{"api_version":"1","generated_at":"2026-04-22T21:37:07+00:00","cve":"CVE-2015-4000","urls":{"html":"https://cve.report/CVE-2015-4000","api":"https://cve.report/api/cve/CVE-2015-4000.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2015-4000","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2015-4000"},"summary":{"title":"CVE-2015-4000","description":"The TLS protocol 1.2 and earlier, when a DHE_EXPORT ciphersuite is enabled on a server but not on a client, does not properly convey a DHE_EXPORT choice, which allows man-in-the-middle attackers to conduct cipher-downgrade attacks by rewriting a ClientHello with DHE replaced by DHE_EXPORT and then rewriting a ServerHello with DHE_EXPORT replaced by DHE, aka the \"Logjam\" issue.","state":"PUBLIC","assigner":"cve@mitre.org","published_at":"2015-05-21 00:59:00","updated_at":"2023-02-09 16:15:00"},"problem_types":["CWE-310"],"metrics":[],"references":[{"url":"http://www.securitytracker.com/id/1033385","name":"1033385","refsource":"SECTRACK","tags":["Third Party Advisory","VDB Entry"],"title":"HP Network Node Manager iTLS Diffie-Hellman Export Cipher Downgrade Attack Lets Remote Users Decrypt Connections - SecurityTracker","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.securitytracker.com/id/1033209","name":"1033209","refsource":"SECTRACK","tags":["Third Party Advisory","VDB Entry"],"title":"IBM Tivoli Monitoring TLS Diffie-Hellman Export Cipher Downgrade Attack Lets Remote Users Decrypt Connections - SecurityTracker","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00047.html","name":"SUSE-SU-2015:1320","refsource":"SUSE","tags":["Mailing List","Third Party Advisory"],"title":"[security-announce] SUSE-SU-2015:1320-1: important: Security update for","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.securitytracker.com/id/1032777","name":"1032777","refsource":"SECTRACK","tags":["Third Party Advisory","VDB Entry"],"title":"IBM Tivoli Storage Manager FastBack for Workstations TLS Diffie-Hellman Export Cipher Downgrade Attack Lets Remote Users Decrypt Connections - SecurityTracker","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html","name":"http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html","refsource":"CONFIRM","tags":["Patch","Third Party Advisory"],"title":"Oracle Critical Patch Update Advisory - April 2016","mime":"text/html","httpstatus":"200","archivestatus":"0"},{"url":"http://www.securitytracker.com/id/1033065","name":"1033065","refsource":"SECTRACK","tags":["Third Party Advisory","VDB Entry"],"title":"IBM SPSS Analytic Server TLS Diffie-Hellman Export Cipher Downgrade Attack Lets Remote Users Decrypt Connections - SecurityTracker","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00025.html","name":"openSUSE-SU-2015:1229","refsource":"SUSE","tags":["Mailing List","Third Party Advisory"],"title":"[security-announce] openSUSE-SU-2015:1229-1: important: Security update","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.securitytracker.com/id/1032960","name":"1032960","refsource":"SECTRACK","tags":["Third Party Advisory","VDB Entry"],"title":"HP IceWall TLS Diffie-Hellman Export Cipher Downgrade Attack Lets Remote Users Decrypt Connections - SecurityTracker","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://support.apple.com/kb/HT204942","name":"http://support.apple.com/kb/HT204942","refsource":"CONFIRM","tags":["Third Party Advisory"],"title":"About the security content of OS X Yosemite v10.10.4 and Security Update 2015-005 - Apple Support","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://marc.info/?l=bugtraq&m=144050121701297&w=2","name":"HPSBGN03404","refsource":"HP","tags":["Mailing List","Third Party Advisory"],"title":"'[security bulletin] HPSBGN03404 rev.1 - HP Service Health Reporter, Remote Unauthorized Modification' - MARC","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://rhn.redhat.com/errata/RHSA-2015-1230.html","name":"RHSA-2015:1230","refsource":"REDHAT","tags":["Third Party Advisory"],"title":"Red Hat Customer Portal","mime":"text/html","httpstatus":"-1","archivestatus":"200"},{"url":"http://fortiguard.com/advisory/2015-07-09-cve-2015-1793-openssl-alternative-chains-certificate-forgery","name":"http://fortiguard.com/advisory/2015-07-09-cve-2015-1793-openssl-alternative-chains-certificate-forgery","refsource":"CONFIRM","tags":["Third Party Advisory"],"title":"FortiGuard","mime":"text/html","httpstatus":"404","archivestatus":"404"},{"url":"http://www.securitytracker.com/id/1032649","name":"1032649","refsource":"SECTRACK","tags":["Third Party Advisory","VDB Entry"],"title":"IBM Rational Quality Manager TLS Diffie-Hellman Export Cipher Downgrade Attack Lets Remote Users Decrypt Connections - SecurityTracker","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://marc.info/?l=bugtraq&m=143558092609708&w=2","name":"HPSBGN03362","refsource":"HP","tags":["Mailing List","Third Party Advisory"],"title":"'[security bulletin] HPSBGN03362 rev.1 - HP Discovery and Dependency Mapping Inventory (DDMI) with TL' - MARC","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2015-008.txt.asc","name":"NetBSD-SA2015-008","refsource":"NETBSD","tags":["Mailing List","Third Party Advisory"],"title":"","mime":"text/plain","httpstatus":"200","archivestatus":"200"},{"url":"http://marc.info/?l=bugtraq&m=144104533800819&w=2","name":"HPSBMU03401","refsource":"HP","tags":["Mailing List","Third Party Advisory"],"title":"'[security bulletin] HPSBMU03401 rev.1 - HP Operations Manager for UNIX and Linux, Remote Unauthorize' - MARC","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04926789","name":"https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04926789","refsource":"CONFIRM","tags":["Third Party Advisory"],"title":"Document Display | HPE Support Center","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"http://lists.apple.com/archives/security-announce/2015/Jun/msg00001.html","name":"APPLE-SA-2015-06-30-1","refsource":"APPLE","tags":["Mailing List","Third Party Advisory"],"title":"APPLE-SA-2015-06-30-1 iOS 8.4","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00031.html","name":"SUSE-SU-2016:0224","refsource":"SUSE","tags":["Mailing List","Third Party Advisory"],"title":"[security-announce] SUSE-SU-2016:0224-1: important: Security update for","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://marc.info/?l=bugtraq&m=144102017024820&w=2","name":"HPSBGN03407","refsource":"HP","tags":["Mailing List","Third Party Advisory"],"title":"'[security bulletin] HPSBGN03407 rev.1 - HP Operations Manager for Windows, Remote Unauthorized Modif' - MARC","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.securitytracker.com/id/1033210","name":"1033210","refsource":"SECTRACK","tags":["Third Party Advisory","VDB Entry"],"title":"IBM Rational ClearQuest TLS Diffie-Hellman Export Cipher Downgrade Attack Lets Remote Users Decrypt Connections - SecurityTracker","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00037.html","name":"openSUSE-SU-2016:0255","refsource":"SUSE","tags":["Mailing List","Third Party Advisory"],"title":"[security-announce] openSUSE-SU-2016:0255-1: important: Security update","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.securitytracker.com/id/1033019","name":"1033019","refsource":"SECTRACK","tags":["Third Party Advisory","VDB Entry"],"title":"IBM Lotus Notes and Domino TLS Diffie-Hellman Export Cipher Downgrade Attack Lets Remote Users Decrypt Connections - SecurityTracker","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00039.html","name":"openSUSE-SU-2015:1288","refsource":"SUSE","tags":["Mailing List","Third Party Advisory"],"title":"[security-announce] openSUSE-SU-2015:1288-1: important: Security update","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://rhn.redhat.com/errata/RHSA-2015-1243.html","name":"RHSA-2015:1243","refsource":"REDHAT","tags":["Third Party Advisory"],"title":"Red Hat Customer Portal","mime":"text/html","httpstatus":"-1","archivestatus":"200"},{"url":"https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04773241","name":"https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04773241","refsource":"CONFIRM","tags":["Third Party Advisory"],"title":"Document Display | HPE Support Center","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://h20564.www2.hp.com/hpsc/doc/public/display?docId=emr_na-c04718196","name":"SSRT102112","refsource":"HP","tags":["Third Party Advisory"],"title":"Official HP® Support","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.securitytracker.com/id/1032884","name":"1032884","refsource":"SECTRACK","tags":["Third Party Advisory","VDB Entry"],"title":"IBM Flex System Manager SMIA Configuration Tool TLS Diffie-Hellman Export Cipher Downgrade Attack Lets Remote Users Decrypt Connections - SecurityTracker","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.securitytracker.com/id/1032650","name":"1032650","refsource":"SECTRACK","tags":["Third Party Advisory","VDB Entry"],"title":"IBM Rational Rhapsody Design Manager TLS Diffie-Hellman Export Cipher Downgrade Attack Lets Remote Users Decrypt Connections - SecurityTracker","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html","name":"http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html","refsource":"CONFIRM","tags":["Patch","Third Party Advisory"],"title":"Oracle Critical Patch Update - July 2016","mime":"text/html","httpstatus":"200","archivestatus":"0"},{"url":"http://www-304.ibm.com/support/docview.wss?uid=swg21958984","name":"http://www-304.ibm.com/support/docview.wss?uid=swg21958984","refsource":"CONFIRM","tags":["Third Party Advisory"],"title":"IBM Security Bulletin: Vulnerability in Diffie-Hellman ciphers affects IBM WebSphere MQ Telemetry (CVE-2015-4000) - United States","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://marc.info/?l=bugtraq&m=145409266329539&w=2","name":"HPSBGN03533","refsource":"HP","tags":["Mailing List","Third Party Advisory"],"title":"'[security bulletin] HPSBGN03533 rev.1 - HP Enterprise Cloud Service Automation and Codar, Remote Una' - MARC","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://marc.info/?l=bugtraq&m=143628304012255&w=2","name":"HPSBGN03361","refsource":"HP","tags":["Mailing List","Third Party Advisory"],"title":"'[security bulletin] HPSBGN03361 rev.1 - HP UCMDB, HP UCMDB Configuration Manager, HP UCMDB Browser, ' - MARC","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.securitytracker.com/id/1032647","name":"1032647","refsource":"SECTRACK","tags":["Third Party Advisory","VDB Entry"],"title":"IBM Rational Software Architect TLS Diffie-Hellman Export Cipher Downgrade Attack Lets Remote Users Decrypt Connections - SecurityTracker","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.debian.org/security/2015/dsa-3300","name":"DSA-3300","refsource":"DEBIAN","tags":["Third Party Advisory"],"title":"Debian -- Security Information -- DSA-3300-1 iceweasel","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.securitytracker.com/id/1032653","name":"1032653","refsource":"SECTRACK","tags":["Third Party Advisory","VDB Entry"],"title":"IBM WebSphere MQ Telemetry TLS Diffie-Hellman Export Cipher Downgrade Attack Lets Remote Users Decrypt Connections - SecurityTracker","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www-01.ibm.com/support/docview.wss?uid=swg21959636","name":"http://www-01.ibm.com/support/docview.wss?uid=swg21959636","refsource":"CONFIRM","tags":["Third Party Advisory"],"title":"IBM Security Bulletin:Vulnerability in Diffie-Hellman ciphers affects Rational Build Forge (CVE-2015-4000) - United States","mime":"text/html","httpstatus":"404","archivestatus":"200"},{"url":"http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10727","name":"http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10727","refsource":"CONFIRM","tags":["Third Party Advisory"],"title":"Juniper Networks - 2016-04 Security Bulletin: Junos Space: Multiple privilege escalation vulnerabilities in Junos Space (CVE-2016-1265)   - Knowledge Base","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://marc.info/?l=bugtraq&m=143557934009303&w=2","name":"HPSBGN03351","refsource":"HP","tags":["Mailing List","Third Party Advisory"],"title":"'[security bulletin] HPSBGN03351 rev.1 - HP IceWall SSO Dfw, SSO Certd, MCRP, and Federation Agent ru' - MARC","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www-304.ibm.com/support/docview.wss?uid=swg21960041","name":"http://www-304.ibm.com/support/docview.wss?uid=swg21960041","refsource":"CONFIRM","tags":["Third Party Advisory"],"title":"IBM Security Bulletin: Vulnerabilities in OpenSSL including Logjam affect IBM Tivoli Netcool System Service Monitors/Application Service Monitors (CVE-2015-1788, CVE-2015-1791, CVE-2015-4000) - United States","mime":"text/html","httpstatus":"404","archivestatus":"200"},{"url":"http://www.securityfocus.com/bid/91787","name":"91787","refsource":"BID","tags":["Third Party Advisory","VDB Entry"],"title":"Oracle July 2016 Critical Patch Update Multiple Vulnerabilities","mime":"text/html","httpstatus":"200","archivestatus":"0"},{"url":"http://www-01.ibm.com/support/docview.wss?uid=swg21959517","name":"http://www-01.ibm.com/support/docview.wss?uid=swg21959517","refsource":"CONFIRM","tags":["Third Party Advisory"],"title":"Security Bulletin: Vulnerability in Diffie-Hellman ciphers affects IBM® WebSphere Real Time (CVE-2015-4000)","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.securitytracker.com/id/1034884","name":"1034884","refsource":"SECTRACK","tags":["Third Party Advisory","VDB Entry"],"title":"HP integrated Lights Out (iLO) TLS Diffie-Hellman Export Cipher Downgrade Attack Lets Remote Users Decrypt Connections - SecurityTracker","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://www.openssl.org/blog/blog/2015/05/20/logjam-freak-upcoming-changes/","name":"https://www.openssl.org/blog/blog/2015/05/20/logjam-freak-upcoming-changes/","refsource":"CONFIRM","tags":["Vendor Advisory"],"title":"Logjam, FREAK and Upcoming Changes in OpenSSL - OpenSSL Blog","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5098403","name":"https://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5098403","refsource":"CONFIRM","tags":["Third Party Advisory"],"title":"IBM