cvelist/2016/0xxx/CVE-2016-0800.json

358 lines
15 KiB
JSON
Raw Normal View History

2017-10-16 12:31:07 -04:00
{
2018-01-17 21:02:46 -05:00
"CVE_data_meta" : {
2018-08-24 15:03:26 -04:00
"ASSIGNER" : "secalert@redhat.com",
2018-01-17 21:02:46 -05:00
"ID" : "CVE-2016-0800",
"STATE" : "PUBLIC"
},
"affects" : {
"vendor" : {
"vendor_data" : [
{
"product" : {
"product_data" : [
{
"product_name" : "n/a",
"version" : {
"version_data" : [
{
"version_value" : "n/a"
}
]
}
}
]
},
"vendor_name" : "n/a"
Submitter: Bill Situ <Bill.Situ@oracle.com> On branch cna/oracle/jan2018cpu Changes to be committed: modified: 2013/2xxx/CVE-2013-2566.json modified: 2014/0xxx/CVE-2014-0114.json modified: 2014/7xxx/CVE-2014-7817.json modified: 2014/9xxx/CVE-2014-9402.json modified: 2015/0xxx/CVE-2015-0293.json modified: 2015/1xxx/CVE-2015-1472.json modified: 2015/2xxx/CVE-2015-2808.json modified: 2015/3xxx/CVE-2015-3195.json modified: 2015/3xxx/CVE-2015-3253.json modified: 2015/4xxx/CVE-2015-4852.json modified: 2015/7xxx/CVE-2015-7501.json modified: 2015/7xxx/CVE-2015-7547.json modified: 2015/7xxx/CVE-2015-7940.json modified: 2016/0xxx/CVE-2016-0635.json modified: 2016/0xxx/CVE-2016-0703.json modified: 2016/0xxx/CVE-2016-0704.json modified: 2016/0xxx/CVE-2016-0800.json modified: 2016/1xxx/CVE-2016-1181.json modified: 2016/1xxx/CVE-2016-1182.json modified: 2016/2xxx/CVE-2016-2105.json modified: 2016/2xxx/CVE-2016-2106.json modified: 2016/2xxx/CVE-2016-2107.json modified: 2016/2xxx/CVE-2016-2109.json modified: 2016/2xxx/CVE-2016-2177.json modified: 2016/2xxx/CVE-2016-2178.json modified: 2016/2xxx/CVE-2016-2179.json modified: 2016/2xxx/CVE-2016-2180.json modified: 2016/2xxx/CVE-2016-2181.json modified: 2016/2xxx/CVE-2016-2182.json modified: 2016/2xxx/CVE-2016-2183.json modified: 2016/2xxx/CVE-2016-2518.json modified: 2016/2xxx/CVE-2016-2550.json modified: 2016/4xxx/CVE-2016-4449.json modified: 2016/5xxx/CVE-2016-5385.json modified: 2016/5xxx/CVE-2016-5387.json modified: 2016/6xxx/CVE-2016-6302.json modified: 2016/6xxx/CVE-2016-6303.json modified: 2016/6xxx/CVE-2016-6304.json modified: 2016/6xxx/CVE-2016-6305.json modified: 2016/6xxx/CVE-2016-6306.json modified: 2016/6xxx/CVE-2016-6307.json modified: 2016/6xxx/CVE-2016-6308.json modified: 2016/6xxx/CVE-2016-6309.json modified: 2016/7xxx/CVE-2016-7052.json modified: 2016/7xxx/CVE-2016-7055.json modified: 2016/7xxx/CVE-2016-7977.json modified: 2016/8xxx/CVE-2016-8735.json modified: 2016/9xxx/CVE-2016-9878.json modified: 2017/0xxx/CVE-2017-0781.json modified: 2017/0xxx/CVE-2017-0782.json modified: 2017/0xxx/CVE-2017-0783.json modified: 2017/0xxx/CVE-2017-0785.json modified: 2017/10xxx/CVE-2017-10068.json modified: 2017/10xxx/CVE-2017-10262.json modified: 2017/10xxx/CVE-2017-10273.json modified: 2017/10xxx/CVE-2017-10282.json modified: 2017/10xxx/CVE-2017-10301.json modified: 2017/10xxx/CVE-2017-10352.json modified: 2017/12xxx/CVE-2017-12617.json modified: 2017/13xxx/CVE-2017-13077.json modified: 2017/13xxx/CVE-2017-13078.json modified: 2017/13xxx/CVE-2017-13079.json modified: 2017/13xxx/CVE-2017-13080.json modified: 2017/13xxx/CVE-2017-13081.json modified: 2017/13xxx/CVE-2017-13082.json modified: 2017/3xxx/CVE-2017-3730.json modified: 2017/3xxx/CVE-2017-3731.json modified: 2017/3xxx/CVE-2017-3732.json modified: 2017/3xxx/CVE-2017-3733.json modified: 2017/3xxx/CVE-2017-3735.json modified: 2017/3xxx/CVE-2017-3736.json modified: 2017/3xxx/CVE-2017-3737.json modified: 2017/3xxx/CVE-2017-3738.json modified: 2017/5xxx/CVE-2017-5461.json modified: 2017/5xxx/CVE-2017-5645.json modified: 2017/5xxx/CVE-2017-5664.json modified: 2017/5xxx/CVE-2017-5715.json