U.S. flag   An official website of the United States government
Dot gov

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Https

Secure .gov websites use HTTPS
A lock (Dot gov) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.

Vulnerability Change Records for CVE-2014-0224

Change History

Modified Analysis by NIST 7/28/2020 12:40:07 PM

Action Type Old Value New Value
Added CPE Configuration

								
							
							
						
AND
     OR
          *cpe:2.3:o:siemens:application_processing_engine_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 2.0.2
     OR
          cpe:2.3:h:siemens:application_processing_engine:-:*:*:*:*:*:*:*
Added CPE Configuration

								
							
							
						
AND
     OR
          *cpe:2.3:o:siemens:cp1543-1_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 1.1.25
     OR
          cpe:2.3:h:siemens:cp1543-1:-:*:*:*:*:*:*:*
Added CPE Configuration

								
							
							
						
AND
     OR
          *cpe:2.3:o:siemens:rox_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 1.16.1
     OR
          cpe:2.3:h:siemens:rox:-:*:*:*:*:*:*:*
Added CPE Configuration

								
							
							
						
AND
     OR
          *cpe:2.3:o:siemens:s7-1500_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 1.6
     OR
          cpe:2.3:h:siemens:s7-1500:-:*:*:*:*:*:*:*
Added CPE Configuration

								
							
							
						
OR
     *cpe:2.3:a:filezilla-project:filezilla_server:*:*:*:*:*:*:*:* versions up to (excluding) 0.9.45
Changed CPE Configuration
OR
     *cpe:2.3:a:openssl:openssl:*:*:*:*:*:*:*:* versions from (including) 1.0.0 up to (excluding) 1.0.0m
OR
     *cpe:2.3:a:openssl:openssl:*:*:*:*:*:*:*:* versions up to (excluding) 0.9.8za
     *cpe:2.3:a:openssl:openssl:*:*:*:*:*:*:*:* versions from (including) 1.0.0 up to (excluding) 1.0.0m
     *cpe:2.3:a:openssl:openssl:*:*:*:*:*:*:*:* versions from (including) 1.0.1 up to (excluding) 1.0.1h
Changed CPE Configuration
OR
     *cpe:2.3:a:redhat:jboss_enterprise_application_platform:5.2.0:*:*:*:*:*:*:*
     *cpe:2.3:a:redhat:jboss_enterprise_application_platform:6.2.3:*:*:*:*:*:*:*
     *cpe:2.3:a:redhat:jboss_enterprise_web_platform:5.2.0:*:*:*:*:*:*:*
     *cpe:2.3:a:redhat:jboss_enterprise_web_server:2.0.1:*:*:*:*:*:*:*
     *cpe:2.3:a:redhat:storage:2.1:*:*:*:*:*:*:*
     *cpe:2.3:o:fedoraproject:fedora:*:*:*:*:*:*:*:*
     *cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*
     *cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
     *cpe:2.3:o:redhat:enterprise_linux:4:*:*:*:*:*:*:*
     *cpe:2.3:o:redhat:enterprise_linux:5:*:*:*:*:*:*:*
     *cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
OR
     *cpe:2.3:a:redhat:jboss_enterprise_application_platform:5.2.0:*:*:*:*:*:*:*
     *cpe:2.3:a:redhat:jboss_enterprise_application_platform:6.2.3:*:*:*:*:*:*:*
     *cpe:2.3:a:redhat:jboss_enterprise_web_platform:5.2.0:*:*:*:*:*:*:*
     *cpe:2.3:a:redhat:jboss_enterprise_web_server:2.0.1:*:*:*:*:*:*:*
     *cpe:2.3:a:redhat:storage:2.1:*:*:*:*:*:*:*
     *cpe:2.3:o:fedoraproject:fedora:19:*:*:*:*:*:*:*
     *cpe:2.3:o:fedoraproject:fedora:20:*:*:*:*:*:*:*
     *cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*
     *cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
     *cpe:2.3:o:redhat:enterprise_linux:4:*:*:*:*:*:*:*
     *cpe:2.3:o:redhat:enterprise_linux:5:*:*:*:*:*:*:*
     *cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
Removed CPE Configuration
OR
     *cpe:2.3:a:openssl:openssl:*:*:*:*:*:*:*:* versions from (including) 1.0.1 up to (excluding) 1.0.1h

								
						
Removed CPE Configuration
OR
     *cpe:2.3:a:openssl:openssl:*:*:*:*:*:*:*:* versions up to (including) 0.9.8y

								
						
Added CWE

								
							
							
						
NIST CWE-326
Removed CWE
NIST CWE-310

								
						
Changed Reference Type
http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10629 Third Party Advisory
http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10629 Not Applicable
Changed Reference Type
http://kb.juniper.net/InfoCenter/index?page=content&id=KB29195 Third Party Advisory
http://kb.juniper.net/InfoCenter/index?page=content&id=KB29195 Not Applicable
Changed Reference Type
http://www.ibm.com/support/docview.wss?uid=isg3T1020948 Third Party Advisory
http://www.ibm.com/support/docview.wss?uid=isg3T1020948 Broken Link
Changed Reference Type
http://www.ibm.com/support/docview.wss?uid=swg21676793 Third Party Advisory
http://www.ibm.com/support/docview.wss?uid=swg21676793 Broken Link
Changed Reference Type
http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html Patch, Third Party Advisory
http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html Third Party Advisory
Changed Reference Type
http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html Patch, Third Party Advisory
http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html Third Party Advisory
Changed Reference Type
http://www.securityfocus.com/archive/1/534161/100/0/threaded Third Party Advisory, VDB Entry
http://www.securityfocus.com/archive/1/534161/100/0/threaded Not Applicable
Changed Reference Type
https://cert-portal.siemens.com/productcert/pdf/ssa-234763.pdf No Types Assigned
https://cert-portal.siemens.com/productcert/pdf/ssa-234763.pdf Third Party Advisory