Support","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://rhn.redhat.com/errata/RHSA-2015-1544.html","name":"RHSA-2015:1544","refsource":"REDHAT","tags":["Third Party Advisory"],"title":"Red Hat Customer Portal","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www-304.ibm.com/support/docview.wss?uid=swg21960380","name":"http://www-304.ibm.com/support/docview.wss?uid=swg21960380","refsource":"CONFIRM","tags":["Third Party Advisory"],"title":"IBM notice: The page you requested cannot be displayed","mime":"text/html","httpstatus":"404","archivestatus":"404"},{"url":"http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html","name":"http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html","refsource":"CONFIRM","tags":["Third Party Advisory"],"title":"Oracle Critical Patch Update - October 2015","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.securitytracker.com/id/1033513","name":"1033513","refsource":"SECTRACK","tags":["Third Party Advisory","VDB Entry"],"title":"IBM Rational ClearCase TLS Diffie-Hellman Export Cipher Downgrade Attack Lets Remote Users Decrypt Connections - SecurityTracker","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.securitytracker.com/id/1033222","name":"1033222","refsource":"SECTRACK","tags":["Third Party Advisory","VDB Entry"],"title":"IBM AIX Sendmail TLS Diffie-Hellman Export Cipher Downgrade Attack Lets Remote Users Decrypt Connections - SecurityTracker","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://rhn.redhat.com/errata/RHSA-2015-1241.html","name":"RHSA-2015:1241","refsource":"REDHAT","tags":["Third Party Advisory"],"title":"Red Hat Customer Portal","mime":"text/html","httpstatus":"-1","archivestatus":"200"},{"url":"https://security.gentoo.org/glsa/201506-02","name":"GLSA-201506-02","refsource":"GENTOO","tags":["Third Party Advisory"],"title":"OpenSSL: Multiple vulnerabilities (GLSA 201506-02) — Gentoo security","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www-01.ibm.com/support/docview.wss?uid=swg21961717","name":"http://www-01.ibm.com/support/docview.wss?uid=swg21961717","refsource":"CONFIRM","tags":["Third Party Advisory"],"title":"Security Bulletin: Vulnerability in Diffie-Hellman ciphers affects IBM Security Network Protection (CVE-2015-4000)","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.debian.org/security/2015/dsa-3339","name":"DSA-3339","refsource":"DEBIAN","tags":["Third Party Advisory"],"title":"Debian -- Security Information -- DSA-3339-1 openjdk-6","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://lists.fedoraproject.org/pipermail/package-announce/2015-June/159314.html","name":"FEDORA-2015-9130","refsource":"FEDORA","tags":["Mailing List","Third Party Advisory"],"title":"[SECURITY] Fedora 21 Update: nss-3.19.1-1.0.fc21","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://support.citrix.com/article/CTX216642","name":"https://support.citrix.com/article/CTX216642","refsource":"CONFIRM","tags":["Third Party Advisory"],"title":"Multiple Security Vulnerabilities in Citrix NetScaler Platform IPMI Lights Out Management (LOM) firmware","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www-304.ibm.com/support/docview.wss?uid=swg21967893","name":"http://www-304.ibm.com/support/docview.wss?uid=swg21967893","refsource":"CONFIRM","tags":["Third Party Advisory"],"title":"IBM Security Bulletin: Vulnerability in Diffie-Hellman ciphers affects IBM® DB2® LUW (CVE-2015-4000) - United States","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://support.citrix.com/article/CTX201114","name":"http://support.citrix.com/article/CTX201114","refsource":"CONFIRM","tags":["Third Party Advisory"],"title":"CVE-2015-4000 - Citrix Security Advisory for DHE_EXPORT TLS Vulnerability","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html","name":"http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html","refsource":"CONFIRM","tags":["Third Party Advisory"],"title":"Oracle Critical Patch Update - July 2015","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c04876402","name":"http://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c04876402","refsource":"CONFIRM","tags":["Third Party Advisory"],"title":"HPE 支援文件 - HPE 支援中心","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://openssl.org/news/secadv/20150611.txt","name":"https://openssl.org/news/secadv/20150611.txt","refsource":"CONFIRM","tags":["Vendor Advisory"],"title":"","mime":"text/plain","httpstatus":"200","archivestatus":"200"},{"url":"https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05045763","name":"https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05045763","refsource":"CONFIRM","tags":["Third Party Advisory"],"title":"Document Display | HPE Support Center","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00033.html","name":"SUSE-SU-2015:1268","refsource":"SUSE","tags":["Mailing List","Third Party Advisory"],"title":"[security-announce] SUSE-SU-2015:1268-1: important: Security update for","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://rhn.redhat.com/errata/RHSA-2015-1228.html","name":"RHSA-2015:1228","refsource":"REDHAT","tags":["Third Party Advisory"],"title":"Red Hat Customer Portal","mime":"text/html","httpstatus":"-1","archivestatus":"200"},{"url":"https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04923929","name":"https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04923929","refsource":"CONFIRM","tags":["Third Party Advisory"],"title":"Document Display | HPE Support Center","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"http://www.securitytracker.com/id/1033991","name":"1033991","refsource":"SECTRACK","tags":["Third Party Advisory","VDB Entry"],"title":"IBM DB2 TLS Diffie-Hellman Export Cipher Downgrade Attack Lets Remote Users Decrypt Connections - SecurityTracker","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.ubuntu.com/usn/USN-2656-2","name":"USN-2656-2","refsource":"UBUNTU","tags":["Third Party Advisory"],"title":"USN-2656-2: Firefox vulnerabilities | Ubuntu","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://marc.info/?l=bugtraq&m=144069189622016&w=2","name":"HPSBGN03402","refsource":"HP","tags":["Mailing List","Third Party Advisory"],"title":"'[security bulletin] HPSBGN03402 rev.2 - HP Performance Manager, Remote Disclosure of Information' - MARC","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www-304.ibm.com/support/docview.wss?uid=swg21959132","name":"http://www-304.ibm.com/support/docview.wss?uid=swg21959132","refsource":"CONFIRM","tags":["Third Party Advisory"],"title":"IBM Security Bulletin: Vulnerability in Diffie-Hellman ciphers affects IBM Tivoli Composite Application Manager for Transactions (CVE-2015-4000) - United States","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00007.html","name":"SUSE-SU-2015:1185","refsource":"SUSE","tags":["Mailing List","Third Party Advisory"],"title":"[security-announce] SUSE-SU-2015:1185-1: important: Security update for","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04918839","name":"https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04918839","refsource":"CONFIRM","tags":["Third Party Advisory"],"title":"Document Display | HPE Support Center","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00039.html","name":"openSUSE-SU-2016:0261","refsource":"SUSE","tags":["Mailing List","Third Party Advisory"],"title":"[security-announce] openSUSE-SU-2016:0261-1: important: Security update","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.securitytracker.com/id/1032856","name":"1032856","refsource":"SECTRACK","tags":["Third Party Advisory","VDB Entry"],"title":"IBM SPSS Modeler TLS Diffie-Hellman Export Cipher Downgrade Attack Lets Remote Users Decrypt Connections - SecurityTracker","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00031.html","name":"openSUSE-SU-2015:1266","refsource":"SUSE","tags":["Mailing List","Third Party Advisory"],"title":"[security-announce] openSUSE-SU-2015:1266-1: important: Mozilla (Firefox","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://rhn.redhat.com/errata/RHSA-2016-2056.html","name":"RHSA-2016:2056","refsource":"REDHAT","tags":["Third Party Advisory"],"title":"","mime":"","httpstatus":"-1","archivestatus":"404"},{"url":"http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00005.html","name":"SUSE-SU-2015:1183","refsource":"SUSE","tags":["Mailing List","Third Party Advisory"],"title":"[security-announce] SUSE-SU-2015:1183-1: important: Security update for","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://aix.software.ibm.com/aix/efixes/security/sendmail_advisory2.asc","name":"http://aix.software.ibm.com/aix/efixes/security/sendmail_advisory2.asc","refsource":"CONFIRM","tags":["Third Party Advisory"],"title":"","mime":"text/plain","httpstatus":"200","archivestatus":"200"},{"url":"http://www.securitytracker.com/id/1034728","name":"1034728","refsource":"SECTRACK","tags":["Third Party Advisory","VDB Entry"],"title":"Oracle Secure Global Desktop TLS Diffie-Hellman Export Cipher Downgrade Attack Lets Remote Users Decrypt Connections - SecurityTracker","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://lists.opensuse.org/opensuse-updates/2016-02/msg00097.html","name":"openSUSE-SU-2016:0483","refsource":"SUSE","tags":["Mailing List","Third Party Advisory"],"title":"openSUSE-SU-2016:0483-1: moderate: Security update for socat","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://marc.info/?l=bugtraq&m=143637549705650&w=2","name":"HPSBUX03363","refsource":"HP","tags":["Mailing List","Third Party Advisory"],"title":"'[security bulletin] HPSBUX03363 rev.1 - HP-UX Apache Web Server running OpenSSL, Remote Disclosure o' - MARC","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.securitytracker.com/id/1032655","name":"1032655","refsource":"SECTRACK","tags":["Third Party Advisory","VDB Entry"],"title":"IBM WebSphere Application Server Community Edition TLS Diffie-Hellman Export Cipher Downgrade Attack Lets Remote Users Decrypt Connections - SecurityTracker","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://lists.apple.com/archives/security-announce/2015/Jun/msg00002.html","name":"APPLE-SA-2015-06-30-2","refsource":"APPLE","tags":["Mailing List","Third Party Advisory"],"title":"APPLE-SA-2015-06-30-2 OS X Yosemite v10.10.4 and Security Update\t2015-005","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.securitytracker.com/id/1033760","name":"1033760","refsource":"SECTRACK","tags":["Third Party Advisory","VDB Entry"],"title":"IBM Tivoli Netcool System Service Monitor TLS Diffie-Hellman Export Cipher Downgrade Attack Lets Remote Users Decrypt Connections - SecurityTracker","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.securitytracker.com/id/1032474","name":"1032474","refsource":"SECTRACK","tags":["Third Party Advisory","VDB Entry"],"title":"Apache TLS Diffie-Hellman Export Cipher Downgrade Attack Lets Remote Users Decrypt Connections - SecurityTracker","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://lists.fedoraproject.org/pipermail/package-announce/2015-June/159351.html","name":"FEDORA-2015-9048","refsource":"FEDORA","tags":["Mailing List","Third Party Advisory"],"title":"[SECURITY] Fedora 22 Update: nss-3.19.1-1.0.fc22","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.ubuntu.com/usn/USN-2673-1","name":"USN-2673-1","refsource":"UBUNTU","tags":["Third Party Advisory"],"title":"USN-2673-1: Thunderbird vulnerabilities | Ubuntu","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://rhn.redhat.com/errata/RHSA-2015-1486.html","name":"RHSA-2015:1486","refsource":"REDHAT","tags":["Third Party Advisory"],"title":"Red Hat Customer Portal","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://rhn.redhat.com/errata/RHSA-2015-1526.html","name":"RHSA-2015:1526","refsource":"REDHAT","tags":["Third Party Advisory"],"title":"Red Hat Customer Portal","mime":"text/html","httpstatus":"-1","archivestatus":"200"},{"url":"http://www.securitytracker.com/id/1032656","name":"1032656","refsource":"SECTRACK","tags":["Third Party Advisory","VDB Entry"],"title":"Lotus Quickr for WebSphere Portal TLS Diffie-Hellman Export Cipher Downgrade Attack Lets Remote Users Decrypt Connections - SecurityTracker","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.securitytracker.com/id/1032783","name":"1032783","refsource":"SECTRACK","tags":["Third Party Advisory","VDB Entry"],"title":"Mozilla Firefox Multiple Flaws Let Remote Users Execute Arbitrary Code, Obtain Potentially Sensitive Information, Bypass Security Restrictions, and Gain Elevated Privileges - SecurityTracker","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://marc.info/?l=bugtraq&m=143655800220052&w=2","name":"HPSBGN03373","refsource":"HP","tags":["Mailing List","Third Party Advisory"],"title":"'[security bulletin] HPSBGN03373 rev.1 - HP Release Control running TLS, Remote Disclosure of Informa' - MARC","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www-01.ibm.com/support/docview.wss?uid=swg21962739","name":"http://www-01.ibm.com/support/docview.wss?uid=swg21962739","refsource":"CONFIRM","tags":["Third Party Advisory"],"title":"IBM Security Bulletin: Vulnerability in Diffie-Hellman ciphers affects IBM Tivoli Monitoring (CVE-2015-4000) - United States","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.securitytracker.com/id/1032932","name":"1032932","refsource":"SECTRACK","tags":["Third Party Advisory","VDB Entry"],"title":"IBM AIX TLS Diffie-Hellman Export Cipher Downgrade Attack Lets Remote Users Decrypt Connections - SecurityTracker","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://rhn.redhat.com/errata/RHSA-2015-1488.html","name":"RHSA-2015:1488","refsource":"REDHAT","tags":["Third Party Advisory"],"title":"Red Hat Customer Portal","mime":"text/html","httpstatus":"-1","archivestatus":"200"},{"url":"https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.19.1_release_notes","name":"https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.19.1_release_notes","refsource":"CONFIRM","tags":["Third Party Advisory"],"title":"NSS 3.19.1 release notes - Mozilla | MDN","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://rhn.redhat.com/errata/RHSA-2016-1624.html","name":"RHSA-2016:1624","refsource":"REDHAT","tags":["Third Party