modified: 2017/9xxx/CVE-2017-9072.json modified: 2017/9xxx/CVE-2017-9798.json modified: 2018/2xxx/CVE-2018-2560.json modified: 2018/2xxx/CVE-2018-2561.json modified: 2018/2xxx/CVE-2018-2562.json modified: 2018/2xxx/CVE-2018-2564.json modified: 2018/2xxx/CVE-2018-2565.json modified: 2018/2xxx/CVE-2018-2566.json modified: 2018/2xxx/CVE-2018-2567.json modified: 2018/2xxx/CVE-2018-2568.json modified: 2018/2xxx/CVE-2018-2569.json modified: 2018/2xxx/CVE-2018-2570.json modified: 2018/2xxx/CVE-2018-2571.json modified: 2018/2xxx/CVE-2018-2573.json modified: 2018/2xxx/CVE-2018-2574.json modified: 2018/2xxx/CVE-2018-2575.json modified: 2018/2xxx/CVE-2018-2576.json modified: 2018/2xxx/CVE-2018-2577.json modified: 2018/2xxx/CVE-2018-2578.json modified: 2018/2xxx/CVE-2018-2579.json modified: 2018/2xxx/CVE-2018-2580.json modified: 2018/2xxx/CVE-2018-2581.json modified: 2018/2xxx/CVE-2018-2582.json modified: 2018/2xxx/CVE-2018-2583.json modified: 2018/2xxx/CVE-2018-2584.json modified: 2018/2xxx/CVE-2018-2585.json modified: 2018/2xxx/CVE-2018-2586.json modified: 2018/2xxx/CVE-2018-2588.json modified: 2018/2xxx/CVE-2018-2589.json modified: 2018/2xxx/CVE-2018-2590.json modified: 2018/2xxx/CVE-2018-2591.json modified: 2018/2xxx/CVE-2018-2592.json modified: 2018/2xxx/CVE-2018-2593.json modified: 2018/2xxx/CVE-2018-2594.json modified: 2018/2xxx/CVE-2018-2595.json modified: 2018/2xxx/CVE-2018-2596.json modified: 2018/2xxx/CVE-2018-2597.json modified: 2018/2xxx/CVE-2018-2599.json modified: 2018/2xxx/CVE-2018-2600.json modified: 2018/2xxx/CVE-2018-2601.json modified: 2018/2xxx/CVE-2018-2602.json modified: 2018/2xxx/CVE-2018-2603.json modified: 2018/2xxx/CVE-2018-2604.json modified: 2018/2xxx/CVE-2018-2605.json modified: 2018/2xxx/CVE-2018-2606.json modified: 2018/2xxx/CVE-2018-2607.json modified: 2018/2xxx/CVE-2018-2608.json modified: 2018/2xxx/CVE-2018-2609.json modified: 2018/2xxx/CVE-2018-2610.json modified: 2018/2xxx/CVE-2018-2611.json modified: 2018/2xxx/CVE-2018-2612.json modified: 2018/2xxx/CVE-2018-2613.json modified: 2018/2xxx/CVE-2018-2614.json modified: 2018/2xxx/CVE-2018-2615.json modified: 2018/2xxx/CVE-2018-2616.json modified: 2018/2xxx/CVE-2018-2617.json modified: 2018/2xxx/CVE-2018-2618.json modified: 2018/2xxx/CVE-2018-2619.json modified: 2018/2xxx/CVE-2018-2620.json modified: 2018/2xxx/CVE-2018-2621.json modified: 2018/2xxx/CVE-2018-2622.json modified: 2018/2xxx/CVE-2018-2623.json modified: 2018/2xxx/CVE-2018-2624.json modified: 2018/2xxx/CVE-2018-2625.json modified: 2018/2xxx/CVE-2018-2626.json modified: 2018/2xxx/CVE-2018-2627.json modified: 2018/2xxx/CVE-2018-2629.json modified: 2018/2xxx/CVE-2018-2630.json modified: 2018/2xxx/CVE-2018-2631.json modified: 2018/2xxx/CVE-2018-2632.json modified: 2018/2xxx/CVE-2018-2633.json modified: 2018/2xxx/CVE-2018-2634.json modified: 2018/2xxx/CVE-2018-2635.json modified: 2018/2xxx/CVE-2018-2636.json modified: 2018/2xxx/CVE-2018-2637.json modified: 2018/2xxx/CVE-2018-2638.json modified: 2018/2xxx/CVE-2018-2639.json modified: 2018/2xxx/CVE-2018-2640.json modified: 2018/2xxx/CVE-2018-2641.json modified: 2018/2xxx/CVE-2018-2642.json modified: 2018/2xxx/CVE-2018-2643.json modified: 2018/2xxx/CVE-2018-2644.json modified: 2018/2xxx/CVE-2018-2645.json modified: 2018/2xxx/CVE-2018-2646.json modified: 2018/2xxx/CVE-2018-2647.json modified: 2018/2xxx/CVE-2018-2648.json modified: 2018/2xxx/CVE-2018-2649.json modified: 2018/2xxx/CVE-2018-2650.json modified: 2018/2xxx/CVE-2018-2651.json modified: 2018/2xxx/CVE-2018-2652.json modified: 2018/2xxx/CVE-2018-2653.json modified: 2018/2xxx/CVE-2018-2654.json modified: 