Executive Summary

Informations
NameCVE-2015-0204First vendor Publication2015-01-08
VendorCveLast vendor Modification2018-07-18

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:M/Au:N/C:N/I:P/A:N)
Cvss Base Score4.3Attack RangeNetwork
Cvss Impact Score2.9Attack ComplexityMedium
Cvss Expoit Score8.6AuthenticationNone Required
Calculate full CVSS 2.0 Vectors scores

Detail

The ssl3_get_key_exchange function in s3_clnt.c in OpenSSL before 0.9.8zd, 1.0.0 before 1.0.0p, and 1.0.1 before 1.0.1k allows remote SSL servers to conduct RSA-to-EXPORT_RSA downgrade attacks and facilitate brute-force decryption by offering a weak ephemeral RSA key in a noncompliant role, related to the "FREAK" issue. NOTE: the scope of this CVE is only client code based on OpenSSL, not EXPORT_RSA issues associated with servers or other TLS implementations.

Original Source

Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0204

CWE : Common Weakness Enumeration

%idName
100 %CWE-310Cryptographic Issues

OVAL Definitions

Definition Id: oval:org.mitre.oval:def:28564
 
Oval ID: oval:org.mitre.oval:def:28564
Title: Potential security vulnerabilities have been identified with HP-UX running OpenSSL. These vulnerabilities could be exploited remotely to create a remote Denial of Service (DoS) and other vulnerabilites.
Description: The ssl3_get_key_exchange function in s3_clnt.c in OpenSSL before 0.9.8zd, 1.0.0 before 1.0.0p, and 1.0.1 before 1.0.1k allows remote SSL servers to conduct RSA-to-EXPORT_RSA downgrade attacks and facilitate brute-force decryption by offering a weak ephemeral RSA key in a noncompliant role, related to the "FREAK" issue. NOTE: the scope of this CVE is only client code based on OpenSSL, not EXPORT_RSA issues associated with servers or other TLS implementations.
Family: unix Class: vulnerability
Reference(s): CVE-2015-0204
Version: 6
Platform(s): HP-UX 11
Product(s):
Definition Synopsis:

CPE : Common Platform Enumeration

TypeDescriptionCount
Application185

Information Assurance Vulnerability Management (IAVM)

DateDescription
2015-09-03IAVM : 2015-B-0106 - Multiple Vulnerabilities in HP Version Control Repository Manager
Severity : Category I - VMSKEY : V0061359