Advisory"],"title":"Red Hat Customer Portal","mime":"text/html","httpstatus":"-1","archivestatus":"200"},{"url":"http://www-01.ibm.com/support/docview.wss?uid=swg21959111","name":"http://www-01.ibm.com/support/docview.wss?uid=swg21959111","refsource":"CONFIRM","tags":["Third Party Advisory"],"title":"IBM Security Bulletin: Vulnerability in Diffie-Hellman ciphers affects IBM Rational ClearCase (CVE-2015-4000) - United States","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://rhn.redhat.com/errata/RHSA-2015-1197.html","name":"RHSA-2015:1197","refsource":"REDHAT","tags":["Third Party Advisory"],"title":"Red Hat Customer Portal","mime":"text/html","httpstatus":"-1","archivestatus":"200"},{"url":"https://bto.bluecoat.com/security-advisory/sa98","name":"https://bto.bluecoat.com/security-advisory/sa98","refsource":"CONFIRM","tags":["Third Party Advisory"],"title":"Broadcom Support Portal","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"http://www.mozilla.org/security/announce/2015/mfsa2015-70.html","name":"http://www.mozilla.org/security/announce/2015/mfsa2015-70.html","refsource":"CONFIRM","tags":["Third Party Advisory"],"title":"NSS accepts export-length DHE keys with regular DHE cipher suites — Mozilla","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://weakdh.org/","name":"https://weakdh.org/","refsource":"MISC","tags":["Third Party Advisory"],"title":"Weak Diffie-Hellman and the Logjam Attack","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www-01.ibm.com/support/docview.wss?uid=swg21959812","name":"http://www-01.ibm.com/support/docview.wss?uid=swg21959812","refsource":"CONFIRM","tags":["Third Party Advisory"],"title":"IBM Security Bulletin: Vulnerability in Diffie-Hellman ciphers affects IBM Cognos Metrics Manager (CVE-2015-4000) - United States","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www-01.ibm.com/support/docview.wss?uid=swg21959539","name":"http://www-01.ibm.com/support/docview.wss?uid=swg21959539","refsource":"CONFIRM","tags":["Third Party Advisory"],"title":"IBM The Diffie-Hellman vulnerability known as Logjam in Apache Tomcat may affect IBM WebSphere Application Server Community Edition (CVE-2015-4000) - United States","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www-01.ibm.com/support/docview.wss?uid=swg21959325","name":"http://www-01.ibm.com/support/docview.wss?uid=swg21959325","refsource":"CONFIRM","tags":["Third Party Advisory"],"title":"IBM Security Bulletin: Vulnerability in Diffie-Hellman ciphers affects multiple IBM Rational products based on IBM Jazz technology (CVE-2015-4000) - United States","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00034.html","name":"SUSE-SU-2015:1269","refsource":"SUSE","tags":["Mailing List","Third Party Advisory"],"title":"[security-announce] SUSE-SU-2015:1269-1: important: Security update for","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://marc.info/?l=bugtraq&m=144060576831314&w=2","name":"HPSBGN03399","refsource":"HP","tags":["Mailing List","Third Party Advisory"],"title":"'[security bulletin] HPSBGN03399 rev.1 - HP BSM Connector (BSMC), Remote Unauthorized Modification, D' - MARC","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.securitytracker.com/id/1032759","name":"1032759","refsource":"SECTRACK","tags":["Third Party Advisory","VDB Entry"],"title":"Apple OS X TLS Diffie-Hellman Export Cipher Downgrade Attack Lets Remote Users Decrypt Connections - SecurityTracker","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://marc.info/?l=bugtraq&m=144493176821532&w=2","name":"HPSBUX03512","refsource":"HP","tags":["Mailing List","Third Party Advisory"],"title":"'[security bulletin] HPSBUX03512 SSRT102254 rev.1 - HP-UX Web Server Suite running Apache, Remote Den' - MARC","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00024.html","name":"SUSE-SU-2015:1143","refsource":"SUSE","tags":["Mailing List","Third Party Advisory"],"title":"[security-announce] SUSE-SU-2015:1143-1: important: Security update for","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04770140","name":"https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04770140","refsource":"CONFIRM","tags":["Third Party Advisory"],"title":"Document Display | HPE Support Center","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"http://www.securitytracker.com/id/1032864","name":"1032864","refsource":"SECTRACK","tags":["Third Party Advisory","VDB Entry"],"title":"HP Release Control TLS Diffie-Hellman Export Cipher Downgrade Attack Lets Remote Users Decrypt Connections - SecurityTracker","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.debian.org/security/2016/dsa-3688","name":"DSA-3688","refsource":"DEBIAN","tags":["Third Party Advisory"],"title":"Debian -- Security Information -- DSA-3688-1 nss","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.securitytracker.com/id/1036218","name":"1036218","refsource":"SECTRACK","tags":["Third Party Advisory","VDB Entry"],"title":"HPE Service Manager TLS Diffie-Hellman Export Cipher Downgrade Attack Lets Remote Users Decrypt Connections - SecurityTracker","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://marc.info/?l=bugtraq&m=144061542602287&w=2","name":"HPSBGN03411","refsource":"HP","tags":["Mailing List","Third Party Advisory"],"title":"'[security bulletin] HPSBGN03411 rev.1 - HP Operations Agent Virtual Appliance, Remote Unauthorized D' - MARC","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://marc.info/?l=bugtraq&m=143880121627664&w=2","name":"SSRT102180","refsource":"HP","tags":["Mailing List","Third Party Advisory"],"title":"'[security bulletin] HPSBUX03388 SSRT102180 rev.1 - HP-UX running OpenSSL, Remote Disclosure of Infor' - MARC","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04740527","name":"https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04740527","refsource":"CONFIRM","tags":["Third Party Advisory"],"title":"Document Display | HPE Support Center","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"http://rhn.redhat.com/errata/RHSA-2015-1229.html","name":"RHSA-2015:1229","refsource":"REDHAT","tags":["Third Party Advisory"],"title":"Red Hat Customer Portal","mime":"text/html","httpstatus":"-1","archivestatus":"200"},{"url":"https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03831en_us","name":"https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03831en_us","refsource":"CONFIRM","tags":["Third Party Advisory"],"title":"Document Display | HPE Support Center","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00046.html","name":"SUSE-SU-2015:1319","refsource":"SUSE","tags":["Mailing List","Third Party Advisory"],"title":"[security-announce] SUSE-SU-2015:1319-1: important: Security update for","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://rhn.redhat.com/errata/RHSA-2015-1485.html","name":"RHSA-2015:1485","refsource":"REDHAT","tags":["Third Party Advisory"],"title":"Red Hat Customer Portal","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www-01.ibm.com/support/docview.wss?uid=swg21960191","name":"http://www-01.ibm.com/support/docview.wss?uid=swg21960191","refsource":"CONFIRM","tags":["Third Party Advisory"],"title":"Security Bulletin: Vulnerability in Diffie-Hellman ciphers affects FileNet Content Manager, IBM Content Foundation and FileNet BPM (CVE-2015-4000)","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.securitytracker.com/id/1033430","name":"1033430","refsource":"SECTRACK","tags":["Third Party Advisory","VDB Entry"],"title":"HP Operations Manager  for Linux and UNIX TLS Diffie-Hellman Export Cipher Downgrade Attack Lets Remote Users Decrypt Connections - SecurityTracker","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://rhn.redhat.com/errata/RHSA-2015-1072.html","name":"RHSA-2015:1072","refsource":"REDHAT","tags":["Third Party Advisory"],"title":"Red Hat Customer Portal","mime":"text/html","httpstatus":"-1","archivestatus":"200"},{"url":"http://www.ubuntu.com/usn/USN-2696-1","name":"USN-2696-1","refsource":"UBUNTU","tags":["Third Party Advisory"],"title":"USN-2696-1: OpenJDK 7 vulnerabilities | Ubuntu","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.debian.org/security/2015/dsa-3316","name":"DSA-3316","refsource":"DEBIAN","tags":["Third Party Advisory"],"title":"Debian -- Security Information -- DSA-3316-1 openjdk-7","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://lists.opensuse.org/opensuse-security-announce/2015-09/msg00017.html","name":"SUSE-SU-2015:1581","refsource":"SUSE","tags":["Mailing List","Third Party Advisory"],"title":"[security-announce] SUSE-SU-2015:1581-1: important: Security update for","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.securitytracker.com/id/1032476","name":"1032476","refsource":"SECTRACK","tags":["Third Party Advisory","VDB Entry"],"title":"OpenSSL TLS Diffie-Hellman Export Cipher Downgrade Attack Lets Remote Users Decrypt Connections - SecurityTracker","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.oracle.com/technetwork/topics/security/bulletinjul2015-2511963.html","name":"http://www.oracle.com/technetwork/topics/security/bulletinjul2015-2511963.html","refsource":"CONFIRM","tags":["Third Party Advisory"],"title":"Oracle Solaris Third Party Bulletin - July 2015","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.securitytracker.com/id/1033891","name":"1033891","refsource":"SECTRACK","tags":["Third Party Advisory","VDB Entry"],"title":"Oracle Communications Messaging Server TLS Diffie-Hellman Export Cipher Downgrade Attack Lets Remote Users Decrypt Connections - SecurityTracker","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04772190","name":"https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04772190","refsource":"CONFIRM","tags":["Third Party Advisory"],"title":"Document Display | HPE Support Center","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"http://www.securitytracker.com/id/1032865","name":"1032865","refsource":"SECTRACK","tags":["Third Party Advisory","VDB Entry"],"title":"IBM Tivoli Composite Application Manager TLS Diffie-Hellman Export Cipher Downgrade Attack Lets Remote Users Decrypt Connections - SecurityTracker","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.securitytracker.com/id/1032871","name":"1032871","refsource":"SECTRACK","tags":["Third Party Advisory","VDB Entry"],"title":"IBM Security Network Protection TLS Diffie-Hellman Export Cipher Downgrade Attack Lets Remote Users Decrypt Connections - SecurityTracker","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://marc.info/?l=bugtraq&m=144060606031437&w=2","name":"HPSBGN03405","refsource":"HP","tags":["Mailing List","Third Party Advisory"],"title":"'[security bulletin] HPSBGN03405 rev.1 - HP Integration Adaptor, Remote Unauthorized Modification, Di' - MARC","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.securitytracker.com/id/1032699","name":"1032699","refsource":"SECTRACK","tags":["Third Party Advisory","VDB Entry"],"title":"IBM Rational Build Forge TLS Diffie-Hellman Export Cipher Downgrade Attack Lets Remote Users Decrypt Connections - SecurityTracker","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www-01.ibm.com/support/docview.wss?uid=swg21959481","name":"http://www-01.ibm.com/support/docview.wss?uid=swg21959481","refsource":"CONFIRM","tags":["Third Party Advisory"],"title":"IBM Security Bulletin: Vulnerability in Diffie-Hellman ciphers affects IBM Cognos Mobile app on Android (CVE-2015-4000) - United States","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.securitytracker.com/id/1033341","name":"1033341","refsource":"SECTRACK","tags":["Third Party Advisory","VDB Entry"],"title":"NetBSD TLS Diffie-Hellman Export Cipher Downgrade Attack Lets Remote Users Decrypt Connections - SecurityTracker","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://support.apple.com/kb/HT204941","name":"http://support.apple.com/kb/HT204941","refsource":"CONFIRM","tags":["Third Party Advisory"],"title":"About the security content of iOS 8.4 - Apple Support","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://help.ecostruxureit.com/display/public/UADCO8x/StruxureWare+Data+Center+Operation+Software+Vulnerability+Fixes","name":"https://help.ecostruxureit.com/display/public/UADCO8x/StruxureWare+Data+Center+Operation+Software+Vulnerability+Fixes","refsource":"CONFIRM","tags":["Third Party Advisory"],"title":"StruxureWare Data Center Operation Software Vulnerability Fixes - User Assistance for StruxureWare Data Center Operation 8 - Help Center: Support for EcoStruxure IT, StruxureWare for Data Centers, and NetBotz","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c04949778","name":"http://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c04949778","refsource":"CONFIRM","tags":["Third Party Advisory"],"title":"HP Support document - HP Support Center","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://rhn.redhat.com/errata/RHSA-2015-1604.html","name":"RHSA-2015:1604","refsource":"REDHAT","tags":["Third Party Advisory"],"title":"Red Hat Customer Portal","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://security.gentoo.org/glsa/201701-46","name":"GLSA-201701-46","refsource":"GENTOO","tags":["Third Party Advisory"],"title":"Mozilla Network Security Service (NSS): Multiple vulnerabilities (GLSA 201701-46) — Gentoo security","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.debian.org/security/2015/dsa-3324","name":"DSA-3324","refsource":"DEBIAN","tags":["Third Party Advisory"],"title":"Debian -- Security Information -- DSA-3324-1 icedove","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www-01.ibm.com/support/docview.wss?uid=swg21959195","name":"http://www-01.ibm.com/support/docview.wss?uid=swg21959195","refsource":"CONFIRM","tags":["Third Party Advisory"],"title":"IBM notice: The page you requested cannot be displayed","mime":"text/html","httpstatus":"404","archivestatus":"410"},{"url":"https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05128722","name":"https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05128722","refsource":"CONFIRM","tags":["Third Party Advisory"],"title":"Document Display | HPE Support Center","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"http://www.securitytracker.com/id/1032702","name":"1032702","refsource":"SECTRACK","tags":["Third