2018/2xxx/CVE-2018-2655.json modified: 2018/2xxx/CVE-2018-2656.json modified: 2018/2xxx/CVE-2018-2657.json modified: 2018/2xxx/CVE-2018-2658.json modified: 2018/2xxx/CVE-2018-2659.json modified: 2018/2xxx/CVE-2018-2660.json modified: 2018/2xxx/CVE-2018-2661.json modified: 2018/2xxx/CVE-2018-2662.json modified: 2018/2xxx/CVE-2018-2663.json modified: 2018/2xxx/CVE-2018-2664.json modified: 2018/2xxx/CVE-2018-2665.json modified: 2018/2xxx/CVE-2018-2666.json modified: 2018/2xxx/CVE-2018-2667.json modified: 2018/2xxx/CVE-2018-2668.json modified: 2018/2xxx/CVE-2018-2669.json modified: 2018/2xxx/CVE-2018-2670.json modified: 2018/2xxx/CVE-2018-2671.json modified: 2018/2xxx/CVE-2018-2672.json modified: 2018/2xxx/CVE-2018-2673.json modified: 2018/2xxx/CVE-2018-2674.json modified: 2018/2xxx/CVE-2018-2675.json modified: 2018/2xxx/CVE-2018-2676.json modified: 2018/2xxx/CVE-2018-2677.json modified: 2018/2xxx/CVE-2018-2678.json modified: 2018/2xxx/CVE-2018-2679.json modified: 2018/2xxx/CVE-2018-2680.json modified: 2018/2xxx/CVE-2018-2681.json modified: 2018/2xxx/CVE-2018-2682.json modified: 2018/2xxx/CVE-2018-2683.json modified: 2018/2xxx/CVE-2018-2684.json modified: 2018/2xxx/CVE-2018-2685.json modified: 2018/2xxx/CVE-2018-2686.json modified: 2018/2xxx/CVE-2018-2687.json modified: 2018/2xxx/CVE-2018-2688.json modified: 2018/2xxx/CVE-2018-2689.json modified: 2018/2xxx/CVE-2018-2690.json modified: 2018/2xxx/CVE-2018-2691.json modified: 2018/2xxx/CVE-2018-2692.json modified: 2018/2xxx/CVE-2018-2693.json modified: 2018/2xxx/CVE-2018-2694.json modified: 2018/2xxx/CVE-2018-2695.json modified: 2018/2xxx/CVE-2018-2696.json modified: 2018/2xxx/CVE-2018-2697.json modified: 2018/2xxx/CVE-2018-2698.json modified: 2018/2xxx/CVE-2018-2699.json modified: 2018/2xxx/CVE-2018-2700.json modified: 2018/2xxx/CVE-2018-2701.json modified: 2018/2xxx/CVE-2018-2702.json modified: 2018/2xxx/CVE-2018-2703.json modified: 2018/2xxx/CVE-2018-2704.json modified: 2018/2xxx/CVE-2018-2705.json modified: 2018/2xxx/CVE-2018-2706.json modified: 2018/2xxx/CVE-2018-2707.json modified: 2018/2xxx/CVE-2018-2708.json modified: 2018/2xxx/CVE-2018-2709.json modified: 2018/2xxx/CVE-2018-2710.json modified: 2018/2xxx/CVE-2018-2711.json modified: 2018/2xxx/CVE-2018-2712.json modified: 2018/2xxx/CVE-2018-2713.json modified: 2018/2xxx/CVE-2018-2714.json modified: 2018/2xxx/CVE-2018-2715.json modified: 2018/2xxx/CVE-2018-2716.json modified: 2018/2xxx/CVE-2018-2717.json modified: 2018/2xxx/CVE-2018-2719.json modified: 2018/2xxx/CVE-2018-2720.json modified: 2018/2xxx/CVE-2018-2721.json modified: 2018/2xxx/CVE-2018-2722.json modified: 2018/2xxx/CVE-2018-2723.json modified: 2018/2xxx/CVE-2018-2724.json modified: 2018/2xxx/CVE-2018-2725.json modified: 2018/2xxx/CVE-2018-2726.json modified: 2018/2xxx/CVE-2018-2727.json modified: 2018/2xxx/CVE-2018-2728.json modified: 2018/2xxx/CVE-2018-2729.json modified: 2018/2xxx/CVE-2018-2730.json modified: 2018/2xxx/CVE-2018-2731.json modified: 2018/2xxx/CVE-2018-2732.json modified: 2018/2xxx/CVE-2018-2733.json
2018-01-16 15:22:32 -08:00
}
2018-01-17 21:02:46 -05:00
]
}
},
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description" : {
"description_data" : [
{
"lang" : "eng",
"value" : "The SSLv2 protocol, as used in OpenSSL before 1.0.1s and 1.0.2 before 1.0.2g and other products, requires a server to send a ServerVerify message before establishing that a client possesses certain plaintext RSA data, which makes it easier for remote attackers to decrypt TLS ciphertext data by leveraging a Bleichenbacher RSA padding oracle, aka a \"DROWN\" attack."
}
]
},
"problemtype" : {
