name":"http://secunia.com/advisories/61926"},{"url":"http://secunia.com/advisories/61995","refsource":"MISC","name":"http://secunia.com/advisories/61995"},{"url":"http://support.apple.com/HT204244","refsource":"MISC","name":"http://support.apple.com/HT204244"},{"url":"http://support.citrix.com/article/CTX200238","refsource":"MISC","name":"http://support.citrix.com/article/CTX200238"},{"url":"http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20141015-poodle","refsource":"MISC","name":"http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20141015-poodle"},{"url":"http://www-01.ibm.com/support/docview.wss?uid=isg3T1021431","refsource":"MISC","name":"http://www-01.ibm.com/support/docview.wss?uid=isg3T1021431"},{"url":"http://www-01.ibm.com/support/docview.wss?uid=isg3T1021439","refsource":"MISC","name":"http://www-01.ibm.com/support/docview.wss?uid=isg3T1021439"},{"url":"http://www-01.ibm.com/support/docview.wss?uid=swg21686997","refsource":"MISC","name":"http://www-01.ibm.com/support/docview.wss?uid=swg21686997"},{"url":"http://www-01.ibm.com/support/docview.wss?uid=swg21687172","refsource":"MISC","name":"http://www-01.ibm.com/support/docview.wss?uid=swg21687172"},{"url":"http://www-01.ibm.com/support/docview.wss?uid=swg21687611","refsource":"MISC","name":"http://www-01.ibm.com/support/docview.wss?uid=swg21687611"},{"url":"http://www-01.ibm.com/support/docview.wss?uid=swg21688283","refsource":"MISC","name":"http://www-01.ibm.com/support/docview.wss?uid=swg21688283"},{"url":"http://www-01.ibm.com/support/docview.wss?uid=swg21692299","refsource":"MISC","name":"http://www-01.ibm.com/support/docview.wss?uid=swg21692299"},{"url":"http://www.debian.org/security/2014/dsa-3053","refsource":"MISC","name":"http://www.debian.org/security/2014/dsa-3053"},{"url":"http://www.debian.org/security/2015/dsa-3144","refsource":"MISC","name":"http://www.debian.org/security/2015/dsa-3144"},{"url":"http://www.debian.org/security/2015/dsa-3147","refsource":"MISC","name":"http://www.debian.org/security/2015/dsa-3147"},{"url":"http://www.debian.org/security/2016/dsa-3489","refsource":"MISC","name":"http://www.debian.org/security/2016/dsa-3489"},{"url":"http://www.kb.cert.org/vuls/id/577193","refsource":"MISC","name":"http://www.kb.cert.org/vuls/id/577193"},{"url":"http://www.mandriva.com/security/advisories?name=MDVSA-2014:203","refsource":"MISC","name":"http://www.mandriva.com/security/advisories?name=MDVSA-2014:203"},{"url":"http://www.securityfocus.com/archive/1/533724/100/0/threaded","refsource":"MISC","name":"http://www.securityfocus.com/archive/1/533724/100/0/threaded"},{"url":"http://www.securityfocus.com/archive/1/533746","refsource":"MISC","name":"http://www.securityfocus.com/archive/1/533746"},{"url":"http://www.securityfocus.com/archive/1/533747","refsource":"MISC","name":"http://www.securityfocus.com/archive/1/533747"},{"url":"http://www.securityfocus.com/bid/70574","refsource":"MISC","name":"http://www.securityfocus.com/bid/70574"},{"url":"http://www.securitytracker.com/id/1031029","refsource":"MISC","name":"http://www.securitytracker.com/id/1031029"},{"url":"http://www.securitytracker.com/id/1031039","refsource":"MISC","name":"http://www.securitytracker.com/id/1031039"},{"url":"http://www.securitytracker.com/id/1031085","refsource":"MISC","name":"http://www.securitytracker.com/id/1031085"},{"url":"http://www.securitytracker.com/id/1031086","refsource":"MISC","name":"http://www.securitytracker.com/id/1031086"},{"url":"http://www.securitytracker.com/id/1031087","refsource":"MISC","name":"http://www.securitytracker.com/id/1031087"},{"url":"http://www.securitytracker.com/id/1031088","refsource":"MISC","name":"http://www.securitytracker.com/id/1031088"},{"url":"http://www.securitytracker.com/id/1031089","refsource":"MISC","name":"http://www.securitytracker.com/id/1031089"},{"url":"http://www.securitytracker.com/id/1031090","refsource":"MISC","name":"http://www.securitytracker.com/id/1031090"},{"url":"http://www.securitytracker.com/id/1031091","refsource":"MISC","name":"http://www.securitytracker.com/id/1031091"},{"url":"http://www.securitytracker.com/id/1031092","refsource":"MISC","name":"http://www.securitytracker.com/id/1031092"},{"url":"http://www.securitytracker.com/id/1031093","refsource":"MISC","name":"http://www.securitytracker.com/id/1031093"},{"url":"http://www.securitytracker.com/id/1031094","refsource":"MISC","name":"http://www.securitytracker.com/id/1031094"},{"url":"http://www.securitytracker.com/id/1031095","refsource":"MISC","name":"http://www.securitytracker.com/id/1031095"},{"url":"http://www.securitytracker.com/id/1031096","refsource":"MISC","name":"http://www.securitytracker.com/id/1031096"},{"url":"http://www.securitytracker.com/id/1031105","refsource":"MISC","name":"http://www.securitytracker.com/id/1031105"},{"url":"http://www.securitytracker.com/id/1031106","refsource":"MISC","name":"http://www.securitytracker.com/id/1031106"},{"url":"http://www.securitytracker.com/