Party Advisory","VDB Entry"],"title":"IBM WebSphere Real Time TLS Diffie-Hellman Export Cipher Downgrade Attack Lets Remote Users Decrypt Connections - SecurityTracker","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://www-304.ibm.com/support/docview.wss?uid=swg21959745","name":"https://www-304.ibm.com/support/docview.wss?uid=swg21959745","refsource":"CONFIRM","tags":["Third Party Advisory"],"title":"Security Bulletin: Vulnerability in Diffie-Hellman ciphers affects IBM WebSphere MQ Internet Passthru (CVE-2015-4000)","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://www.openssl.org/news/secadv_20150611.txt","name":"https://www.openssl.org/news/secadv_20150611.txt","refsource":"CONFIRM","tags":["Vendor Advisory"],"title":"","mime":"text/plain","httpstatus":"200","archivestatus":"200"},{"url":"http://www.securitytracker.com/id/1033416","name":"1033416","refsource":"SECTRACK","tags":["Third Party Advisory","VDB Entry"],"title":"HP Performance Manager TLS Diffie-Hellman Export Cipher Downgrade Attack Lets Remote Users Decrypt Connections - SecurityTracker","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://lists.opensuse.org/opensuse-security-announce/2015-08/msg00021.html","name":"SUSE-SU-2015:1449","refsource":"SUSE","tags":["Mailing List","Third Party Advisory"],"title":"[security-announce] SUSE-SU-2015:1449-1: important: Security update for","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf","name":"https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf","refsource":"CONFIRM","tags":[],"title":"","mime":"application/pdf","httpstatus":"200","archivestatus":"404"},{"url":"https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05193083","name":"https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05193083","refsource":"CONFIRM","tags":["Third Party Advisory"],"title":"Document Display | HPE Support Center","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"http://www.fortiguard.com/advisory/2015-05-20-logjam-attack","name":"http://www.fortiguard.com/advisory/2015-05-20-logjam-attack","refsource":"CONFIRM","tags":["Third Party Advisory"],"title":"FortiGuard","mime":"text/html","httpstatus":"404","archivestatus":"404"},{"url":"http://www.securitytracker.com/id/1032654","name":"1032654","refsource":"SECTRACK","tags":["Third Party Advisory","VDB Entry"],"title":"IBM WebSphere MQIPT TLS Diffie-Hellman Export Cipher Downgrade Attack Lets Remote Users Decrypt Connections - SecurityTracker","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://lists.opensuse.org/opensuse-updates/2015-10/msg00011.html","name":"openSUSE-SU-2015:1684","refsource":"SUSE","tags":["Mailing List","Third Party Advisory"],"title":"openSUSE-SU-2015:1684-1: moderate: Security update for apache2","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.securitytracker.com/id/1040630","name":"1040630","refsource":"SECTRACK","tags":["Third Party Advisory","VDB Entry"],"title":"HPE integrated Lights Out (iLO) TLS Diffie-Hellman Export Cipher Downgrade Attack Lets Remote Users Decrypt Connections - SecurityTracker","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.securitytracker.com/id/1032475","name":"1032475","refsource":"SECTRACK","tags":["Third Party Advisory","VDB Entry"],"title":"Juniper Junos TLS Diffie-Hellman Export Cipher Downgrade Attack Lets Remote Users Decrypt Connections - SecurityTracker","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04832246","name":"https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04832246","refsource":"CONFIRM","tags":["Third Party Advisory"],"title":"Document Display | HPE Support Center","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"http://www.securitytracker.com/id/1032727","name":"1032727","refsource":"SECTRACK","tags":["Third Party Advisory","VDB Entry"],"title":"HP Discovery & Dependency Mapping Inventory TLS RC4 Algorithm Lets Remote Users Decrypt Data - SecurityTracker","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00004.html","name":"SUSE-SU-2015:1182","refsource":"SUSE","tags":["Mailing List","Third Party Advisory"],"title":"[security-announce] SUSE-SU-2015:1182-1: important: Security update for","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.securitytracker.com/id/1033433","name":"1033433","refsource":"SECTRACK","tags":["Third Party Advisory","VDB Entry"],"title":"HP Operations Manager for Windows TLS Diffie-Hellman Export Cipher Downgrade Attack Lets Remote Users Decrypt Connections - SecurityTracker","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://security.netapp.com/advisory/ntap-20150619-0001/","name":"https://security.netapp.com/advisory/ntap-20150619-0001/","refsource":"CONFIRM","tags":["Third Party Advisory"],"title":"CVE-2015-4000 Diffie-Hellman Export Cipher Suite vulnerability in Multiple NetApp Products | NetApp Product Security","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00032.html","name":"openSUSE-SU-2016:0226","refsource":"SUSE","tags":["Mailing List","Third Party Advisory"],"title":"[security-announce] openSUSE-SU-2016:0226-1: important: Security update","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.ubuntu.com/usn/USN-2656-1","name":"USN-2656-1","refsource":"UBUNTU","tags":["Third Party Advisory"],"title":"USN-2656-1: Firefox vulnerabilities | Ubuntu","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00006.html","name":"SUSE-SU-2015:1184","refsource":"SUSE","tags":["Mailing List","Third Party Advisory"],"title":"[security-announce] SUSE-SU-2015:1184-1: important: Security update for","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://blog.cloudflare.com/logjam-the-latest-tls-vulnerability-explained/","name":"https://blog.cloudflare.com/logjam-the-latest-tls-vulnerability-explained/","refsource":"MISC","tags":["Third Party Advisory"],"title":"Logjam: the latest TLS vulnerability explained","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.securityfocus.com/bid/74733","name":"74733","refsource":"BID","tags":["Third Party Advisory","VDB Entry"],"title":"SSL/TLS LogJam Man in the Middle Security Bypass Vulnerability","mime":"text/html","httpstatus":"200","archivestatus":"0"},{"url":"http://rhn.redhat.com/errata/RHSA-2015-1185.html","name":"RHSA-2015:1185","refsource":"REDHAT","tags":["Third Party Advisory"],"title":"Red Hat Customer Portal","mime":"text/html","httpstatus":"-1","archivestatus":"200"},{"url":"https://security.gentoo.org/glsa/201512-10","name":"GLSA-201512-10","refsource":"GENTOO","tags":["Third Party Advisory"],"title":"Mozilla Products: Multiple vulnerabilities  (GLSA 201512-10) — Gentoo Security","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10681","name":"http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10681","refsource":"CONFIRM","tags":["Third Party Advisory"],"title":"2015-05 Out of Cycle Security Bulletin: \"Logjam\" passive attack on sub-1024 DH groups, and active downgrade attack of TLS to DHE_EXPORT (CVE-2015-4000) - Juniper Networks","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.securitytracker.com/id/1032778","name":"1032778","refsource":"SECTRACK","tags":["Third Party Advisory","VDB Entry"],"title":"IBM Infosphere Optim Query Workload Tuner for DB2 TLS Diffie-Hellman Export Cipher Downgrade Attack Lets Remote Users Decrypt Connections - SecurityTracker","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00037.html","name":"openSUSE-SU-2015:1277","refsource":"SUSE","tags":["Mailing List","Third Party Advisory"],"title":"[security-announce] openSUSE-SU-2015:1277-1: important: Security update","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00040.html","name":"openSUSE-SU-2015:1289","refsource":"SUSE","tags":["Mailing List","Third Party Advisory"],"title":"[security-announce] openSUSE-SU-2015:1289-1: important: Security update","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00001.html","name":"SUSE-SU-2015:1177","refsource":"SUSE","tags":["Mailing List","Third Party Advisory"],"title":"[security-announce] SUSE-SU-2015:1177-1: important: Security update for","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00026.html","name":"SUSE-SU-2015:1150","refsource":"SUSE","tags":["Mailing List","Third Party Advisory"],"title":"[security-announce] SUSE-SU-2015:1150-1: important: Security update for","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.debian.org/security/2015/dsa-3287","name":"DSA-3287","refsource":"DEBIAN","tags":["Third Party Advisory"],"title":"Debian -- Security Information -- DSA-3287-1 openssl","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.securitytracker.com/id/1032652","name":"1032652","refsource":"SECTRACK","tags":["Third Party Advisory","VDB Entry"],"title":"IBM Cognos Mobile App TLS Diffie-Hellman Export Cipher Downgrade Attack Lets Remote Users Decrypt Connections - SecurityTracker","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://puppet.com/security/cve/CVE-2015-4000","name":"https://puppet.com/security/cve/CVE-2015-4000","refsource":"CONFIRM","tags":["Third Party Advisory"],"title":"CVE-2015-4000 - Logjam TLS Vulnerability | Puppet","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.securitytracker.com/id/1032637","name":"1032637","refsource":"SECTRACK","tags":["Third Party Advisory","VDB Entry"],"title":"IBM License Metric Tool TLS Diffie-Hellman Export Cipher Downgrade Attack Lets Remote Users Decrypt Connections - SecurityTracker","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www-304.ibm.com/support/docview.wss?uid=swg21962816","name":"http://www-304.ibm.com/support/docview.wss?uid=swg21962816","refsource":"CONFIRM","tags":["Third Party Advisory"],"title":"Security Bulletin: Vulnerability in Diffie-Hellman ciphers affects IBM Rational ClearQuest(CVE-2015-4000)","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"http://lists.fedoraproject.org/pipermail/package-announce/2015-June/160117.html","name":"FEDORA-2015-9161","refsource":"FEDORA","tags":["Mailing List","Third Party Advisory"],"title":"[SECURITY] Fedora 20 Update: nss-3.19.1-1.0.fc20","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.securitytracker.com/id/1033067","name":"1033067","refsource":"SECTRACK","tags":["Third Party Advisory","VDB Entry"],"title":"IBM InfoSphere Guardium TLS Diffie-Hellman Export Cipher Downgrade Attack Lets Remote Users Decrypt Connections - SecurityTracker","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.ubuntu.com/usn/USN-2706-1","name":"USN-2706-1","refsource":"UBUNTU","tags":["Third Party Advisory"],"title":"USN-2706-1: OpenJDK 6 vulnerabilities | Ubuntu","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www-01.ibm.com/support/docview.wss?uid=swg21959530","name":"http://www-01.ibm.com/support/docview.wss?uid=swg21959530","refsource":"CONFIRM","tags":["Third Party Advisory"],"title":"Security Bulletin: Multiple vulnerabilities in IBM Java Runtime affect IBM Rational Software Architect , Rational Software Architect for Websphere software and Rational Software Architect Real Time (CVE-2015-4000, CVE-2015-0488, CVE-2015-0478, CVE-2015-02","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.securitytracker.com/id/1032688","name":"1032688","refsource":"SECTRACK","tags":["Third Party Advisory","VDB Entry"],"title":"McAfee Firewall Enterprise TLS Diffie-Hellman Export Cipher Downgrade Attack Lets Remote Users Decrypt Connections - SecurityTracker","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://kc.mcafee.com/corporate/index?page=content&id=SB10122","name":"https://kc.mcafee.com/corporate/index?page=content&id=SB10122","refsource":"CONFIRM","tags":["Third Party Advisory"],"title":"McAfee KnowledgeBase - Intel Security - Security Bulletin: Seven OpenSSL CVEs Announced on June 11, 2015","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://rhn.redhat.com/errata/RHSA-2015-1242.html","name":"RHSA-2015:1242","refsource":"REDHAT","tags":["Third Party Advisory"],"title":"Red Hat Customer Portal","mime":"text/html","httpstatus":"-1","archivestatus":"200"},{"url":"http://www.securitytracker.com/id/1032910","name":"1032910","refsource":"SECTRACK","tags":["Third Party Advisory","VDB Entry"],"title":"Oracle Java SE Multiple Flaws Lets Local and Remote Users Gain Elevated Privileges and Remote Users Partially Access Data, Modify Data, and Deny Service - SecurityTracker","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.securitytracker.com/id/1032648","name":"1032648","refsource":"SECTRACK","tags":["Third Party Advisory","VDB Entry"],"title":"IBM Rational Team Concert TLS Diffie-Hellman Export Cipher Downgrade Attack Lets Remote Users Decrypt Connections - SecurityTracker","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00040.html","name":"SUSE-SU-2016:0262","refsource":"SUSE","tags":["Mailing List","Third Party Advisory"],"title":"[security-announce] SUSE-SU-2016:0262-1: important: Security update for","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www-304.ibm.com/support/docview.wss?uid=swg21960194","name":"http://www-304.ibm.com/support/docview.wss?uid=swg21960194","refsource":"CONFIRM","tags":["Third Party Advisory"],"title":"Security Bulletin: Multiple vulnerabilities in IBM Java SDK affect IBM SPSS Modeler (CVE-2015-4000, CVE-2015-0478, CVE-2015-0488)","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00003.html","name":"SUSE-SU-2015:1181","refsource":"SUSE","tags":["Mailing List","Third Party Advisory"],"title":"[security-announce] SUSE-SU-2015:1181-1: important: Security update for","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://lists.opensuse.org/opensuse-security-announce/2015-10/msg00001.html","name":"SUSE-SU-2015:1663","refsource":"SUSE","tags":["Mailing List","Third Party Advisory"],"title":"[security-announce] SUSE-SU-2015:1663-1: important: Security update for","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04773119","name":"https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04773119","refsource":"CONFIRM","tags":["Third Party Advisory"],"title":"Document Display | HPE Support Center","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://www.suse.com/security/cve/CVE-2015-4000.html","name":"https://www.suse.com/security/cve/CVE-2015-4000.html","refsource":"CONFIRM","tags":["Third Party