"problemtype_data" : [
{
"description" : [
{
"lang" : "eng",
"value" : "n/a"
}
]
}
]
},
"references" : {
"reference_data" : [
{
"name" : "https://drownattack.com",
"refsource" : "MISC",
2018-01-17 21:02:46 -05:00
"url" : "https://drownattack.com"
},
{
"name" : "https://ics-cert.us-cert.gov/advisories/ICSA-16-103-03",
"refsource" : "MISC",
2018-01-17 21:02:46 -05:00
"url" : "https://ics-cert.us-cert.gov/advisories/ICSA-16-103-03"
},
{
"name" : "https://access.redhat.com/security/vulnerabilities/drown",
"refsource" : "CONFIRM",
2018-01-17 21:02:46 -05:00
"url" : "https://access.redhat.com/security/vulnerabilities/drown"
},
{
"name" : "https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA40168",
"refsource" : "CONFIRM",
2018-01-17 21:02:46 -05:00
"url" : "https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA40168"
},
{
"name" : "http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html",
"refsource" : "CONFIRM",
2018-01-17 21:02:46 -05:00
"url" : "http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html"
},
{
"name" : "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05157667",
"refsource" : "CONFIRM",
2018-01-17 21:02:46 -05:00
"url" : "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05157667"
},
{
"name" : "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05068681",
"refsource" : "CONFIRM",
2018-01-17 21:02:46 -05:00
"url" : "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05068681"
},
{
"name" : "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05150800",
"refsource" : "CONFIRM",
2018-01-17 21:02:46 -05:00
"url" : "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05150800"
},
{
"name" : "http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html",
"refsource" : "CONFIRM",
2018-01-17 21:02:46 -05:00
"url" : "http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html"
},
{
"name" : "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05073516",
"refsource" : "CONFIRM",
2018-01-17 21:02:46 -05:00
"url" : "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05073516"
},
{
"name" : "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05086877",
"refsource" : "CONFIRM",
2018-01-17 21:02:46 -05:00
"url" : "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05086877"
},
{
"name" : "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05096953",
"refsource" : "CONFIRM",
2018-01-17 21:02:46 -05:00
"url" : "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05096953"
},
{
"name" : "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05141441",
"refsource" : "CONFIRM",
2018-01-17 21:02:46 -05:00
"url" : "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05141441"
},
{
"name" : "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05143554",
"refsource" : "CONFIRM",
2018-01-17 21:02:46 -05:00
"url" : "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05143554"
},
{
"name" : "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05176765",
"refsource" : "CONFIRM",
2018-01-17 21:02:46 -05:00
"url" : "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05176765"
},
{
"name" : "http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html",
"refsource" : "CONFIRM",
2018-01-17 21:02:46 -05:00
"url" : "http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html"
},
{
"name" : "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html",
"refsource" : "CONFIRM",
2018-01-17 21:02:46 -05:00
"url" : "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html"
},
{
"name" : "http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html",
"refsource" : "CONFIRM",
2018-01-17 21:02:46 -05:00