Snort® IPS/IDS

DateDescription
2015-04-14SSL request for export grade ciphersuite attempt
RuleID : 33806 - Revision : 5 - Type : SERVER-OTHER
2015-04-14SSL request for export grade ciphersuite attempt
RuleID : 33805 - Revision : 5 - Type : SERVER-OTHER
2015-04-14SSL request for export grade ciphersuite attempt
RuleID : 33804 - Revision : 5 - Type : SERVER-OTHER
2015-04-14SSL request for export grade ciphersuite attempt
RuleID : 33803 - Revision : 5 - Type : SERVER-OTHER
2015-04-14SSL request for export grade ciphersuite attempt
RuleID : 33802 - Revision : 5 - Type : SERVER-OTHER
2015-04-14SSL request for export grade ciphersuite attempt
RuleID : 33801 - Revision : 5 - Type : SERVER-OTHER
2015-04-14SSL export grade ciphersuite server negotiation attempt
RuleID : 33800 - Revision : 6 - Type : SERVER-OTHER
2015-04-14SSL export grade ciphersuite server negotiation attempt
RuleID : 33799 - Revision : 6 - Type : SERVER-OTHER
2015-04-14SSL export grade ciphersuite server negotiation attempt
RuleID : 33798 - Revision : 6 - Type : SERVER-OTHER
2015-04-14SSL export grade ciphersuite server negotiation attempt
RuleID : 33797 - Revision : 6 - Type : SERVER-OTHER
2015-04-14SSL export grade ciphersuite server negotiation attempt
RuleID : 33796 - Revision : 6 - Type : SERVER-OTHER
2015-04-14SSL export grade ciphersuite server negotiation attempt
RuleID : 33795 - Revision : 6 - Type : SERVER-OTHER
2015-04-14SSL export grade ciphersuite server negotiation attempt
RuleID : 33794 - Revision : 6 - Type : SERVER-OTHER
2015-04-14SSL request for export grade ciphersuite attempt
RuleID : 33793 - Revision : 5 - Type : SERVER-OTHER
2015-04-14SSL request for export grade ciphersuite attempt
RuleID : 33792 - Revision : 5 - Type : SERVER-OTHER
2015-04-14SSL request for export grade ciphersuite attempt
RuleID : 33791 - Revision : 5 - Type : SERVER-OTHER
2015-04-14SSL request for export grade ciphersuite attempt
RuleID : 33790 - Revision : 5 - Type : SERVER-OTHER
2015-04-14SSL request for export grade ciphersuite attempt
RuleID : 33789 - Revision : 5 - Type : SERVER-OTHER
2015-04-14SSL request for export grade ciphersuite attempt
RuleID : 33788 - Revision : 5 - Type : SERVER-OTHER
2015-04-14SSL request for export grade ciphersuite attempt
RuleID : 33787 - Revision : 5 - Type : SERVER-OTHER
2015-04-14SSL request for export grade ciphersuite attempt
RuleID : 33786 - Revision : 5 - Type : SERVER-OTHER
2015-04-14SSL request for export grade cipher suite attempt
RuleID : 33785 - Revision : 6 - Type : SERVER-OTHER
2015-04-14SSL export grade ciphersuite server negotiation attempt
RuleID : 33784 - Revision : 6 - Type : SERVER-OTHER
2015-04-14SSL export grade ciphersuite server negotiation attempt
