U.S. flag   An official website of the United States government
Dot gov

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Https

Secure .gov websites use HTTPS
A lock (Dot gov) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.

Vulnerability Change Records for CVE-2014-0160

Change History

Modified Analysis by NIST 7/28/2020 1:11:56 PM

Action Type Old Value New Value
Added CPE Configuration

								
							
							
						
AND
     OR
          *cpe:2.3:o:intellian:v100_firmware:1.20:*:*:*:*:*:*:*
          *cpe:2.3:o:intellian:v100_firmware:1.21:*:*:*:*:*:*:*
          *cpe:2.3:o:intellian:v100_firmware:1.24:*:*:*:*:*:*:*
     OR
          cpe:2.3:h:intellian:v100:-:*:*:*:*:*:*:*
Added CPE Configuration

								
							
							
						
AND
     OR
          *cpe:2.3:o:intellian:v60_firmware:1.15:*:*:*:*:*:*:*
          *cpe:2.3:o:intellian:v60_firmware:1.25:*:*:*:*:*:*:*
     OR
          cpe:2.3:h:intellian:v60:-:*:*:*:*:*:*:*
Added CPE Configuration

								
							
							
						
AND
     OR
          *cpe:2.3:o:siemens:application_processing_engine_firmware:2.0:*:*:*:*:*:*:*
     OR
          cpe:2.3:h:siemens:application_processing_engine:-:*:*:*:*:*:*:*
Added CPE Configuration

								
							
							
						
AND
     OR
          *cpe:2.3:o:siemens:cp_1543-1_firmware:1.1:*:*:*:*:*:*:*
     OR
          cpe:2.3:h:siemens:cp_1543-1:-:*:*:*:*:*:*:*
Added CPE Configuration

								
							
							
						
AND
     OR
          *cpe:2.3:o:siemens:simatic_s7-1500_firmware:1.5:*:*:*:*:*:*:*
     OR
          cpe:2.3:h:siemens:simatic_s7-1500:-:*:*:*:*:*:*:*
Added CPE Configuration

								
							
							
						
AND
     OR
          *cpe:2.3:o:siemens:simatic_s7-1500t_firmware:1.5:*:*:*:*:*:*:*
     OR
          cpe:2.3:h:siemens:simatic_s7-1500t:-:*:*:*:*:*:*:*
Added CPE Configuration

								
							
							
						
OR
     *cpe:2.3:a:filezilla-project:filezilla_server:*:*:*:*:*:*:*:* versions up to (excluding) 0.9.44
Added CPE Configuration

								
							
							
						
OR
     *cpe:2.3:a:mitel:micollab:6.0:*:*:*:*:*:*:*
     *cpe:2.3:a:mitel:micollab:7.0:*:*:*:*:*:*:*
     *cpe:2.3:a:mitel:micollab:7.1:*:*:*:*:*:*:*
     *cpe:2.3:a:mitel:micollab:7.2:*:*:*:*:*:*:*
     *cpe:2.3:a:mitel:micollab:7.3:*:*:*:*:*:*:*
     *cpe:2.3:a:mitel:micollab:7.3.0.104:*:*:*:*:*:*:*
     *cpe:2.3:a:mitel:mivoice:1.1.2.5:*:*:*:*:lync:*:*
     *cpe:2.3:a:mitel:mivoice:1.1.3.3:*:*:*:*:skype_for_business:*:*
     *cpe:2.3:a:mitel:mivoice:1.2.0.11:*:*:*:*:skype_for_business:*:*
     *cpe:2.3:a:mitel:mivoice:1.3.2.2:*:*:*:*:skype_for_business:*:*
     *cpe:2.3:a:mitel:mivoice:1.4.0.102:*:*:*:*:skype_for_business:*:*
Added CPE Configuration

								
							
							
						
OR
     *cpe:2.3:a:redhat:gluster_storage:2.1:*:*:*:*:*:*:*
     *cpe:2.3:a:redhat:storage:2.1:*:*:*:*:*:*:*
     *cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
     *cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
     *cpe:2.3:o:redhat:enterprise_linux_server_aus:6.5:*:*:*:*:*:*:*
     *cpe:2.3:o:redhat:enterprise_linux_server_eus:6.5:*:*:*:*:*:*:*
     *cpe:2.3:o:redhat:enterprise_linux_server_tus:6.5:*:*:*:*:*:*:*
     *cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
     *cpe:2.3:o:redhat:virtualization:6.0:*:*:*:*:*:*:*
Added CPE Configuration

								
							
							
						
OR
     *cpe:2.3:a:siemens:elan-8.2:*:*:*:*:*:*:*:* versions up to (excluding) 8.3.3
     *cpe:2.3:a:siemens:wincc_open_architecture:3.12:*:*:*:*:*:*:*
Added CPE Configuration

								
							
							
						
OR
     *cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*
     *cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*
     *cpe:2.3:o:canonical:ubuntu_linux:13.10:*:*:*:*:*:*:*
Added CPE Configuration

								
							
							
						