id/1031107","refsource":"MISC","name":"http://www.securitytracker.com/id/1031107"},{"url":"http://www.securitytracker.com/id/1031120","refsource":"MISC","name":"http://www.securitytracker.com/id/1031120"},{"url":"http://www.securitytracker.com/id/1031123","refsource":"MISC","name":"http://www.securitytracker.com/id/1031123"},{"url":"http://www.securitytracker.com/id/1031124","refsource":"MISC","name":"http://www.securitytracker.com/id/1031124"},{"url":"http://www.securitytracker.com/id/1031130","refsource":"MISC","name":"http://www.securitytracker.com/id/1031130"},{"url":"http://www.securitytracker.com/id/1031131","refsource":"MISC","name":"http://www.securitytracker.com/id/1031131"},{"url":"http://www.securitytracker.com/id/1031132","refsource":"MISC","name":"http://www.securitytracker.com/id/1031132"},{"url":"http://www.ubuntu.com/usn/USN-2486-1","refsource":"MISC","name":"http://www.ubuntu.com/usn/USN-2486-1"},{"url":"http://www.ubuntu.com/usn/USN-2487-1","refsource":"MISC","name":"http://www.ubuntu.com/usn/USN-2487-1"},{"url":"http://www.us-cert.gov/ncas/alerts/TA14-290A","refsource":"MISC","name":"http://www.us-cert.gov/ncas/alerts/TA14-290A"},{"url":"http://www.vmware.com/security/advisories/VMSA-2015-0003.html","refsource":"MISC","name":"http://www.vmware.com/security/advisories/VMSA-2015-0003.html"},{"url":"http://www.websense.com/support/article/kbarticle/Vulnerabilities-resolved-in-TRITON-APX-Version-8-0","refsource":"MISC","name":"http://www.websense.com/support/article/kbarticle/Vulnerabilities-resolved-in-TRITON-APX-Version-8-0"},{"url":"http://www1.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-405500.htm","refsource":"MISC","name":"http://www1.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-405500.htm"},{"url":"https://access.redhat.com/articles/1232123","refsource":"MISC","name":"https://access.redhat.com/articles/1232123"},{"url":"https://blog.mozilla.org/security/2014/10/14/the-poodle-attack-and-the-end-of-ssl-3-0/","refsource":"MISC","name":"https://blog.mozilla.org/security/2014/10/14/the-poodle-attack-and-the-end-of-ssl-3-0/"},{"url":"https://blogs.oracle.com/sunsecurity/entry/multiple_vulnerabilities_in_openssl6","refsource":"MISC","name":"https://blogs.oracle.com/sunsecurity/entry/multiple_vulnerabilities_in_openssl6"},{"url":"https://bto.bluecoat.com/security-advisory/sa83","refsource":"MISC","name":"https://bto.bluecoat.com/security-advisory/sa83"},{"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1076983","refsource":"MISC","name":"https://bugzilla.mozilla.org/show_bug.cgi?id=1076983"},{"url":"https://devcentral.f5.com/articles/cve-2014-3566-removing-sslv3-from-big-ip","refsource":"MISC","name":"https://devcentral.f5.com/articles/cve-2014-3566-removing-sslv3-from-big-ip"},{"url":"https://github.com/mpgn/poodle-PoC","refsource":"MISC","name":"https://github.com/mpgn/poodle-PoC"},{"url":"https://groups.google.com/forum/#%21topic/docker-user/oYm0i3xShJU","refsource":"MISC","name":"https://groups.google.com/forum/#%21topic/docker-user/oYm0i3xShJU"},{"url":"https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04819635","refsource":"MISC","name":"https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04819635"},{"url":"https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05068681","refsource":"MISC","name":"https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05068681"},{"url":"https://kc.mcafee.com/corporate/index?page=content&id=SB10090","refsource":"MISC","name":"https://kc.mcafee.com/corporate/index?page=content&id=SB10090"},{"url":"https://kc.mcafee.com/corporate/index?page=content&id=SB10091","refsource":"MISC","name":"https://kc.mcafee.com/corporate/index?page=content&id=SB10091"},{"url":"https://kc.mcafee.com/corporate/index?page=content&id=SB10104","refsource":"MISC","name":"https://kc.mcafee.com/corporate/index?page=content&id=SB10104"},{"url":"https://puppet.com/security/cve/poodle-sslv3-vulnerability","refsource":"MISC","name":"https://puppet.com/security/cve/poodle-sslv3-vulnerability"},{"url":"https://security.gentoo.org/glsa/201507-14","refsource":"MISC","name":"https://security.gentoo.org/glsa/201507-14"},{"url":"https://security.gentoo.org/glsa/201606-11","refsource":"MISC","name":"https://security.gentoo.org/glsa/201606-11"},{"url":"https://security.netapp.com/advisory/ntap-20141015-0001/","refsource":"MISC","name":"https://security.netapp.com/advisory/ntap-20141015-0001/"},{"url":"https://support.apple.com/HT205217","refsource":"MISC","name":"https://support.apple.com/HT205217"},{"url":"https://support.apple.com/kb/HT6527","refsource":"MISC","name":"https://support.apple.com/kb/HT6527"},{"url":"https://support.apple.com/kb/HT6529","refsource":"MISC","name":"https://support.apple.com/kb/HT6529"},{"url":"https://support.apple.com/kb/HT6531","refsource":"MISC","name":"https://support.apple.com/kb/HT6531"},{"url":"https://support.apple.com/kb/HT6541","refsource":"MISC","name":"https://support.apple.com/kb/HT6541