"url" : "http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html"
},
{
"name" : "http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html",
"refsource" : "CONFIRM",
2018-01-17 21:02:46 -05:00
"url" : "http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html"
},
{
"name" : "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05307589",
"refsource" : "CONFIRM",
2018-01-17 21:02:46 -05:00
"url" : "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05307589"
},
{
"name" : "http://support.citrix.com/article/CTX208403",
"refsource" : "CONFIRM",
2018-01-17 21:02:46 -05:00
"url" : "http://support.citrix.com/article/CTX208403"
},
{
"name" : "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20160330-01-openssl-en",
"refsource" : "CONFIRM",
2018-01-17 21:02:46 -05:00
"url" : "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20160330-01-openssl-en"
},
{
"name" : "https://kc.mcafee.com/corporate/index?page=content&id=SB10154",
"refsource" : "CONFIRM",
2018-01-17 21:02:46 -05:00
"url" : "https://kc.mcafee.com/corporate/index?page=content&id=SB10154"
},
{
"name" : "http://www.siemens.com/cert/pool/cert/siemens_security_advisory_ssa-623229.pdf",
"refsource" : "CONFIRM",
2018-01-17 21:02:46 -05:00
"url" : "http://www.siemens.com/cert/pool/cert/siemens_security_advisory_ssa-623229.pdf"
},
{
"name" : "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10722",
"refsource" : "CONFIRM",
2018-01-17 21:02:46 -05:00
"url" : "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10722"
},
{
"name" : "https://www.openssl.org/news/secadv/20160301.txt",
"refsource" : "CONFIRM",
2018-01-17 21:02:46 -05:00
"url" : "https://www.openssl.org/news/secadv/20160301.txt"
},
{
"name" : "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10759",
"refsource" : "CONFIRM",
2018-01-17 21:02:46 -05:00
"url" : "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10759"
},
{
"name" : "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05386804",
"refsource" : "CONFIRM",
2018-01-17 21:02:46 -05:00
"url" : "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05386804"
},
{
"name" : "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbgn03726en_us",
"refsource" : "CONFIRM",
2018-01-17 21:02:46 -05:00
"url" : "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbgn03726en_us"
},
{
"name" : "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03741en_us",
"refsource" : "CONFIRM",
2018-01-17 21:02:46 -05:00
"url" : "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03741en_us"
},
{
"name" : "https://security.netapp.com/advisory/ntap-20160301-0001/",
"refsource" : "CONFIRM",
2018-01-17 21:02:46 -05:00
"url" : "https://security.netapp.com/advisory/ntap-20160301-0001/"
},
{
"name" : "http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html",
"refsource" : "CONFIRM",
2018-01-17 21:02:46 -05:00
"url" : "http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html"
},
2018-11-30 16:05:15 -05:00
{
"name" : "https://help.ecostruxureit.com/display/public/UADCO8x/StruxureWare+Data+Center+Operation+Software+Vulnerability+Fixes",
"refsource" : "CONFIRM",
"url" : "https://help.ecostruxureit.com/display/public/UADCO8x/StruxureWare+Data+Center+Operation+Software+Vulnerability+Fixes"
},
2018-01-17 21:02:46 -05:00
{
"name" : "20160302 Multiple Vulnerabilities in OpenSSL Affecting Cisco Products: March 2016",
"refsource" : "CISCO",
2018-01-17 21:02:46 -05:00
"url" : "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160302-openssl"
},
{
"name" : "FreeBSD-SA-16:12",
"refsource" : "FREEBSD",
2018-01-17 21:02:46 -05:00
"url" : "https://security.FreeBSD.org/advisories/FreeBSD-SA-16:12.openssl.asc"