Advisory"],"title":"CVE-2015-4000","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://marc.info/?l=bugtraq&m=143506486712441&w=2","name":"HPSBMU03356","refsource":"HP","tags":["Mailing List","Third Party Advisory"],"title":"'[security bulletin] HPSBMU03356 rev.1 - HP Business Service Automation Essentials (BSAE) running TLS' - MARC","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://lists.opensuse.org/opensuse-updates/2016-02/msg00094.html","name":"openSUSE-SU-2016:0478","refsource":"SUSE","tags":["Mailing List","Third Party Advisory"],"title":"openSUSE-SU-2016:0478-1: moderate: Security update for socat","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.securitytracker.com/id/1033208","name":"1033208","refsource":"SECTRACK","tags":["Third Party Advisory","VDB Entry"],"title":"IBM FileNet Content Manager TLS Diffie-Hellman Export Cipher Downgrade Attack Lets Remote Users Decrypt Connections - SecurityTracker","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://marc.info/?l=bugtraq&m=144043644216842&w=2","name":"HPSBMU03345","refsource":"HP","tags":["Mailing List","Third Party Advisory"],"title":"'[security bulletin] HPSBMU03345 rev.1 - HP Network Node Manager i (NNMi) and Smart Plugins (iSPIs) f' - MARC","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://lists.opensuse.org/opensuse-updates/2015-07/msg00016.html","name":"openSUSE-SU-2015:1209","refsource":"SUSE","tags":["Mailing List","Third Party Advisory"],"title":"openSUSE-SU-2015:1209-1: moderate: Security update for mysql-community-s","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.securitytracker.com/id/1033064","name":"1033064","refsource":"SECTRACK","tags":["Third Party Advisory","VDB Entry"],"title":"IBM Content Manager Enterprise Edition TLS Diffie-Hellman Export Cipher Downgrade Attack Lets Remote Users Decrypt Connections - SecurityTracker","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www-304.ibm.com/support/docview.wss?uid=swg21960418","name":"http://www-304.ibm.com/support/docview.wss?uid=swg21960418","refsource":"CONFIRM","tags":["Third Party Advisory"],"title":"Security Bulletin: Vulnerability in Diffie-Hellman ciphers affects Tivoli Storage Manager FastBack for Workstations (CVE-2015-4000)","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"http://www.securitytracker.com/id/1032645","name":"1032645","refsource":"SECTRACK","tags":["Third Party Advisory","VDB Entry"],"title":"IBM Cognos Metrics Manager TLS Diffie-Hellman Export Cipher Downgrade Attack Lets Remote Users Decrypt Connections - SecurityTracker","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.securitytracker.com/id/1032784","name":"1032784","refsource":"SECTRACK","tags":["Third Party Advisory","VDB Entry"],"title":"Mozilla Thunderbird Multiple Flaws Let Remote Users Execute Arbitrary Code, Obtain Potentially Sensitive Information, and Bypass Security Restrictions - SecurityTracker","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.solarwinds.com/documentation/storage/storagemanager/docs/ReleaseNotes/releaseNotes.htm","name":"http://www.solarwinds.com/documentation/storage/storagemanager/docs/ReleaseNotes/releaseNotes.htm","refsource":"CONFIRM","tags":["Third Party Advisory"],"title":"SolarWinds Storage Manager Release Notes","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.securitytracker.com/id/1032651","name":"1032651","refsource":"SECTRACK","tags":["Third Party Advisory","VDB Entry"],"title":"IBM Rational Software Architect Design Manager TLS Diffie-Hellman Export Cipher Downgrade Attack Lets Remote Users Decrypt Connections - SecurityTracker","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://openwall.com/lists/oss-security/2015/05/20/8","name":"[oss-security] 20150520 CVE-2015-4000 - TLS does not properly convey server's ciphersuite choice","refsource":"MLIST","tags":["Mailing List","Third Party Advisory"],"title":"oss-security - CVE-2015-4000 - TLS does not properly convey server's ciphersuite choice","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://www.oracle.com/security-alerts/cpujan2021.html","name":"https://www.oracle.com/security-alerts/cpujan2021.html","refsource":"MISC","tags":[],"title":"Oracle Critical Patch Update Advisory - January 2021","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://security.gentoo.org/glsa/201603-11","name":"GLSA-201603-11","refsource":"GENTOO","tags":["Third Party Advisory"],"title":"Oracle JRE/JDK: Multiple vulnerabilities (GLSA 201603-11) — Gentoo Security","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://weakdh.org/imperfect-forward-secrecy.pdf","name":"https://weakdh.org/imperfect-forward-secrecy.pdf","refsource":"MISC","tags":["Third Party Advisory"],"title":"","mime":"application/pdf","httpstatus":"200","archivestatus":"200"},{"url":"http://www-01.ibm.com/support/docview.wss?uid=swg21959453","name":"http://www-01.ibm.com/support/docview.wss?uid=swg21959453","refsource":"CONFIRM","tags":["Third Party Advisory"],"title":"IBM Security Bulletin: Vulnerability in Diffie-Helman ciphers affects IBM License Metric Tool and IBM Endpoint Manager for Software Use Analysis (CVE-2015-4000) - United States","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1138554","name":"https://bugzilla.mozilla.org/show_bug.cgi?id=1138554","refsource":"CONFIRM","tags":["Issue Tracking","Third Party Advisory"],"title":"1138554 – (CVE-2015-4000) NSS accepts export-length DHE keys with regular DHE cipher suites (\"Logjam\")","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html","name":"http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html","refsource":"CONFIRM","tags":["Third Party Advisory"],"title":"Oracle Solaris Bulletin - January 2016","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www-01.ibm.com/support/docview.wss?uid=swg21962455","name":"http://www-01.ibm.com/support/docview.wss?uid=swg21962455","refsource":"CONFIRM","tags":["Third Party Advisory"],"title":"IBM Security Bulletin: Vulnerability in Diffie-Hellman ciphers affects Content Manager Enterprise Edition (CVE-2015-4000) - United States","mime":"text/html","httpstatus":"404","archivestatus":"200"},{"url":"http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00023.html","name":"openSUSE-SU-2015:1139","refsource":"SUSE","tags":["Mailing List","Third Party Advisory"],"title":"[security-announce] openSUSE-SU-2015:1139-1: important: Security update","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html","name":"http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html","refsource":"CONFIRM","tags":["Third Party Advisory"],"title":"Oracle Critical Patch Update - January 2016","mime":"text/html","httpstatus":"200","archivestatus":"0"},{"url":"http://www.securitytracker.com/id/1034087","name":"1034087","refsource":"SECTRACK","tags":["Third Party Advisory","VDB Entry"],"title":"HP Project and Portfolio Management Center TLS Diffie-Hellman Export Cipher Downgrade Attack Lets Remote Users Decrypt Connections - SecurityTracker","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04953655","name":"https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04953655","refsource":"CONFIRM","tags":["Third Party Advisory"],"title":"Document Display | HPE Support Center","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://www.cve.org/CVERecord?id=CVE-2015-4000","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2015-4000","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2015","cve_id":"4000","vulnerable":"1","versionEndIncluding":"8.3","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"apple","cpe5":"iphone_os","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2015","cve_id":"4000","vulnerable":"1","versionEndIncluding":"10.10.3","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"apple","cpe5":"mac_os_x","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2015","cve_id":"4000","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"apple","cpe5":"safari","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2015","cve_id":"4000","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"apple","cpe5":"safari","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2015","cve_id":"4000","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"apple","cpe5":"safari","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2015","cve_id":"4000","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"canonical","cpe5":"ubuntu_linux","cpe6":"12.04","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"lts","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2015","cve_id":"4000","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"canonical","cpe5":"ubuntu_linux","cpe6":"14.04","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"lts","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2015","cve_id":"4000","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"canonical","cpe5":"ubuntu_linux","cpe6":"14.10","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2015","cve_id":"4000","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"canonical","cpe5":"ubuntu_linux","cpe6":"15.04","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2015","cve_id":"4000","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"canonical","cpe5":"ubuntu_linux","cpe6":"12.04","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"lts","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2015","cve_id":"4000","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"canonical","cpe5":"ubuntu_linux","cpe6":"14.04","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"lts","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2015","cve_id":"4000","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"canonical","cpe5":"ubuntu_linux","cpe6":"14.10","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2015","cve_id":"4000","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"canonical","cpe5":"ubuntu_linux","cpe6":"15.04","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2015","cve_id":"4000","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"debian","cpe5":"debian_linux","cpe6":"7.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2015","cve_id":"4000","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"debian","cpe5":"debian_linux","cpe6":"8.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2015","cve_id":"4000","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"debian","cpe5":"debian_linux","cpe6":"7.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2015","cve_id":"4000","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"debian","cpe5":"debian_linux","cpe6":"8.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2015","cve_id":"4000","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"google","cpe5":"chrome","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2015","cve_id":"4000","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"google","cpe5":"chrome","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2015","cve_id":"4000","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"hp","cpe5":"hp-ux","cpe6":"b.11.31","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2015","cve_id":"4000","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"hp","cpe5":"hp-ux","cpe6":"b.11.31","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2015","cve_id":"4000","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"ibm","cpe5":"content_manager","cpe6":"8.5","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"enterprise","cpe12":"*","cpe13":"*"},{"cve_year":"2015","cve_id":"4000","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"ibm","cpe5":"content_manager","cpe6":"8.5","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"enterprise","cpe12":"*","cpe13":"*"},{"cve_year":"2015","cve_id":"4000","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"microsoft","cpe5":"ie","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2015","cve_id":"4000","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"microsoft","cpe5":"ie","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2015","cve_id":"4000","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"microsoft","cpe5":"internet_explorer","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2015","cve_id":"4000","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"microsoft","cpe5":"internet_explorer","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2015","cve_id":"4000","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"mozilla","cpe5":"firefox","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2015","cve_id":"4000","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"mozilla","cpe5":"firefox","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2015","cve_id":"4000","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"mozilla","cpe5":"firefox","cpe6":"39.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2015","cve_id":"4000","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"mozilla","cpe5":"firefox","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2015","cve_id":"4000","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"mozilla","cpe5":"firefox","cpe6":"39.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2015","cve_id":"4000","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"mozilla","cpe5":"firefox_esr","cpe6":"31.8","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2015","cve_id":"4000","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"mozilla","cpe5":"firefox_esr","cpe6":"38.1.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2015","cve_id":"4000","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"mozilla","cpe5":"firefox_esr","cpe6":"31.8","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2015","cve_id":"4000","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"mozilla","cpe5":"firefox_esr","cpe6":"38.1.