"},{"url":"https://support.apple.com/kb/HT6542","refsource":"MISC","name":"https://support.apple.com/kb/HT6542"},{"url":"https://support.lenovo.com/product_security/poodle","refsource":"MISC","name":"https://support.lenovo.com/product_security/poodle"},{"url":"https://support.lenovo.com/us/en/product_security/poodle","refsource":"MISC","name":"https://support.lenovo.com/us/en/product_security/poodle"},{"url":"https://technet.microsoft.com/library/security/3009008.aspx","refsource":"MISC","name":"https://technet.microsoft.com/library/security/3009008.aspx"},{"url":"https://www-01.ibm.com/support/docview.wss?uid=swg21688165","refsource":"MISC","name":"https://www-01.ibm.com/support/docview.wss?uid=swg21688165"},{"url":"https://www.arista.com/en/support/advisories-notices/security-advisories/1015-security-advisory-7","refsource":"MISC","name":"https://www.arista.com/en/support/advisories-notices/security-advisories/1015-security-advisory-7"},{"url":"https://www.cloudera.com/documentation/other/security-bulletins/topics/csb_topic_1.html","refsource":"MISC","name":"https://www.cloudera.com/documentation/other/security-bulletins/topics/csb_topic_1.html"},{"url":"https://www.dfranke.us/posts/2014-10-14-how-poodle-happened.html","refsource":"MISC","name":"https://www.dfranke.us/posts/2014-10-14-how-poodle-happened.html"},{"url":"https://www.elastic.co/blog/logstash-1-4-3-released","refsource":"MISC","name":"https://www.elastic.co/blog/logstash-1-4-3-released"},{"url":"https://www.imperialviolet.org/2014/10/14/poodle.html","refsource":"MISC","name":"https://www.imperialviolet.org/2014/10/14/poodle.html"},{"url":"https://www.openssl.org/news/secadv_20141015.txt","refsource":"MISC","name":"https://www.openssl.org/news/secadv_20141015.txt"},{"url":"https://www.openssl.org/~bodo/ssl-poodle.pdf","refsource":"MISC","name":"https://www.openssl.org/~bodo/ssl-poodle.pdf"},{"url":"https://www.suse.com/support/kb/doc.php?id=7015773","refsource":"MISC","name":"https://www.suse.com/support/kb/doc.php?id=7015773"},{"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1152789","refsource":"MISC","name":"https://bugzilla.redhat.com/show_bug.cgi?id=1152789"}]}},"nvd":{"publishedDate":"2014-10-15 00:55:00","lastModifiedDate":"2023-09-12 14:55:00","problem_types":["CWE-310"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:N/A:N","attackVector":"NETWORK","attackComplexity":"HIGH","privilegesRequired":"NONE","userInteraction":"REQUIRED","scope":"CHANGED","confidentialityImpact":"LOW","integrityImpact":"NONE","availabilityImpact":"NONE","baseScore":3.4,"baseSeverity":"LOW"},"exploitabilityScore":1.6,"impactScore":1.4},"baseMetricV2":{"cvssV2":{"version":"2.0","vectorString":"AV:N/AC:M/Au:N/C:P/I:N/A:N","accessVector":"NETWORK","accessComplexity":"MEDIUM","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"NONE","availabilityImpact":"NONE","baseScore":4.3},"severity":"MEDIUM","exploitabilityScore":8.6,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:redhat:enterprise_linux_desktop_supplementary:6.0:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:redhat:enterprise_linux_server_supplementary:6.0:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:redhat:enterprise_linux_workstation_supplementary:6.0:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:redhat:enterprise_linux_workstation_supplementary:7.0:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:redhat:enterprise_linux_server_supplementary:7.0:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:redhat:enterprise_linux:5:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:redhat:enterprise_linux_server_supplementary:5.0:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:redhat:enterprise_linux_desktop_supplementary:5.0:*:*:*:*:*:*:*","cpe_name":[]}]},{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:ibm:aix:5.3:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:ibm:aix:7.1:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:ibm:aix:6.1:*:*:*:*:*:*:*","cpe_name":[]}]},{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*","versionEndIncluding":"10.10.1","cpe_name":[]}]},{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:mageia:mageia:3.0:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:mageia:mageia:4.0:*:*:*:*:*:*:*","cpe_name":[]}]},{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:novell:suse_linux_enterprise_desktop:9.0:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:novell:suse_linux_enterprise_desktop:11.0:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:novell:suse_linux_enterprise_desktop:10.0:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:novell:suse_linux_enterprise_desktop:12.0:*:*:*:*:*:*:*","cpe_name":[]}]},{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:novell:suse_linux_enterprise_server:12.0:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:opensuse:opensuse:12.3:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:novell:suse_linux_enterprise_server:11