RuleID : 33783 - Revision : 6 - Type : SERVER-OTHER
2015-04-14SSL export grade ciphersuite server negotiation attempt
RuleID : 33782 - Revision : 6 - Type : SERVER-OTHER
2015-04-14SSL export grade ciphersuite server negotiation attempt
RuleID : 33781 - Revision : 6 - Type : SERVER-OTHER
2015-04-14SSL export grade ciphersuite server negotiation attempt
RuleID : 33780 - Revision : 6 - Type : SERVER-OTHER
2015-04-14SSL request for export grade ciphersuite attempt
RuleID : 33779 - Revision : 5 - Type : SERVER-OTHER
2015-04-14SSL export grade ciphersuite server negotiation attempt
RuleID : 33778 - Revision : 6 - Type : SERVER-OTHER
2015-04-14SSL export grade ciphersuite server negotiation attempt
RuleID : 33777 - Revision : 6 - Type : SERVER-OTHER
2015-04-07SSL request for export grade ciphersuite attempt
RuleID : 33703 - Revision : 2 - Type : SERVER-OTHER
2015-04-07SSL request for export grade ciphersuite attempt
RuleID : 33702 - Revision : 2 - Type : SERVER-OTHER
2015-04-07SSL request for export grade ciphersuite attempt
RuleID : 33701 - Revision : 2 - Type : SERVER-OTHER
2015-04-07SSL request for export grade ciphersuite attempt
RuleID : 33700 - Revision : 2 - Type : SERVER-OTHER
2015-04-07SSL request for export grade ciphersuite attempt
RuleID : 33699 - Revision : 2 - Type : SERVER-OTHER
2015-04-07SSL request for export grade ciphersuite attempt
RuleID : 33698 - Revision : 2 - Type : SERVER-OTHER
2015-04-07SSL request for export grade ciphersuite attempt
RuleID : 33697 - Revision : 2 - Type : SERVER-OTHER
2015-04-07SSL request for export grade ciphersuite attempt
RuleID : 33696 - Revision : 2 - Type : SERVER-OTHER
2015-04-07SSL request for export grade ciphersuite attempt
RuleID : 33695 - Revision : 2 - Type : SERVER-OTHER
2015-04-07SSL request for export grade ciphersuite attempt
RuleID : 33694 - Revision : 2 - Type : SERVER-OTHER
2015-04-07SSL request for export grade ciphersuite attempt
RuleID : 33693 - Revision : 2 - Type : SERVER-OTHER
2015-04-07SSL request for export grade ciphersuite attempt
RuleID : 33692 - Revision : 2 - Type : SERVER-OTHER
2015-04-07SSL request for export grade ciphersuite attempt
RuleID : 33691 - Revision : 2 - Type : SERVER-OTHER
2015-04-07SSL request for export grade ciphersuite attempt
RuleID : 33690 - Revision : 2 - Type : SERVER-OTHER
2015-04-07SSL request for export grade ciphersuite attempt
RuleID : 33689 - Revision : 2 - Type : SERVER-OTHER
2015-04-07SSL request for export grade ciphersuite attempt
RuleID : 33688 - Revision : 2 - Type : SERVER-OTHER
2015-04-07SSL request for export grade ciphersuite attempt
RuleID : 33687 - Revision : 2 - Type : SERVER-OTHER
2015-04-07SSL request for export grade ciphersuite attempt
RuleID : 33686 - Revision : 2 - Type : SERVER-OTHER