OR
     *cpe:2.3:o:debian:debian_linux:6.0:*:*:*:*:*:*:*
     *cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
     *cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
Added CPE Configuration

								
							
							
						
OR
     *cpe:2.3:o:fedoraproject:fedora:19:*:*:*:*:*:*:*
     *cpe:2.3:o:fedoraproject:fedora:20:*:*:*:*:*:*:*
Added CPE Configuration

								
							
							
						
OR
     *cpe:2.3:o:opensuse:opensuse:12.3:*:*:*:*:*:*:*
     *cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*
Changed CPE Configuration
OR
     *cpe:2.3:a:openssl:openssl:1.0.1:*:*:*:*:*:*:*
     *cpe:2.3:a:openssl:openssl:1.0.1:beta1:*:*:*:*:*:*
     *cpe:2.3:a:openssl:openssl:1.0.1:beta2:*:*:*:*:*:*
     *cpe:2.3:a:openssl:openssl:1.0.1:beta3:*:*:*:*:*:*
     *cpe:2.3:a:openssl:openssl:1.0.1a:*:*:*:*:*:*:*
     *cpe:2.3:a:openssl:openssl:1.0.1b:*:*:*:*:*:*:*
     *cpe:2.3:a:openssl:openssl:1.0.1c:*:*:*:*:*:*:*
     *cpe:2.3:a:openssl:openssl:1.0.1d:*:*:*:*:*:*:*
     *cpe:2.3:a:openssl:openssl:1.0.1e:*:*:*:*:*:*:*
     *cpe:2.3:a:openssl:openssl:1.0.1f:*:*:*:*:*:*:*
     *cpe:2.3:a:openssl:openssl:1.0.2:beta1:*:*:*:*:*:*
OR
     *cpe:2.3:a:openssl:openssl:*:*:*:*:*:*:*:* versions from (including) 1.0.1 up to (excluding) 1.0.1g
Changed Reference Type
http://cogentdatahub.com/ReleaseNotes.html Third Party Advisory
http://cogentdatahub.com/ReleaseNotes.html Release Notes, Third Party Advisory
Changed Reference Type
http://download.schneider-electric.com/files?p_Doc_Ref=SEVD%202014-119-01 Third Party Advisory
http://download.schneider-electric.com/files?p_Doc_Ref=SEVD%202014-119-01 Broken Link
Changed Reference Type
http://git.openssl.org/gitweb/?p=openssl.git;a=commit;h=96db9023b881d7cd9f379b0c154650d6c108e9a3 Vendor Advisory
http://git.openssl.org/gitweb/?p=openssl.git;a=commit;h=96db9023b881d7cd9f379b0c154650d6c108e9a3 Patch, Vendor Advisory
Changed Reference Type
http://heartbleed.com/ Technical Description, Third Party Advisory
http://heartbleed.com/ Third Party Advisory
Changed Reference Type
http://lists.fedoraproject.org/pipermail/package-announce/2014-August/136473.html Third Party Advisory
http://lists.fedoraproject.org/pipermail/package-announce/2014-August/136473.html Mailing List, Third Party Advisory
Changed Reference Type
http://lists.opensuse.org/opensuse-security-announce/2014-04/msg00004.html Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2014-04/msg00004.html Mailing List, Third Party Advisory
Changed Reference Type
http://lists.opensuse.org/opensuse-security-announce/2014-04/msg00005.html Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2014-04/msg00005.html Mailing List, Third Party Advisory
Changed Reference Type
http://lists.opensuse.org/opensuse-updates/2014-04/msg00061.html Third Party Advisory
http://lists.opensuse.org/opensuse-updates/2014-04/msg00061.html Mailing List, Third Party Advisory
Changed Reference Type
http://secunia.com/advisories/57347 Vendor Advisory
http://secunia.com/advisories/57347 Third Party Advisory
Changed Reference Type
http://secunia.com/advisories/57483 Vendor Advisory
http://secunia.com/advisories/57483 Third Party Advisory
Changed Reference Type
http://secunia.com/advisories/57721 Vendor Advisory
http://secunia.com/advisories/57721 Third Party Advisory
Changed Reference Type
http://secunia.com/advisories/57836 Vendor Advisory
http://secunia.com/advisories/57836 Third Party Advisory
Changed Reference Type
http://secunia.com/advisories/57966 Vendor Advisory
http://secunia.com/advisories/57966 Third Party Advisory
Changed Reference Type
http://secunia.com/advisories/57968 Vendor Advisory
http://secunia.com/advisories/57968 Third Party Advisory
Changed Reference Type
http://www-01.ibm.com/support/docview.wss?uid=swg21670161 Third Party Advisory
http://www-01.ibm.com/support/docview.wss?uid=swg21670161 Broken Link
Changed Reference Type
http://www.blackberry.com/btsc/KB35882 Third Party Advisory
http://www.blackberry.com/btsc/KB35882 Broken Link
Changed Reference Type