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2015","cve_id":"4000","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"mozilla","cpe5":"firefox_os","cpe6":"2.2","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2015","cve_id":"4000","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"mozilla","cpe5":"firefox_os","cpe6":"2.2","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2015","cve_id":"4000","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"mozilla","cpe5":"network_security_services","cpe6":"3.19","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2015","cve_id":"4000","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"mozilla","cpe5":"network_security_services","cpe6":"3.19","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2015","cve_id":"4000","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"mozilla","cpe5":"seamonkey","cpe6":"2.35","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2015","cve_id":"4000","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"mozilla","cpe5":"seamonkey","cpe6":"2.35","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2015","cve_id":"4000","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"mozilla","cpe5":"thunderbird","cpe6":"31.8","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2015","cve_id":"4000","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"mozilla","cpe5":"thunderbird","cpe6":"38.1","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2015","cve_id":"4000","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"mozilla","cpe5":"thunderbird","cpe6":"31.8","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2015","cve_id":"4000","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"mozilla","cpe5":"thunderbird","cpe6":"38.1","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2015","cve_id":"4000","vulnerable":"1","versionEndIncluding":"1.0.1m","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"openssl","cpe5":"openssl","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2015","cve_id":"4000","vulnerable":"1","versionEndIncluding":"1.0.2a","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"openssl","cpe5":"openssl","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2015","cve_id":"4000","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"opera","cpe5":"opera_browser","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2015","cve_id":"4000","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"opera","cpe5":"opera_browser","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2015","cve_id":"4000","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"oracle","cpe5":"jdk","cpe6":"1.6.0","cpe7":"update95","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2015","cve_id":"4000","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"oracle","cpe5":"jdk","cpe6":"1.6.0","cpe7":"update_95","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2015","cve_id":"4000","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"oracle","cpe5":"jdk","cpe6":"1.7.0","cpe7":"update75","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2015","cve_id":"4000","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"oracle","cpe5":"jdk","cpe6":"1.7.0","cpe7":"update80","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2015","cve_id":"4000","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"oracle","cpe5":"jdk","cpe6":"1.7.0","cpe7":"update_80","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2015","cve_id":"4000","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"oracle","cpe5":"jdk","cpe6":"1.8.0","cpe7":"update45","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2015","cve_id":"4000","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"oracle","cpe5":"jdk","cpe6":"1.8.0","cpe7":"update_33","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2015","cve_id":"4000","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"oracle","cpe5":"jdk","cpe6":"1.6.0","cpe7":"update_95","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2015","cve_id":"4000","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"oracle","cpe5":"jdk","cpe6":"1.7.0","cpe7":"update75","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2015","cve_id":"4000","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"oracle","cpe5":"jdk","cpe6":"1.7.0","cpe7":"update_80","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2015","cve_id":"4000","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"oracle","cpe5":"jdk","cpe6":"1.8.0","cpe7":"update45","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2015","cve_id":"4000","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"oracle","cpe5":"jdk","cpe6":"1.8.0","cpe7":"update_33","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2015","cve_id":"4000","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"oracle","cpe5":"jre","cpe6":"1.6.0","cpe7":"update_95","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2015","cve_id":"4000","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"oracle","cpe5":"jre","cpe6":"1.7.0","cpe7":"update_75","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2015","cve_id":"4000","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"oracle","cpe5":"jre","cpe6":"1.7.0","cpe7":"update_80","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2015","cve_id":"4000","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"oracle","cpe5":"jre","cpe6":"1.8.0","cpe7":"update_33","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2015","cve_id":"4000","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"oracle","cpe5":"jre","cpe6":"1.8.0","cpe7":"update_45","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2015","cve_id":"4000","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"oracle","cpe5":"jre","cpe6":"1.6.0","cpe7":"update_95","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2015","cve_id":"4000","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"oracle","cpe5":"jre","cpe6":"1.7.0","cpe7":"update_75","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2015","cve_id":"4000","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"oracle","cpe5":"jre","cpe6":"1.7.0","cpe7":"update_80","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2015","cve_id":"4000","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"oracle","cpe5":"jre","cpe6":"1.8.0","cpe7":"update_33","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2015","cve_id":"4000","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"oracle","cpe5":"jre","cpe6":"1.8.0","cpe7":"update_45","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2015","cve_id":"4000","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"oracle","cpe5":"jrockit","cpe6":"r28.3.6","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2015","cve_id":"4000","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"oracle","cpe5":"jrockit","cpe6":"r28.3.6","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2015","cve_id":"4000","vulnerable":"1","versionEndIncluding":"1121","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"oracle","cpe5":"sparc-opl_service_processor","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2015","cve_id":"4000","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"suse","cpe5":"linux_enterprise_desktop","cpe6":"12","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2015","cve_id":"4000","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"suse","cpe5":"linux_enterprise_desktop","cpe6":"12","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2015","cve_id":"4000","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"suse","cpe5":"linux_enterprise_server","cpe6":"11.0","cpe7":"sp4","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2015","cve_id":"4000","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"suse","cpe5":"linux_enterprise_server","cpe6":"11.0","cpe7":"sp4","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2015","cve_id":"4000","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"suse","cpe5":"linux_enterprise_software_development_kit","cpe6":"12","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2015","cve_id":"4000","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"suse","cpe5":"linux_enterprise_software_development_kit","cpe6":"12","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2015","cve_id":"4000","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"suse","cpe5":"suse_linux_enterprise_server","cpe6":"12","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2015","cve_id":"4000","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"suse","cpe5":"suse_linux_enterprise_server","cpe6":"12","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[{"cve":"CVE-2015-4000","qid":"390226","title":"Oracle Managed Virtualization (VM) Server for x86 Security Update for Open Secure Sockets Layer (OpenSSL) (OVMSA-2021-0011)"},{"cve":"CVE-2015-4000","qid":"390284","title":"Oracle Managed Virtualization (VM) Server for x86 Security Update for Open Secure Sockets Layer (OpenSSL) (OVMSA-2023-0013)"},{"cve":"CVE-2015-4000","qid":"591280","title":"Siemens SCALANCE X-200RNA Switch Devices Denial of Service (DoS) Multiple Vulnerabilities (ICSA-22-349-21, SSA-412672)"},{"cve":"CVE-2015-4000","qid":"671073","title":"EulerOS Security Update for Open Secure Sockets Layer098e (OpenSSL098e) (EulerOS-SA-2019-2643)"},{"cve":"CVE-2015-4000","qid":"671109","title":"EulerOS Security Update for Open Secure Sockets Layer098e (OpenSSL098e) (EulerOS-SA-2019-2509)"},{"cve":"CVE-2015-4000","qid":"710518","title":"Gentoo Linux Mozilla Network Security Service (NSS) Multiple Vulnerabilities (GLSA 201701-46)"},{"cve":"CVE-2015-4000","qid":"753736","title":"SUSE Enterprise Linux Security Update for nrpe (SUSE-SU-2023:0586-1)"}]},"source_records":{"cve_program":{"CVE_data_meta":{"ASSIGNER":"cve@mitre.org","ID":"CVE-2015-4000","STATE":"PUBLIC"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"n/a","version":{"version_data":[{"version_value":"n/a"}]}}]},"vendor_name":"n/a"}]}},"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"The TLS protocol 1.2 and earlier, when a DHE_EXPORT ciphersuite is enabled on a server but not on a client, does not properly convey a DHE_EXPORT choice, which allows man-in-the-middle attackers to conduct cipher-downgrade attacks by rewriting a ClientHello with DHE replaced by DHE_EXPORT and then rewriting a ServerHello with DHE_EXPORT replaced by DHE, aka the \"Logjam\" issue."}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"n/a"}]}]},"references":{"reference_data":[{"name":"SUSE-SU-2015:1184","refsource":"SUSE","url":"http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00006.html"},{"name":"SUSE-SU-2015:1177","refsource":"SUSE","url":"http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00001.html"},{"name":"SSRT102180","refsource":"HP","url":"http://marc.info/?l=bugtraq&m=143880121627664&w=2"},{"name":"RHSA-2015:1243","refsource":"REDHAT","url":"http://rhn.redhat.com/errata/RHSA-2015-1243.html"},{"name":"openSUSE-SU-2015:1229","refsource":"SUSE","url":"http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00025.html"},{"name":"1033208","refsource":"SECTRACK","url":"http://www.securitytracker.com/id/1033208"},{"name":"1032637","refsource":"SECTRACK","url":"http://www.securitytracker.com/id/1032637"},{"name":"HPSBGN03404","refsource":"HP","url":"http://marc.info/?l=bugtraq&m=144050121701297&w=2"},{"name":"DSA-3688","refsource":"DEBIAN","url":"http://www.debian.org/security/2016/dsa-3688"},{"name":"DSA-3287","refsource":"DEBIAN","url":"http://www.debian.org/security/2015/dsa-3287"},{"name":"HPSBUX03512","refsource":"HP","url":"http://marc.info/?l=bugtraq&m=144493176821532&w=2"},{"name":"1032865","refsource":"SECTRACK","url":"http://www.securitytracker.com/id/1032865"},{"name":"HPSBGN03351","refsource":"HP","url":"http://marc.info/?l=bugtraq&m=143557934009303&w=2"},{"name":"SUSE-SU-2015:1268","refsource":"SUSE","url":"http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00033.html"},{"name":"SUSE-SU-2015:1150","refsource":"SUSE","url":"http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00026.html"},{"name":"1034728","refsource":"SECTRACK","url":"http://www.securitytracker.com/id/1034728"},{"name":"SUSE-SU-2015:1183","refsource":"SUSE","url":"http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00005.html"},{"name":"1032656","refsource":"SECTRACK","url":"http://www.securitytracker.com/id/1032656"},{"name":"RHSA-2016:2056","refsource":"REDHAT","url":"http://rhn.redhat.com/errata/RHSA-2016-2056.html"},{"name":"[oss-security] 20150520 CVE-2015-4000 - TLS does not properly convey server's ciphersuite