Nessus® Vulnerability Scanner

DateDescription
2017-12-07Name : The remote host is potentially affected by an SSL/TLS vulnerability.
File : check_point_gaia_sk103683.nasl - Type : ACT_GATHER_INFO
2016-07-22Name : The remote database server is affected by multiple vulnerabilities.
File : oracle_rdbms_cpu_jul_2016.nasl - Type : ACT_GATHER_INFO
2016-03-29Name : The remote web server is affected by multiple vulnerabilities.
File : hpsmh_7_2_6.nasl - Type : ACT_GATHER_INFO
2016-03-04Name : The remote openSUSE host is missing a security update.
File : openSUSE-2016-294.nasl - Type : ACT_GATHER_INFO
2016-01-14Name : The remote SUSE host is missing one or more security updates.
File : suse_SU-2016-0113-1.nasl - Type : ACT_GATHER_INFO
2016-01-06Name : The remote database server is affected by multiple vulnerabilities.
File : db2_105fp7_nix.nasl - Type : ACT_GATHER_INFO
2016-01-06Name : The remote database server is affected by multiple vulnerabilities.
File : db2_105fp7_win.nasl - Type : ACT_GATHER_INFO
2015-12-30Name : A web application on the remote host is affected by multiple vulnerabilities.
File : puppet_enterprise_380.nasl - Type : ACT_GATHER_INFO
2015-12-16Name : The remote SUSE host is missing one or more security updates.
File : suse_SU-2015-2168-2.nasl - Type : ACT_GATHER_INFO
2015-12-11Name : The remote multi-function device is affected by a man-in-the-middle vulnerabi...
File : xerox_xrx15ap.nasl - Type : ACT_GATHER_INFO
2015-12-11Name : The remote multi-function device is affected by multiple vulnerabilities.
File : xerox_xrx15av.nasl - Type : ACT_GATHER_INFO
2015-12-11Name : The remote multi-function device is affected by multiple vulnerabilities.
File : xerox_xrx15r.nasl - Type : ACT_GATHER_INFO
2015-12-11Name : The remote multi-function device is affected by multiple vulnerabilities.
File : xerox_xrx15ad_colorqube.nasl - Type : ACT_GATHER_INFO
2015-12-11Name : The remote multi-function device is affected by multiple vulnerabilities.
File : xerox_xrx15aj.nasl - Type : ACT_GATHER_INFO
2015-12-11Name : The remote multi-function device is affected by multiple vulnerabilities.
File : xerox_xrx15am.nasl - Type : ACT_GATHER_INFO
2015-12-09Name : The remote SUSE host is missing one or more security updates.
File : suse_SU-2015-2216-1.nasl - Type : ACT_GATHER_INFO
2015-12-04Name : The remote SUSE host is missing one or more security updates.
File : suse_SU-2015-2182-1.nasl - Type : ACT_GATHER_INFO
2015-12-03Name : The remote SUSE host is missing one or more security updates.
File : suse_SU-2015-2166-1.nasl - Type : ACT_GATHER_INFO
2015-12-03Name : The remote SUSE host is missing one or more security updates.
File : suse_SU-2015-2168-1.nasl - Type : ACT_GATHER_INFO
2015-10-19Name : The remote printer is affected by a security bypass vulnerability known as FR...
File : lexmark_printer_TE701.nasl - Type : ACT_GATHER_INFO
2015-10-05Name : The remote device is missing a vendor-supplied security patch.
File : f5_bigip_SOL16139.nasl - Type : ACT_GATHER_INFO
2015-09-04Name : The remote Windows host has an application installed that is affected by mult...
File : hp_version_control_repo_manager_7_5_0_0.nasl - Type : ACT_GATHER_INFO
2015-09-04Name : The remote Linux host has an application installed that is affected by multip...
File : hp_version_control_repo_manager_7_5_0_nix.nasl - Type : ACT_GATHER_INFO
2015-07-22Name : The remote web server is affected by multiple vulnerabilities.
File : hpsmh_7_5.nasl - Type : ACT_GATHER_INFO
2015-06-29Name : The remote SUSE host is missing one or more security updates.
File : suse_SU-2015-1086-4.nasl - Type : ACT_GATHER_INFO
2015-06-26Name : The remote SUSE host is missing one or more security updates.
File : suse_SU-2015-1086-3.nasl - Type : ACT_GATHER_INFO
2015-06-26Name : The remote SUSE host is missing one or more security updates.
File : suse_SU-2015-1138-1.nasl - Type : ACT_GATHER_INFO
2015-06-23Name : The remote SUSE host is missing one or more security updates.
File : suse_SU-2015-1086-2.nasl - Type : ACT_GATHER_INFO