.0:sp3:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:novell:suse_linux_enterprise_server:11.0:sp3:*:*:*:vmware:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:novell:suse_linux_enterprise_software_development_kit:11.0:sp3:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:novell:suse_linux_enterprise_software_development_kit:12.0:*:*:*:*:*:*:*","cpe_name":[]}]},{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:fedoraproject:fedora:20:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:fedoraproject:fedora:21:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:fedoraproject:fedora:19:*:*:*:*:*:*:*","cpe_name":[]}]},{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:openssl:openssl:0.9.8b:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:openssl:openssl:0.9.8m:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:openssl:openssl:1.0.0n:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:openssl:openssl:1.0.1:beta2:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:openssl:openssl:0.9.8c:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:openssl:openssl:1.0.0c:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:openssl:openssl:1.0.0i:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:openssl:openssl:1.0.0:beta1:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:openssl:openssl:1.0.1h:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:openssl:openssl:0.9.8n:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:openssl:openssl:1.0.0:beta2:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:openssl:openssl:0.9.8p:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:openssl:openssl:1.0.0m:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:openssl:openssl:1.0.1c:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:openssl:openssl:0.9.8e:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:openssl:openssl:0.9.8u:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:openssl:openssl:0.9.8za:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:openssl:openssl:1.0.1g:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:openssl:openssl:0.9.8g:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:openssl:openssl:1.0.0h:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:openssl:openssl:0.9.8k:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:openssl:openssl:0.9.8m:beta1:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:openssl:openssl:0.9.8d:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:openssl:openssl:1.0.0:beta3:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:openssl:openssl:1.0.0e:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:openssl:openssl:1.0.1:beta3:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:openssl:openssl:1.0.0f:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:openssl:openssl:0.9.8j:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:openssl:openssl:1.0.0d:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:openssl:openssl:1.0.0j:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:openssl:openssl:0.9.8s:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:openssl:openssl:1.0.1a:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:openssl:openssl:1.0.1:beta1:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:openssl:openssl:0.9.8l:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:openssl:openssl:1.0.1d:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:openssl:openssl:1.0.0k:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:openssl:openssl:0.9.8r:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:openssl:openssl:0.9.8t:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:openssl:openssl:1.0.0:beta4:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:openssl:openssl:0.9.8z:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:openssl:openssl:0.9.8a:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:openssl:openssl:1.0.0:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:openssl:openssl:1.0.1b:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:openssl:openssl:0.9.8zb:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:openssl:openssl:0.9.8o:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:openssl:openssl:0.9.8q:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:openssl:openssl:0.9.8w:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:openssl:openssl:1.0.1e:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:openssl:openssl:1.0.0:beta5:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:openssl:openssl:0.9.8:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:openssl:openssl:1.0.1f:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:openssl:openssl:1.0.0l:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:openssl:openssl:0.9.8v:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:openssl:openssl:0.9.8i:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:openssl:openssl:0.9.8f:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