choice","refsource":"MLIST","url":"http://openwall.com/lists/oss-security/2015/05/20/8"},{"name":"openSUSE-SU-2015:1684","refsource":"SUSE","url":"http://lists.opensuse.org/opensuse-updates/2015-10/msg00011.html"},{"name":"HPSBGN03361","refsource":"HP","url":"http://marc.info/?l=bugtraq&m=143628304012255&w=2"},{"name":"HPSBGN03399","refsource":"HP","url":"http://marc.info/?l=bugtraq&m=144060576831314&w=2"},{"name":"1032475","refsource":"SECTRACK","url":"http://www.securitytracker.com/id/1032475"},{"name":"1032960","refsource":"SECTRACK","url":"http://www.securitytracker.com/id/1032960"},{"name":"openSUSE-SU-2016:0255","refsource":"SUSE","url":"http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00037.html"},{"name":"1032653","refsource":"SECTRACK","url":"http://www.securitytracker.com/id/1032653"},{"name":"SUSE-SU-2016:0224","refsource":"SUSE","url":"http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00031.html"},{"name":"1033385","refsource":"SECTRACK","url":"http://www.securitytracker.com/id/1033385"},{"name":"GLSA-201512-10","refsource":"GENTOO","url":"https://security.gentoo.org/glsa/201512-10"},{"name":"RHSA-2015:1229","refsource":"REDHAT","url":"http://rhn.redhat.com/errata/RHSA-2015-1229.html"},{"name":"openSUSE-SU-2016:0483","refsource":"SUSE","url":"http://lists.opensuse.org/opensuse-updates/2016-02/msg00097.html"},{"name":"1032864","refsource":"SECTRACK","url":"http://www.securitytracker.com/id/1032864"},{"name":"1032910","refsource":"SECTRACK","url":"http://www.securitytracker.com/id/1032910"},{"name":"1032645","refsource":"SECTRACK","url":"http://www.securitytracker.com/id/1032645"},{"name":"USN-2706-1","refsource":"UBUNTU","url":"http://www.ubuntu.com/usn/USN-2706-1"},{"name":"GLSA-201701-46","refsource":"GENTOO","url":"https://security.gentoo.org/glsa/201701-46"},{"name":"RHSA-2015:1526","refsource":"REDHAT","url":"http://rhn.redhat.com/errata/RHSA-2015-1526.html"},{"name":"1033760","refsource":"SECTRACK","url":"http://www.securitytracker.com/id/1033760"},{"name":"RHSA-2015:1485","refsource":"REDHAT","url":"http://rhn.redhat.com/errata/RHSA-2015-1485.html"},{"name":"RHSA-2015:1197","refsource":"REDHAT","url":"http://rhn.redhat.com/errata/RHSA-2015-1197.html"},{"name":"HPSBMU03401","refsource":"HP","url":"http://marc.info/?l=bugtraq&m=144104533800819&w=2"},{"name":"1032699","refsource":"SECTRACK","url":"http://www.securitytracker.com/id/1032699"},{"name":"1032476","refsource":"SECTRACK","url":"http://www.securitytracker.com/id/1032476"},{"name":"1032649","refsource":"SECTRACK","url":"http://www.securitytracker.com/id/1032649"},{"name":"HPSBMU03345","refsource":"HP","url":"http://marc.info/?l=bugtraq&m=144043644216842&w=2"},{"name":"HPSBUX03363","refsource":"HP","url":"http://marc.info/?l=bugtraq&m=143637549705650&w=2"},{"name":"RHSA-2015:1544","refsource":"REDHAT","url":"http://rhn.redhat.com/errata/RHSA-2015-1544.html"},{"name":"FEDORA-2015-9130","refsource":"FEDORA","url":"http://lists.fedoraproject.org/pipermail/package-announce/2015-June/159314.html"},{"name":"SUSE-SU-2015:1182","refsource":"SUSE","url":"http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00004.html"},{"name":"SSRT102112","refsource":"HP","url":"https://h20564.www2.hp.com/hpsc/doc/public/display?docId=emr_na-c04718196"},{"name":"1032688","refsource":"SECTRACK","url":"http://www.securitytracker.com/id/1032688"},{"name":"SUSE-SU-2015:1143","refsource":"SUSE","url":"http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00024.html"},{"name":"1032652","refsource":"SECTRACK","url":"http://www.securitytracker.com/id/1032652"},{"name":"FEDORA-2015-9048","refsource":"FEDORA","url":"http://lists.fedoraproject.org/pipermail/package-announce/2015-June/159351.html"},{"name":"RHSA-2015:1185","refsource":"REDHAT","url":"http://rhn.redhat.com/errata/RHSA-2015-1185.html"},{"name":"HPSBGN03362","refsource":"HP","url":"http://marc.info/?l=bugtraq&m=143558092609708&w=2"},{"name":"APPLE-SA-2015-06-30-2","refsource":"APPLE","url":"http://lists.apple.com/archives/security-announce/2015/Jun/msg00002.html"},{"name":"openSUSE-SU-2015:1289","refsource":"SUSE","url":"http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00040.html"},{"name":"FEDORA-2015-9161","refsource":"FEDORA","url":"http://lists.fedoraproject.org/pipermail/package-announce/2015-June/160117.html"},{"name":"HPSBGN03402","refsource":"HP","url":"http://marc.info/?l=bugtraq&m=144069189622016&w=2"},{"name":"1032648","refsource":"SECTRACK","url":"http://www.securitytracker.com/id/1032648"},{"name":"1032759","refsource":"SECTRACK","url":"http://www.securitytracker.com/id/1032759"},{"name":"RHSA-2015:1228","refsource":"REDHAT","url":"http://rhn.redhat.com/errata/RHSA-2015-1228.html"},{"name":"HPSBGN03405","refsource":"HP","url":"http://marc.info/?l=bugtraq&m=144060606031437&w=2"},{"name":"DSA-3316","refsource":"DEBIAN","url":"http://www.debian.org/security/2015/dsa-3316"},{"name":"1033209","refsource":"SECTRACK","url":"http://www.securitytracker.com/id/1033209"},{"name":"1032871","refsource":"SECTRACK","url":"http://www.securitytracker.com/id/1032871"},{"name":"DSA-3324","refsource":"DEBIAN","url":"http://www.debian.org/security/2015/dsa-3324"},{"name":"1032655","refsource":"SECTRACK","url":"http://www.securitytracker.com/id/1032655"},{"name":"1033210","refsource":"SECTRACK","url":"http://www.securitytracker.com/id/1033210"},{"name":"HPSBGN03411","refsource":"HP","url":"http://marc.info/?l=bugtraq&m=144061542602287&w=2"},{"name":"openSUSE-SU-2015:1277","refsource":"SUSE","url":"http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00037.html"},{"name":"HPSBGN03533","refsource":"HP","url":"http://marc.info/?l=bugtraq&m=145409266329539&w=2"},{"name":"USN-2673-1","refsource":"UBUNTU","url":"http://www.ubuntu.com/usn/USN-2673-1"},{"name":"1034884","refsource":"SECTRACK","url":"http://www.securitytracker.com/id/1034884"},{"name":"HPSBMU03356","refsource":"HP","url":"http://marc.info/?l=bugtraq&m=143506486712441&w=2"},{"name":"GLSA-201603-11","refsource":"GENTOO","url":"https://security.gentoo.org/glsa/201603-11"},{"name":"1033064","refsource":"SECTRACK","url":"http://www.securitytracker.com/id/1033064"},{"name":"SUSE-SU-2015:1181","refsource":"SUSE","url":"http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00003.html"},{"name":"1032778","refsource":"SECTRACK","url":"http://www.securitytracker.com/id/1032778"},{"name":"1032474","refsource":"SECTRACK","url":"http://www.securitytracker.com/id/1032474"},{"name":"SSRT102254","refsource":"HP","url":"http://marc.info/?l=bugtraq&m=144493176821532&w=2"},{"name":"HPSBGN03407","refsource":"HP","url":"http://marc.info/?l=bugtraq&m=144102017024820&w=2"},{"name":"openSUSE-SU-2015:1209","refsource":"SUSE","url":"http://lists.opensuse.org/opensuse-updates/2015-07/msg00016.html"},{"name":"1032784","refsource":"SECTRACK","url":"http://www.securitytracker.com/id/1032784"},{"name":"1032777","refsource":"SECTRACK","url":"http://www.securitytracker.com/id/1032777"},{"name":"1033416","refsource":"SECTRACK","url":"http://www.securitytracker.com/id/1033416"},{"name":"1033991","refsource":"SECTRACK","url":"http://www.securitytracker.com/id/1033991"},{"name":"1032647","refsource":"SECTRACK","url":"http://www.securitytracker.com/id/1032647"},{"name":"1032654","refsource":"SECTRACK","url":"http://www.securitytracker.com/id/1032654"},{"name":"1033341","refsource":"SECTRACK","url":"http://www.securitytracker.com/id/1033341"},{"name":"RHSA-2015:1486","refsource":"REDHAT","url":"http://rhn.redhat.com/errata/RHSA-2015-1486.html"},{"name":"SUSE-SU-2015:1663","refsource":"SUSE","url":"http://lists.opensuse.org/opensuse-security-announce/2015-10/msg00001.html"},{"name":"1033433","refsource":"SECTRACK","url":"http://www.securitytracker.com/id/1033433"},{"name":"USN-2696-1","refsource":"UBUNTU","url":"http://www.ubuntu.com/usn/USN-2696-1"},{"name":"APPLE-SA-2015-06-30-1","refsource":"APPLE","url":"http://lists.apple.com/archives/security-announce/2015/Jun/msg00001.html"},{"name":"1032702","refsource":"SECTRACK","url":"http://www.securitytracker.com/id/1032702"},{"name":"DSA-3339","refsource":"DEBIAN","url":"http://www.debian.org/security/2015/dsa-3339"},{"name":"1032727","refsource":"SECTRACK","url":"http://www.securitytracker.com/id/1032727"},{"name":"RHSA-2015:1242","refsource":"REDHAT","url":"http://rhn.redhat.com/errata/RHSA-2015-1242.html"},{"name":"SUSE-SU-2015:1269","refsource":"SUSE","url":"http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00034.html"},{"name":"GLSA-201506-02","refsource":"GENTOO","url":"https://security.gentoo.org/glsa/201506-02"},{"name":"91787","refsource":"BID","url":"http://www.securityfocus.com/bid/91787"},{"name":"RHSA-2016:1624","refsource":"REDHAT","url":"http://rhn.redhat.com/errata/RHSA-2016-1624.html"},{"name":"openSUSE-SU-2015:1266","refsource":"SUSE","url":"http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00031.html"},{"name":"RHSA-2015:1488","refsource":"REDHAT","url":"http://rhn.redhat.com/errata/RHSA-2015-1488.html"},{"name":"SUSE-SU-2015:1319","refsource":"SUSE","url":"http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00046.html"},{"name":"SUSE-SU-2015:1320","refsource":"SUSE","url":"http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00047.html"},{"name":"1033430","refsource":"SECTRACK","url":"http://www.securitytracker.com/id/1033430"},{"name":"openSUSE-SU-2015:1288","refsource":"SUSE","url":"http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00039.html"},{"name":"RHSA-2015:1241","refsource":"REDHAT","url":"http://rhn.redhat.com/errata/RHSA-2015-1241.html"},{"name":"openSUSE-SU-2016:0478","refsource":"SUSE","url":"http://lists.opensuse.org/opensuse-updates/2016-02/msg00094.html"},{"name":"SUSE-SU-2015:1581","refsource":"SUSE","url":"http://lists.opensuse.org/opensuse-security-announce/2015-09/msg00017.html"},{"name":"HPSBUX03388","refsource":"HP","url":"http://marc.info/?l=bugtraq&m=143880121627664&w=2"},{"name":"RHSA-2015:1230","refsource":"REDHAT","url":"http://rhn.redhat.com/errata/RHSA-2015-1230.html"},{"name":"74733","refsource":"BID","url":"http://www.securityfocus.com/bid/74733"},{"name":"openSUSE-SU-2016:0261","refsource":"SUSE","url":"http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00039.html"},{"name":"1032651","refsource":"SECTRACK","url":"http://www.securitytracker.com/id/1032651"},{"name":"1033065","refsource":"SECTRACK","url":"http://www.securitytracker.com/id/1033065"},{"name":"USN-2656-1","refsource":"UBUNTU","url":"http://www.ubuntu.com/usn/USN-2656-1"},{"name":"SUSE-SU-2015:1185","refsource":"SUSE","url":"http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00007.html"},{"name":"1033222","refsource":"SECTRACK","url":"http://www.securitytracker.com/id/1033222"},{"name":"1036218","refsource":"SECTRACK","url":"http://www.securitytracker.com/id/1036218"},{"name":"SUSE-SU-2015:1449","refsource":"SUSE","url":"http://lists.opensuse.org/opensuse-security-announce/2015-08/msg00021.html"},{"name":"HPSBGN03373","refsource":"HP","url":"http://marc.info/?l=bugtraq&m=143655800220052&w=2"},{"name":"1040630","refsource":"SECTRACK","url":"http://www.securitytracker.com/id/1040630"},{"name":"openSUSE-SU-2015:1139","refsource":"SUSE","url":"http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00023.html"},{"name":"1034087","refsource":"SECTRACK","url":"http://www.securitytracker.com/id/1034087"},{"name":"1033513","refsource":"SECTRACK","url":"http://www.securitytracker.com/id/1033513"},{"name":"1032884","refsource":"SECTRACK","url":"http://www.securitytracker.com/id/1032884"},{"name":"RHSA-2015:1604","refsource":"REDHAT","url":"http://rhn.redhat.com/errata/RHSA-2015-1604.html"},{"name":"SUSE-SU-2016:0262","refsource":"SUSE","url":"http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00040.html"},{"name":"1032932","refsource":"SECTRACK","url":"http://www.securitytracker.com/id/1032932"},{"name":"1033891","refsource":"SECTRACK","url":"http://www.securitytracker.com/id/1033891"},{"name":"openSUSE-SU-2016:0226","refsource":"SUSE","url":"http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00032.html"},{"name":"1032783","refsource":"SECTRACK","url":"http://www.securitytracker.com/id/1032783"},{"name":"1032856","refsource":"SECTRACK","url":"http://www.securitytracker.com/id/1032856"},{"name":"NetBSD-SA2015-008","refsource":"NETBSD","url":"http://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2015-008.txt.asc"},{"name":"DSA-3300","refsource":"DEBIAN","url":"http://www.debian.org/security/2015/dsa-3300"},{"name":"USN-2656-2","refsource":"UBUNTU","url":"http://www.ubuntu.com/usn/USN-2656-2"},{"name":"1033067","refsource":"SECTRACK","url":"http://www.securitytracker.com/id/1033067"},{"name":"1033019","refsource":"SECTRACK","url":"http://www.securitytracker.com/id/1033019"},{"name":"RHSA-2015:1072","refsource":"REDHAT","url":"http://rhn.redhat.com/errata/RHSA-2015-1072.html"},{"name":"1032650","refsource":"SECTRACK","url":"http://www.securitytracker.com/id/1032650"},{"name":"http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html","refsource":"CONFIRM","url":"http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html"},{"url":"https://www.oracle.com/security-alerts/cpujan2021.html","refsource":"MISC","name":"https://www.oracle.com/security-alerts/cpujan2021.html"},{"name":"http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10681","refsource":"CONFIRM","url":"http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10681"},{"name":"http://www-01.ibm.com/support/docview.wss?uid=swg21962739","refsource":"CONFIRM","url":"http://www-01.ibm.com/support/docview.wss?uid=swg21962739"},{"name":"https://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5098403","refsource":"CONFIRM","url":"https://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5098403"},{"name":"https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04923929","refsource":"CONFIRM","url":"https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04923929"},{"name":"http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html","refsource":"CONFIRM","url":"http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html"},{"name":"https://kc.mcafee.com/corporate/index?page=content&id=SB10122","refsource":"CONFIRM","url":"https://kc.mcafee.com/corporate/index?page=content&id=SB10122"},{"name":"http://support.apple.com/kb/HT204941","refsource":"CONFIRM","url":"http://support.apple.com/kb/HT204941"},{"name":"http://www-304.ibm.com/support/docview.wss?uid=swg21962816","refsource":"CONFIRM","url":"http://www-304.ibm.com/support/docview.wss?uid=swg21962816"},{"name":"http://www-01.ibm.com/support/docview.wss?uid=swg21959812","refsource":"CONFIRM","url":"http://www-01.ibm.com/support/docview.wss?uid=swg21959812"},{"name":"https://www-304.ibm.com/support/docview.wss?uid=swg21959745","refsource":"CONFIRM","url":"https://www-304.ibm.com/support/docview.wss?uid=swg21959745"},{"name":"https://weakdh.org/imperfect-forward-secrecy.pdf","refsource":"MISC","url":"https://weakdh.org/imperfect-forward-secrecy.pdf"},{"name":"http://www-304.ibm.com/support/docview.wss?uid=swg21959132","refsource":"CONFIRM","url":"http://www-304.ibm.com/support/docview.wss?uid=swg21959132"},{"name":"https://blog.cloudflare.com/logjam-the-latest-tls-vulnerability-explained/","refsource":"MISC","url":"https://blog.cloudflare.com/logjam-the-latest-tls-vulnerability-explained/"},{"name":"http://www-01.ibm.com/support/docview.wss?uid=swg21959539","refsource":"CONFIRM","url":"http://www-01.ibm.com/support/docview.wss?uid=swg21959539"},{"name":"https://www.openssl.org/blog/blog/2015/05/20/logjam-freak-upcoming-changes/","refsource":"CONFIRM","url":"https://www.openssl.org/blog/blog/2015/05/20/logjam-freak-upcoming-changes/"},{"name":"http://www-01.ibm.com/support/docview.wss?uid=swg21959325","refsource":"CONFIRM","url":"http://www-01.ibm.com/support/docview.wss?uid=swg21959325"},{"name":"https://openssl.org/news/secadv/20150611.txt","refsource":"CONFIRM","url":"https://openssl.org/news/secadv/20150611.txt"},{"name":"https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04740527","refsource":"CONFIRM","url":"https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04740527"},{"name":"http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html","