2015-06-19Name : The remote SUSE host is missing one or more security updates.
File : suse_SU-2015-1085-1.nasl - Type : ACT_GATHER_INFO
2015-06-19Name : The remote SUSE host is missing one or more security updates.
File : suse_SU-2015-1086-1.nasl - Type : ACT_GATHER_INFO
2015-06-10Name : The remote AIX host has a version of Java SDK installed that is affected by m...
File : aix_java_april2015_advisory.nasl - Type : ACT_GATHER_INFO
2015-06-09Name : The remote Windows host has VPN client software installed that is affected by...
File : smb_kb3062760.nasl - Type : ACT_GATHER_INFO
2015-06-04Name : The remote web server is running an application that is affected by multiple ...
File : splunk_618.nasl - Type : ACT_GATHER_INFO
2015-05-27Name : The remote SUSE host is missing one or more security updates.
File : suse_SU-2015-0946-1.nasl - Type : ACT_GATHER_INFO
2015-05-19Name : The remote device is missing a vendor-supplied security patch.
File : cisco-sa-20150310-ssl-nxos.nasl - Type : ACT_GATHER_INFO
2015-05-19Name : The remote Apache Tomcat server is affected by multiple vulnerabilities.
File : tomcat_7_0_60.nasl - Type : ACT_GATHER_INFO
2015-05-19Name : The remote Apache Tomcat server is affected by multiple vulnerabilities.
File : tomcat_8_0_21.nasl - Type : ACT_GATHER_INFO
2015-05-15Name : The remote Apache Tomcat server is affected by multiple vulnerabilities.
File : tomcat_6_0_44.nasl - Type : ACT_GATHER_INFO
2015-04-21Name : The remote device is missing a vendor-supplied security patch.
File : juniper_jsa10679.nasl - Type : ACT_GATHER_INFO
2015-04-21Name : The remote host is affected by multiple vulnerabilities.
File : juniper_nsm_jsa10679.nasl - Type : ACT_GATHER_INFO
2015-04-16Name : The remote Windows host contains a programming platform that is affected by m...
File : oracle_java_cpu_apr_2015.nasl - Type : ACT_GATHER_INFO
2015-04-16Name : The remote Unix host contains a programming platform that is affected by mult...
File : oracle_java_cpu_apr_2015_unix.nasl - Type : ACT_GATHER_INFO
2015-04-16Name : The remote Windows host contains a programming platform that is affected by m...
File : oracle_jrockit_cpu_apr_2015.nasl - Type : ACT_GATHER_INFO
2015-04-15Name : The remote CentOS host is missing one or more security updates.
File : centos_RHSA-2015-0800.nasl - Type : ACT_GATHER_INFO
2015-04-14Name : The remote Oracle Linux host is missing one or more security updates.
File : oraclelinux_ELSA-2015-0800.nasl - Type : ACT_GATHER_INFO
2015-04-14Name : The remote Red Hat host is missing one or more security updates.
File : redhat-RHSA-2015-0800.nasl - Type : ACT_GATHER_INFO
2015-04-14Name : The remote Scientific Linux host is missing one or more security updates.
File : sl_20150413_openssl_on_SL5_x.nasl - Type : ACT_GATHER_INFO
2015-04-10Name : The remote host is missing a Mac OS X update that fixes multiple security vul...
File : macosx_10_10_3.nasl - Type : ACT_GATHER_INFO
2015-04-10Name : The remote host is missing a Mac OS X update that fixes multiple security vul...
File : macosx_SecUpd2015-004.nasl - Type : ACT_GATHER_INFO
2015-04-09Name : The remote device is affected by a security feature bypass vulnerability.
File : bluecoat_proxy_sg_6_5_6_2.nasl - Type : ACT_GATHER_INFO
2015-03-30Name : The remote Mandriva Linux host is missing one or more security updates.
File : mandriva_MDVSA-2015-062.nasl - Type : ACT_GATHER_INFO
2015-03-30Name : The remote Mandriva Linux host is missing one or more security updates.
File : mandriva_MDVSA-2015-063.nasl - Type : ACT_GATHER_INFO
2015-03-27Name : The remote Windows host has an application that is affected by the FREAK vuln...
File : blackberry_es_freak_kb36811.nasl - Type : ACT_GATHER_INFO
2015-03-26Name : The remote host is affected by multiple vulnerabilities.
File : cisco_anyconnect_3_1_7021.nasl - Type : ACT_GATHER_INFO
2015-03-26Name : The remote Debian host is missing a security update.
File : debian_DLA-132.nasl - Type : ACT_GATHER_INFO
2015-03-26Name : The remote host is affected by multiple vulnerabilities.