},
{
"name" : "GLSA-201603-15",
"refsource" : "GENTOO",
2018-01-17 21:02:46 -05:00
"url" : "https://security.gentoo.org/glsa/201603-15"
},
{
"name" : "HPSBGN03569",
"refsource" : "HP",
2018-01-17 21:02:46 -05:00
"url" : "http://marc.info/?l=bugtraq&m=145983526810210&w=2"
},
{
"name" : "HPSBMU03573",
"refsource" : "HP",
2018-01-17 21:02:46 -05:00
"url" : "http://marc.info/?l=bugtraq&m=146133665209436&w=2"
},
{
"name" : "HPSBMU03575",
"refsource" : "HP",
2018-01-17 21:02:46 -05:00
"url" : "http://marc.info/?l=bugtraq&m=146108058503441&w=2"
},
{
"name" : "RHSA-2016:1519",
"refsource" : "REDHAT",
2018-01-17 21:02:46 -05:00
"url" : "http://rhn.redhat.com/errata/RHSA-2016-1519.html"
},
{
"name" : "openSUSE-SU-2016:1239",
"refsource" : "SUSE",
2018-01-17 21:02:46 -05:00
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00015.html"
},
{
"name" : "openSUSE-SU-2016:1241",
"refsource" : "SUSE",
2018-01-17 21:02:46 -05:00
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00017.html"
},
{
"name" : "SUSE-SU-2016:1057",
"refsource" : "SUSE",
2018-01-17 21:02:46 -05:00
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00038.html"
},
{
"name" : "SUSE-SU-2016:0617",
"refsource" : "SUSE",
2018-01-17 21:02:46 -05:00
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00001.html"
},
{
"name" : "SUSE-SU-2016:0620",
"refsource" : "SUSE",
2018-01-17 21:02:46 -05:00
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00002.html"
},
{
"name" : "SUSE-SU-2016:0621",
"refsource" : "SUSE",
2018-01-17 21:02:46 -05:00
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00003.html"
},
{
"name" : "SUSE-SU-2016:0624",
"refsource" : "SUSE",
2018-01-17 21:02:46 -05:00
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00004.html"
},
{
"name" : "SUSE-SU-2016:0631",
"refsource" : "SUSE",
2018-01-17 21:02:46 -05:00
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00007.html"
},
{
"name" : "SUSE-SU-2016:0641",
"refsource" : "SUSE",
2018-01-17 21:02:46 -05:00
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00012.html"
},
{
"name" : "openSUSE-SU-2016:0627",
"refsource" : "SUSE",
2018-01-17 21:02:46 -05:00
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00005.html"
},
{
"name" : "openSUSE-SU-2016:0628",
"refsource" : "SUSE",
2018-01-17 21:02:46 -05:00
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00006.html"
},
{
"name" : "openSUSE-SU-2016:0637",
"refsource" : "SUSE",
2018-01-17 21:02:46 -05:00
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00009.html"
},
{
"name" : "openSUSE-SU-2016:0638",
"refsource" : "SUSE",
2018-01-17 21:02:46 -05:00
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00010.html"
},
{
"name" : "openSUSE-SU-2016:0640",
"refsource" : "SUSE",
2018-01-17 21:02:46 -05:00
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00011.html"
},
{
"name" : "SUSE-SU-2016:0678",
"refsource" : "SUSE",
2018-01-17 21:02:46 -05:00
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00017.html"
},
{
"name" : "openSUSE-SU-2016:0720",
"refsource" : "SUSE",
2018-01-17 21:02:46 -05:00
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00025.html"
},
{
"name" : "VU#583776",
"refsource" : "CERT-VN",
2018-01-17 21:02:46 -05:00
"url" : "https://www.kb.cert.org/vuls/id/583776"
},
{
"name" : "91787",
"refsource" : "BID",
2018-01-17 21:02:46 -05:00
"url" : "http://www.securityfocus.com/bid/91787"
},
{
"name" : "83733",
"refsource" : "BID",
2018-01-17 21:02:46 -05:00
"url" : "http://www.securityfocus.com/bid/83733"
},
{
"name" : "1035133",
"refsource" : "SECTRACK",
2018-01-17 21:02:46 -05:00
"url" : "http://www.securitytracker.com/id/1035133"
}
]
}
}