refsource":"CONFIRM","url":"http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html"},{"name":"http://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c04949778","refsource":"CONFIRM","url":"http://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c04949778"},{"name":"https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03831en_us","refsource":"CONFIRM","url":"https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03831en_us"},{"name":"https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04772190","refsource":"CONFIRM","url":"https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04772190"},{"name":"http://www-304.ibm.com/support/docview.wss?uid=swg21967893","refsource":"CONFIRM","url":"http://www-304.ibm.com/support/docview.wss?uid=swg21967893"},{"name":"http://www-304.ibm.com/support/docview.wss?uid=swg21958984","refsource":"CONFIRM","url":"http://www-304.ibm.com/support/docview.wss?uid=swg21958984"},{"name":"http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html","refsource":"CONFIRM","url":"http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html"},{"name":"http://www-01.ibm.com/support/docview.wss?uid=swg21959517","refsource":"CONFIRM","url":"http://www-01.ibm.com/support/docview.wss?uid=swg21959517"},{"name":"http://www.oracle.com/technetwork/topics/security/bulletinjul2015-2511963.html","refsource":"CONFIRM","url":"http://www.oracle.com/technetwork/topics/security/bulletinjul2015-2511963.html"},{"name":"http://www-01.ibm.com/support/docview.wss?uid=swg21959195","refsource":"CONFIRM","url":"http://www-01.ibm.com/support/docview.wss?uid=swg21959195"},{"name":"http://www-01.ibm.com/support/docview.wss?uid=swg21961717","refsource":"CONFIRM","url":"http://www-01.ibm.com/support/docview.wss?uid=swg21961717"},{"name":"http://www-304.ibm.com/support/docview.wss?uid=swg21960041","refsource":"CONFIRM","url":"http://www-304.ibm.com/support/docview.wss?uid=swg21960041"},{"name":"http://www-304.ibm.com/support/docview.wss?uid=swg21960194","refsource":"CONFIRM","url":"http://www-304.ibm.com/support/docview.wss?uid=swg21960194"},{"name":"https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.19.1_release_notes","refsource":"CONFIRM","url":"https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.19.1_release_notes"},{"name":"http://www-01.ibm.com/support/docview.wss?uid=swg21959453","refsource":"CONFIRM","url":"http://www-01.ibm.com/support/docview.wss?uid=swg21959453"},{"name":"https://security.netapp.com/advisory/ntap-20150619-0001/","refsource":"CONFIRM","url":"https://security.netapp.com/advisory/ntap-20150619-0001/"},{"name":"http://www-01.ibm.com/support/docview.wss?uid=swg21959111","refsource":"CONFIRM","url":"http://www-01.ibm.com/support/docview.wss?uid=swg21959111"},{"name":"http://www-304.ibm.com/support/docview.wss?uid=swg21960418","refsource":"CONFIRM","url":"http://www-304.ibm.com/support/docview.wss?uid=swg21960418"},{"name":"https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04832246","refsource":"CONFIRM","url":"https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04832246"},{"name":"https://www.suse.com/security/cve/CVE-2015-4000.html","refsource":"CONFIRM","url":"https://www.suse.com/security/cve/CVE-2015-4000.html"},{"name":"https://help.ecostruxureit.com/display/public/UADCO8x/StruxureWare+Data+Center+Operation+Software+Vulnerability+Fixes","refsource":"CONFIRM","url":"https://help.ecostruxureit.com/display/public/UADCO8x/StruxureWare+Data+Center+Operation+Software+Vulnerability+Fixes"},{"name":"https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04953655","refsource":"CONFIRM","url":"https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04953655"},{"name":"https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05128722","refsource":"CONFIRM","url":"https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05128722"},{"name":"http://support.citrix.com/article/CTX201114","refsource":"CONFIRM","url":"http://support.citrix.com/article/CTX201114"},{"name":"http://fortiguard.com/advisory/2015-07-09-cve-2015-1793-openssl-alternative-chains-certificate-forgery","refsource":"CONFIRM","url":"http://fortiguard.com/advisory/2015-07-09-cve-2015-1793-openssl-alternative-chains-certificate-forgery"},{"name":"http://www-304.ibm.com/support/docview.wss?uid=swg21960380","refsource":"CONFIRM","url":"http://www-304.ibm.com/support/docview.wss?uid=swg21960380"},{"name":"http://support.apple.com/kb/HT204942","refsource":"CONFIRM","url":"http://support.apple.com/kb/HT204942"},{"name":"http://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c04876402","refsource":"CONFIRM","url":"http://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c04876402"},{"name":"https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05193083","refsource":"CONFIRM","url":"https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05193083"},{"name":"http://aix.software.ibm.com/aix/efixes/security/sendmail_advisory2.asc","refsource":"CONFIRM","url":"http://aix.software.ibm.com/aix/efixes/security/sendmail_advisory2.asc"},{"name":"http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10727","refsource":"CONFIRM","url":"http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10727"},{"name":"https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04773241","refsource":"CONFIRM","url":"https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04773241"},{"name":"http://www-01.ibm.com/support/docview.wss?uid=swg21959530","refsource":"CONFIRM","url":"http://www-01.ibm.com/support/docview.wss?uid=swg21959530"},{"name":"http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html","refsource":"CONFIRM","url":"http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html"},{"name":"http://www-01.ibm.com/support/docview.wss?uid=swg21960191","refsource":"CONFIRM","url":"http://www-01.ibm.com/support/docview.wss?uid=swg21960191"},{"name":"http://www-01.ibm.com/support/docview.wss?uid=swg21959636","refsource":"CONFIRM","url":"http://www-01.ibm.com/support/docview.wss?uid=swg21959636"},{"name":"https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04918839","refsource":"CONFIRM","url":"https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04918839"},{"name":"http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html","refsource":"CONFIRM","url":"http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html"},{"name":"https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04770140","refsource":"CONFIRM","url":"https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04770140"},{"name":"https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05045763","refsource":"CONFIRM","url":"https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05045763"},{"name":"https://puppet.com/security/cve/CVE-2015-4000","refsource":"CONFIRM","url":"https://puppet.com/security/cve/CVE-2015-4000"},{"name":"http://www.mozilla.org/security/announce/2015/mfsa2015-70.html","refsource":"CONFIRM","url":"http://www.mozilla.org/security/announce/2015/mfsa2015-70.html"},{"name":"http://www.solarwinds.com/documentation/storage/storagemanager/docs/ReleaseNotes/releaseNotes.htm","refsource":"CONFIRM","url":"http://www.solarwinds.com/documentation/storage/storagemanager/docs/ReleaseNotes/releaseNotes.htm"},{"name":"https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04926789","refsource":"CONFIRM","url":"https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04926789"},{"name":"https://support.citrix.com/article/CTX216642","refsource":"CONFIRM","url":"https://support.citrix.com/article/CTX216642"},{"name":"https://weakdh.org/","refsource":"MISC","url":"https://weakdh.org/"},{"name":"https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04773119","refsource":"CONFIRM","url":"https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04773119"},{"name":"http://www-01.ibm.com/support/docview.wss?uid=swg21959481","refsource":"CONFIRM","url":"http://www-01.ibm.com/support/docview.wss?uid=swg21959481"},{"name":"https://bto.bluecoat.com/security-advisory/sa98","refsource":"CONFIRM","url":"https://bto.bluecoat.com/security-advisory/sa98"},{"name":"https://bugzilla.mozilla.org/show_bug.cgi?id=1138554","refsource":"CONFIRM","url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1138554"},{"name":"http://www-01.ibm.com/support/docview.wss?uid=swg21962455","refsource":"CONFIRM","url":"http://www-01.ibm.com/support/docview.wss?uid=swg21962455"},{"name":"https://www.openssl.org/news/secadv_20150611.txt","refsource":"CONFIRM","url":"https://www.openssl.org/news/secadv_20150611.txt"},{"name":"http://www.fortiguard.com/advisory/2015-05-20-logjam-attack","refsource":"CONFIRM","url":"http://www.fortiguard.com/advisory/2015-05-20-logjam-attack"},{"refsource":"CONFIRM","name":"https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf","url":"https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf"}]}},"nvd":{"publishedDate":"2015-05-21 00:59:00","lastModifiedDate":"2023-02-09 16:15:00","problem_types":["CWE-310"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.0","vectorString":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N","attackVector":"NETWORK","attackComplexity":"HIGH","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"LOW","availabilityImpact":"NONE","baseScore":3.7,"baseSeverity":"LOW"},"exploitabilityScore":2.2,"impactScore":1.4},"baseMetricV2":{"cvssV2":{"version":"2.0","vectorString":"AV:N/AC:M/Au:N/C:N/I:P/A:N","accessVector":"NETWORK","accessComplexity":"MEDIUM","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"PARTIAL","availabilityImpact":"NONE","baseScore":4.3},"severity":"MEDIUM","exploitabilityScore":8.6,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:openssl:openssl:*:*:*:*:*:*:*:*","versionStartIncluding":"1.0.1","versionEndIncluding":"1.0.1m","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:openssl:openssl:*:*:*:*:*:*:*:*","versionStartIncluding":"1.0.2","versionEndIncluding":"1.0.2a","cpe_name":[]}]},{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:canonical:ubuntu_linux:14.10:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*","cpe_name":[]}]},{"operator":"AND","children":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:openssl:openssl:*:*:*:*:*:*:*:*","versionEndIncluding":"1.0.1m","cpe_name":[]}]},{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:hp:hp-ux:b.11.31:*:*:*:*:*:*:*","cpe_name":[]}]}],"cpe_match":[]},{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:ibm:content_manager:8.5:*:*:*:*:enterprise:*:*","cpe_name":[]}]},{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:oracle:jrockit:r28.3.6:*:*:*:*:*:*:*","cpe_name":[]}]},{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*","cpe_name":[]}]},{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:oracle:jdk:1.8.0:update_33:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:oracle:jre:1.7.0:update_75:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:oracle:jre:1.6.0:update_95:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:oracle:jre:1.8.0:update_45:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:oracle:jre:1.8.0:update_33:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:oracle:jre:1.7.0:update_80:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:oracle:jdk:1.8.0:update45:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:oracle:jdk:1.7.0:update75:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:oracle:jdk:1.6.0:update95:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:oracle:jdk:1.7.0:update80:*:*:*:*:*:*","cpe_name":[]}]},{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:suse:linux_enterprise_server:11.0:sp4:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:suse:linux_enterprise_software_development_kit:12:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:suse:linux_enterprise_desktop:12:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:suse:suse_linux_enterprise_server:12:*:*:*:*:*:*:*","cpe_name":[]}]},{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*","versionEndIncluding":"10.10.3","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*","versionEndIncluding":"8.3","cpe_name":[]}]},{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:mozilla:network_security_services:3.19:*:*:*:*:*:*:*","cpe_name":[]}]},{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:oracle:sparc-opl_service_processor:*:*:*:*:*:*:*:*","versionEndIncluding":"1121","cpe_name":[]}]},{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:opera:opera_browser:-:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:microsoft:internet_explorer:-:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:google:chrome:-:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:mozilla:firefox:-:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:apple:safari:-:*:*:*:*:*:*:*","cpe_name":[]}]},{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:mozilla:firefox_esr:38.1.0:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:mozilla:seamonkey:2.35:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:mozilla:thunderbird:38.1:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:mozilla:thunderbird:31.8:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:mozilla:firefox_os:2.2:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:mozilla:firefox:39.0:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:mozilla:firefox_esr:31.8:*:*:*:*:*:*:*","cpe_name":[]}]}]}},"legacy_mitre":{"record":{"CveYear":"2015","CveId":"4000","Ordinal":"80955","Title":"CVE-2015-4000","CVE":"CVE-2015-4000","Year":"2015"},"notes":[{"CveYear":"2015","CveId":"4000","Ordinal":"1","NoteData":"The TLS protocol 1.2 and earlier, when a DHE_EXPORT ciphersuite is enabled on a server but not on a client, does not properly convey a DHE_EXPORT choice, which allows man-in-the-middle attackers to conduct cipher-downgrade attacks by rewriting a ClientHello with DHE replaced by DHE_EXPORT and then rewriting a ServerHello with DHE_EXPORT replaced by DHE, aka the \"Logjam\" issue.","Type":"Description","Title":null},{"CveYear":"2015","CveId":"4000","Ordinal":"2","NoteData":"2015-05-20","Type":"Other","Title":"Published"},{"CveYear":"2015","CveId":"4000","Ordinal":"3","NoteData":"2021-01-20","Type":"Other","Title":"Modified"}]}}}