File : macosx_cisco_anyconnect_3_1_7021.nasl - Type : ACT_GATHER_INFO
2015-03-24Name : The remote Gentoo host is missing one or more security-related patches.
File : gentoo_GLSA-201503-11.nasl - Type : ACT_GATHER_INFO
2015-03-20Name : The remote FreeBSD host is missing one or more security-related updates.
File : freebsd_pkg_9d15355bce7c11e49db0d050992ecde8.nasl - Type : ACT_GATHER_INFO
2015-03-18Name : The remote OracleVM host is missing a security update.
File : oraclevm_OVMSA-2015-0030.nasl - Type : ACT_GATHER_INFO
2015-03-17Name : The remote Mac OS X host has a web browser installed that is affected by the ...
File : macosx_opera_28_0_1750_40.nasl - Type : ACT_GATHER_INFO
2015-03-13Name : The remote web server contains an application that is affected by multiple vu...
File : splunk_622.nasl - Type : ACT_GATHER_INFO
2015-03-13Name : The remote host is affected by multiple vulnerabilities.
File : mcafee_firewall_enterprise_SB10102.nasl - Type : ACT_GATHER_INFO
2015-03-10Name : The remote OracleVM host is missing a security update.
File : oraclevm_OVMSA-2015-0029.nasl - Type : ACT_GATHER_INFO
2015-03-05Name : The remote Mac OS X host contains a web browser that is affected by multiple ...
File : macosx_google_chrome_41_0_2272_76.nasl - Type : ACT_GATHER_INFO
2015-03-04Name : The remote host supports a set of weak ciphers.
File : ssl_rsa_export_supported_ciphers.nasl - Type : ACT_GATHER_INFO
2015-02-18Name : The remote AIX host has a version of OpenSSL installed that is affected by mu...
File : aix_openssl_advisory12.nasl - Type : ACT_GATHER_INFO
2015-02-02Name : The remote SuSE 11 host is missing one or more security updates.
File : suse_11_compat-openssl097g-150122.nasl - Type : ACT_GATHER_INFO
2015-02-02Name : The remote SuSE 11 host is missing one or more security updates.
File : suse_11_libopenssl-devel-150112.nasl - Type : ACT_GATHER_INFO
2015-01-26Name : The remote openSUSE host is missing a security update.
File : openSUSE-2015-67.nasl - Type : ACT_GATHER_INFO
2015-01-23Name : The remote OracleVM host is missing a security update.
File : oraclevm_OVMSA-2015-0005.nasl - Type : ACT_GATHER_INFO
2015-01-22Name : The remote Scientific Linux host is missing one or more security updates.
File : sl_20150121_openssl_on_SL6_x.nasl - Type : ACT_GATHER_INFO
2015-01-21Name : The remote CentOS host is missing one or more security updates.
File : centos_RHSA-2015-0066.nasl - Type : ACT_GATHER_INFO
2015-01-21Name : The remote Oracle Linux host is missing one or more security updates.
File : oraclelinux_ELSA-2015-0066.nasl - Type : ACT_GATHER_INFO
2015-01-21Name : The remote Red Hat host is missing one or more security updates.
File : redhat-RHSA-2015-0066.nasl - Type : ACT_GATHER_INFO
2015-01-16Name : The remote service is affected by multiple vulnerabilities.
File : openssl_0_9_8zd.nasl - Type : ACT_GATHER_INFO
2015-01-16Name : The remote service is affected by multiple vulnerabilities.
File : openssl_1_0_0p.nasl - Type : ACT_GATHER_INFO
2015-01-16Name : The remote service is affected by multiple vulnerabilities.
File : openssl_1_0_1k.nasl - Type : ACT_GATHER_INFO
2015-01-13Name : The remote Ubuntu host is missing one or more security-related patches.
File : ubuntu_USN-2459-1.nasl - Type : ACT_GATHER_INFO
2015-01-13Name : The remote Amazon Linux AMI host is missing a security update.
File : ala_ALAS-2015-469.nasl - Type : ACT_GATHER_INFO
2015-01-12Name : The remote Slackware host is missing a security update.
File : Slackware_SSA_2015-009-01.nasl - Type : ACT_GATHER_INFO
2015-01-12Name : The remote Debian host is missing a security-related update.
File : debian_DSA-3125.nasl - Type : ACT_GATHER_INFO
2015-01-12Name : The remote Mandriva Linux host is missing one or more security updates.
File : mandriva_MDVSA-2015-019.nasl - Type : ACT_GATHER_INFO
2015-01-09Name : The remote FreeBSD host is missing one or more security-related updates.
File : freebsd_pkg_4e536c14979111e4977dd050992ecde8.nasl - Type : ACT_GATHER_INFO