:openssl:openssl:0.9.8y:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:openssl:openssl:1.0.0a:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:openssl:openssl:0.9.8h:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:openssl:openssl:0.9.8x:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:openssl:openssl:1.0.1i:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:openssl:openssl:1.0.0b:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:openssl:openssl:1.0.1:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:openssl:openssl:1.0.0g:*:*:*:*:*:*:*","cpe_name":[]}]},{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:ibm:vios:2.2.0.13:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:ibm:vios:2.2.1.0:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:ibm:vios:2.2.0.11:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:ibm:vios:2.2.0.12:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:ibm:vios:2.2.1.1:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:ibm:vios:2.2.1.3:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:ibm:vios:2.2.0.10:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:ibm:vios:2.2.3.2:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:ibm:vios:2.2.1.8:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:ibm:vios:2.2.2.4:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:ibm:vios:2.2.1.5:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:ibm:vios:2.2.1.6:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:ibm:vios:2.2.1.4:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:ibm:vios:2.2.3.1:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:ibm:vios:2.2.3.4:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:ibm:vios:2.2.1.7:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:ibm:vios:2.2.2.1:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:ibm:vios:2.2.2.2:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:ibm:vios:2.2.2.3:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:ibm:vios:2.2.3.0:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:ibm:vios:2.2.3.3:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:ibm:vios:2.2.2.5:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:ibm:vios:2.2.1.9:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:ibm:vios:2.2.2.0:*:*:*:*:*:*:*","cpe_name":[]}]},{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:netbsd:netbsd:6.1.1:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:netbsd:netbsd:5.2.2:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:netbsd:netbsd:5.1:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:netbsd:netbsd:6.1.3:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:netbsd:netbsd:6.0:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:netbsd:netbsd:6.1.4:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:netbsd:netbsd:6.0.4:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:netbsd:netbsd:5.1.4:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:netbsd:netbsd:6.0.6:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:netbsd:netbsd:6.0.2:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:netbsd:netbsd:5.1.2:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:netbsd:netbsd:5.2.1:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:netbsd:netbsd:5.1.3:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:netbsd:netbsd:6.0.5:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:netbsd:netbsd:6.1.2:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:netbsd:netbsd:6.0.1:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:netbsd:netbsd:6.0:beta:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:netbsd:netbsd:5.1.1:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:netbsd:netbsd:6.1.5:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:netbsd:netbsd:5.2:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:netbsd:netbsd:6.0.3:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:netbsd:netbsd:6.1:*:*:*:*:*:*:*","cpe_name":[]}]},{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*","cpe_name":[]}]},{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:oracle:database:12.1.0.2:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:oracle:database:11.2.0.4:*:*:*:*:*:*:*","cpe_name":[]}]}]}},"legacy_mitre":{"record":{"CveYear":"2014","CveId":"3566","Ordinal":"70519","Title":"CVE-2014-3566","CVE":"CVE-2014-3566","Year":"2014"},"notes":[{"CveYear":"2014","CveId":"3566","Ordinal":"1","NoteData":"The SSL protocol 3.0, as used in OpenSSL through 1.0.1i and other products, uses nondeterministic CBC padding, which makes it easier for man-in-the-middle attackers to obtain cleartext data via a padding-oracle attack, aka the \"POODLE\" issue.","Type":"Description","Title":null},{"CveYear":"2014","CveId":"3566","Ordinal":"2","NoteData":"2014-10-14","Type":"Other","Title":"Published"},{"CveYear":"2014","CveId":"3566","Ordinal":"3","NoteData":"2021-11-05","Type":"Other","Title":"Modified"}]}}}