http://www.exploit-db.com/exploits/32745 Third Party Advisory, VDB Entry
http://www.exploit-db.com/exploits/32745 Exploit, Third Party Advisory, VDB Entry
Changed Reference Type
http://www.exploit-db.com/exploits/32764 Third Party Advisory, VDB Entry
http://www.exploit-db.com/exploits/32764 Exploit, Third Party Advisory, VDB Entry
Changed Reference Type
http://www.innominate.com/data/downloads/manuals/mdm_1.5.2.1_Release_Notes.pdf Third Party Advisory
http://www.innominate.com/data/downloads/manuals/mdm_1.5.2.1_Release_Notes.pdf Not Applicable
Changed Reference Type
http://www.securityfocus.com/archive/1/534161/100/0/threaded Third Party Advisory, VDB Entry
http://www.securityfocus.com/archive/1/534161/100/0/threaded Not Applicable
Changed Reference Type
http://www.vmware.com/security/advisories/VMSA-2014-0012.html Third Party Advisory
http://www.vmware.com/security/advisories/VMSA-2014-0012.html Not Applicable
Changed Reference Type
http://www.websense.com/support/article/kbarticle/Vulnerabilities-resolved-in-TRITON-APX-Version-8-0 Third Party Advisory
http://www.websense.com/support/article/kbarticle/Vulnerabilities-resolved-in-TRITON-APX-Version-8-0 Not Applicable
Changed Reference Type
https://bugzilla.redhat.com/show_bug.cgi?id=1084875 Issue Tracking
https://bugzilla.redhat.com/show_bug.cgi?id=1084875 Issue Tracking, Third Party Advisory
Changed Reference Type
https://cert-portal.siemens.com/productcert/pdf/ssa-635659.pdf No Types Assigned
https://cert-portal.siemens.com/productcert/pdf/ssa-635659.pdf Third Party Advisory
Changed Reference Type
https://filezilla-project.org/versions.php?type=server Third Party Advisory
https://filezilla-project.org/versions.php?type=server Release Notes, Third Party Advisory
Changed Reference Type
https://h20566.www2.hp.com/portal/site/hpsc/template.PAGE/public/kb/docDisplay/?spf_p.tpst=kbDocDisplay&spf_p.prp_kbDocDisplay=wsrp-navigationalState%3DdocId%253Demr_na-c04260637-4%257CdocLocale%253Den_US%257CcalledBy%253DSearch_Result&javax.portlet.begCacheTok=com.vignette.cachetoken&javax.portlet.endCacheTok=com.vignette.cachetoken Third Party Advisory
https://h20566.www2.hp.com/portal/site/hpsc/template.PAGE/public/kb/docDisplay/?spf_p.tpst=kbDocDisplay&spf_p.prp_kbDocDisplay=wsrp-navigationalState%3DdocId%253Demr_na-c04260637-4%257CdocLocale%253Den_US%257CcalledBy%253DSearch_Result&javax.portlet.begCacheTok=com.vignette.cachetoken&javax.portlet.endCacheTok=com.vignette.cachetoken Broken Link
Changed Reference Type
https://lists.apache.org/thread.html/ba661b0edd913b39ff129a32d855620dd861883ade05fd88a8ce517d@%3Cdev.tomcat.apache.org%3E Third Party Advisory
https://lists.apache.org/thread.html/ba661b0edd913b39ff129a32d855620dd861883ade05fd88a8ce517d@%3Cdev.tomcat.apache.org%3E Mailing List, Patch, Third Party Advisory
Changed Reference Type
https://lists.apache.org/thread.html/f8e0814e11c7f21f42224b6de111cb3f5e5ab5c15b78924c516d4ec2@%3Cdev.tomcat.apache.org%3E Third Party Advisory
https://lists.apache.org/thread.html/f8e0814e11c7f21f42224b6de111cb3f5e5ab5c15b78924c516d4ec2@%3Cdev.tomcat.apache.org%3E Mailing List, Patch, Third Party Advisory
Changed Reference Type
https://lists.apache.org/thread.html/re3b72cbb13e1dfe85c4a06959a3b6ca6d939b407ecca80db12b54220@%3Cdev.tomcat.apache.org%3E No Types Assigned
https://lists.apache.org/thread.html/re3b72cbb13e1dfe85c4a06959a3b6ca6d939b407ecca80db12b54220@%3Cdev.tomcat.apache.org%3E Mailing List, Patch, Third Party Advisory
Changed Reference Type
https://lists.apache.org/thread.html/rf8e8c091182b45daa50d3557cad9b10bb4198e3f08cf8f1c66a1b08d@%3Cdev.tomcat.apache.org%3E No Types Assigned
https://lists.apache.org/thread.html/rf8e8c091182b45daa50d3557cad9b10bb4198e3f08cf8f1c66a1b08d@%3Cdev.tomcat.apache.org%3E Mailing List, Patch, Third Party Advisory
Changed Reference Type
https://sku11army.blogspot.com/2020/01/heartbleed-hearts-continue-to-bleed.html No Types Assigned
https://sku11army.blogspot.com/2020/01/heartbleed-hearts-continue-to-bleed.html Exploit, Third Party Advisory