Sources (Detail)

SourceUrl
APPLE http://lists.apple.com/archives/security-announce/2015/Apr/msg00001.html
BID http://www.securityfocus.com/bid/71936
http://www.securityfocus.com/bid/91787
CISCO http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa...
CONFIRM http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10679
http://support.novell.com/security/cve/CVE-2015-0204.html
http://www-01.ibm.com/support/docview.wss?uid=swg21883640
http://www-304.ibm.com/support/docview.wss?uid=swg21960769
http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html
http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html
http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html
http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html
http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html
http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html
http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html
http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html
https://bto.bluecoat.com/security-advisory/sa88
https://bto.bluecoat.com/security-advisory/sa91
https://github.com/openssl/openssl/commit/ce325c60c74b0fa784f5872404b722e120e...
https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_n...
https://kc.mcafee.com/corporate/index?page=content&id=SB10102
https://kc.mcafee.com/corporate/index?page=content&id=SB10108
https://kc.mcafee.com/corporate/index?page=content&id=SB10110
https://support.apple.com/HT204659
https://support.citrix.com/article/CTX216642
https://www.openssl.org/news/secadv_20150108.txt
https://www.openssl.org/news/secadv_20150319.txt
DEBIAN http://www.debian.org/security/2015/dsa-3125
GENTOO https://security.gentoo.org/glsa/201503-11
HP http://marc.info/?l=bugtraq&m=142496179803395&w=2
http://marc.info/?l=bugtraq&m=142496289803847&w=2
http://marc.info/?l=bugtraq&m=142720981827617&w=2
http://marc.info/?l=bugtraq&m=142721102728110&w=2
http://marc.info/?l=bugtraq&m=142895206924048&w=2
http://marc.info/?l=bugtraq&m=143213830203296&w=2
http://marc.info/?l=bugtraq&m=143748090628601&w=2
http://marc.info/?l=bugtraq&m=144043644216842&w=2
http://marc.info/?l=bugtraq&m=144050155601375&w=2
http://marc.info/?l=bugtraq&m=144050205101530&w=2
http://marc.info/?l=bugtraq&m=144050254401665&w=2
http://marc.info/?l=bugtraq&m=144050297101809&w=2
MANDRIVA http://www.mandriva.com/security/advisories?name=MDVSA-2015:019
http://www.mandriva.com/security/advisories?name=MDVSA-2015:062
http://www.mandriva.com/security/advisories?name=MDVSA-2015:063
MISC https://freakattack.com/
REDHAT http://rhn.redhat.com/errata/RHSA-2015-0066.html
http://rhn.redhat.com/errata/RHSA-2015-0800.html
http://rhn.redhat.com/errata/RHSA-2015-0849.html
http://rhn.redhat.com/errata/RHSA-2016-1650.html
SECTRACK http://www.securitytracker.com/id/1033378
SUSE http://lists.opensuse.org/opensuse-security-announce/2015-01/msg00021.html
http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00027.html
http://lists.opensuse.org/opensuse-security-announce/2015-05/msg00026.html
http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00014.html
http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00015.html
http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00022.html
http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00031.html
http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00000.html
http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00001.html
http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00003.html
http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00004.html
http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00006.html
http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00005.html
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00011.html
XF https://exchange.xforce.ibmcloud.com/vulnerabilities/99707

Alert History

If you want to see full details history, please login or register.
0
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
DateInformations
2018-08-10 12:04:47
  • Multiple Updates
2018-07-19 09:19:07
  • Multiple Updates
2017-12-08 13:23:04
  • Multiple Updates
2017-11-15 09:23:52
  • Multiple Updates
2017-10-20 09:23:00
  • Multiple Updates
2017-09-08 09:23:16
  • Multiple Updates
2017-01-03 09:23:03
  • Multiple Updates
2016-12-28 09:21:58
  • Multiple Updates
2016-12-24 09:24:04
  • Multiple Updates
2016-12-22 09:23:41
  • Multiple Updates
2016-12-08 09:23:34
  • Multiple Updates
2016-12-07 09:24:14
  • Multiple Updates
2016-12-03 09:24:00
  • Multiple Updates
2016-10-26 09:22:44
  • Multiple Updates
2016-10-25 09:21:53
  • Multiple Updates
2016-09-28 09:23:39
  • Multiple Updates
2016-08-23 09:24:53
  • Multiple Updates
2016-08-09 09:24:04
  • Multiple Updates
2016-07-23 13:27:10
  • Multiple Updates
2016-07-22 12:03:12
  • Multiple Updates
2016-04-27 01:39:33
  • Multiple Updates
2016-03-30 13:26:11
  • Multiple Updates
2016-03-05 13:26:42
  • Multiple Updates
2016-01-22 09:22:18
  • Multiple Updates
2016-01-15 13:26:42
  • Multiple Updates
2016-01-07 13:25:36
  • Multiple Updates
2015-12-31 13:26:09
  • Multiple Updates
2015-12-17 13:26:27
  • Multiple Updates
2015-12-12 13:26:15
  • Multiple Updates
2015-12-10 13:24:43
  • Multiple Updates
2015-12-05 13:26:49
  • Multiple Updates
2015-12-04 13:26:18
  • Multiple Updates
2015-10-23 09:23:16
  • Multiple Updates
2015-10-20 13:24:54
  • Multiple Updates
2015-10-18 17:23:11
  • Multiple Updates
2015-10-06 13:24:22
  • Multiple Updates
2015-09-05 13:31:53
  • Multiple Updates
2015-07-24 13:29:18
  • Multiple Updates
2015-07-22 05:29:51
  • Multiple Updates
2015-07-17 09:19:38
  • Multiple Updates
2015-07-06 09:25:51
  • Multiple Updates
2015-06-30 13:26:49
  • Multiple Updates
2015-06-27 13:28:49
  • Multiple Updates
2015-06-24 13:27:36
  • Multiple Updates
2015-06-20 13:30:17
  • Multiple Updates
2015-06-12 05:26:43
  • Multiple Updates
2015-06-11 13:27:39
  • Multiple Updates
2015-06-10 13:27:36
  • Multiple Updates
2015-06-05 13:27:52
  • Multiple Updates
2015-06-04 09:27:14
  • Multiple Updates
2015-05-28 13:27:51
  • Multiple Updates
2015-05-20 13:29:05
  • Multiple Updates
2015-05-16 13:27:39
  • Multiple Updates
2015-04-27 17:25:52
  • Multiple Updates
2015-04-24 00:26:56
  • Multiple Updates
2015-04-23 09:27:58
  • Multiple Updates
2015-04-22 13:28:44
  • Multiple Updates
2015-04-22 00:27:05
  • Multiple Updates
2015-04-21 09:25:57
  • Multiple Updates
2015-04-18 13:26:50
  • Multiple Updates
2015-04-17 09:27:55
  • Multiple Updates
2015-04-16 13:28:23
  • Multiple Updates
2015-04-15 13:28:19
  • Multiple Updates
2015-04-14 21:26:05
  • Multiple Updates
2015-04-14 09:27:55
  • Multiple Updates
2015-04-11 13:28:56
  • Multiple Updates
2015-04-10 13:28:07
  • Multiple Updates
2015-04-07 21:27:11
  • Multiple Updates
2015-04-01 09:27:06
  • Multiple Updates
2015-03-31 13:29:12
  • Multiple Updates
2015-03-28 13:27:13
  • Multiple Updates
2015-03-27 13:28:57
  • Multiple Updates
2015-03-27 09:27:24
  • Multiple Updates
2015-03-26 21:33:53
  • Multiple Updates
2015-03-25 13:28:31
  • Multiple Updates
2015-03-24 09:29:17
  • Multiple Updates
2015-03-21 13:27:41
  • Multiple Updates
2015-03-20 00:27:40
  • Multiple Updates
2015-03-19 13:28:19
  • Multiple Updates
2015-03-18 13:27:28
  • Multiple Updates
2015-03-17 09:27:08
  • Multiple Updates
2015-03-14 13:25:40
  • Multiple Updates
2015-03-13 09:23:36
  • Multiple Updates
2015-03-12 09:24:34
  • Multiple Updates
2015-03-11 13:24:58
  • Multiple Updates
2015-03-10 09:24:19
  • Multiple Updates
2015-03-07 13:24:39
  • Multiple Updates
2015-03-06 00:23:28
  • Multiple Updates
2015-03-05 13:24:07
  • Multiple Updates
2015-03-05 09:23:20
  • Multiple Updates
2015-02-27 21:24:35
  • Multiple Updates
2015-02-21 09:24:47
  • Multiple Updates
2015-02-19 13:24:56
  • Multiple Updates
2015-02-03 13:24:17
  • Multiple Updates
2015-01-27 13:23:36
  • Multiple Updates
2015-01-24 13:23:51
  • Multiple Updates
2015-01-23 13:24:56
  • Multiple Updates
2015-01-22 13:25:02
  • Multiple Updates
2015-01-18 13:25:07
  • Multiple Updates
2015-01-17 05:28:28
  • Multiple Updates
2015-01-14 13:23:32
  • Multiple Updates
2015-01-13 13:23:43
  • Multiple Updates
2015-01-10 13:23:24
  • Multiple Updates
2015-01-09 21:23:28
  • Multiple Updates
2015-01-09 09:25:04
  • First insertion