U.S. flag   An official website of the United States government
Dot gov

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Https

Secure .gov websites use HTTPS
A lock (Dot gov) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.

Vulnerability Change Records for CVE-2015-8960

Change History

Modified Analysis by NIST 1/30/2023 12:33:01 PM

Action Type Old Value New Value
Added CPE Configuration

								
							
							
						
OR
     *cpe:2.3:a:netapp:clustered_data_ontap_antivirus_connector:-:*:*:*:*:*:*:*
     *cpe:2.3:a:netapp:data_ontap_edge:-:*:*:*:*:*:*:*
     *cpe:2.3:a:netapp:host_agent:-:*:*:*:*:*:*:*
     *cpe:2.3:a:netapp:oncommand_shift:-:*:*:*:*:*:*:*
     *cpe:2.3:a:netapp:plug-in_for_symantec_netbackup:-:*:*:*:*:*:*:*
     *cpe:2.3:a:netapp:smi-s_provider:-:*:*:*:*:*:*:*
     *cpe:2.3:a:netapp:snap_creator_framework:-:*:*:*:*:*:*:*
     *cpe:2.3:a:netapp:snapdrive:-:*:*:*:*:unix:*:*
     *cpe:2.3:a:netapp:snapdrive:-:*:*:*:*:windows:*:*
     *cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:oracle:*:*
     *cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:sap:*:*
     *cpe:2.3:a:netapp:snapprotect:-:*:*:*:*:*:*:*
     *cpe:2.3:a:netapp:solidfire_\&_hci_management_node:-:*:*:*:*:*:*:*
     *cpe:2.3:a:netapp:system_setup:-:*:*:*:*:*:*:*
Changed CPE Configuration
OR
     *cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*
     *cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*
     *cpe:2.3:a:microsoft:internet_explorer:*:*:*:*:*:*:*:*
     *cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
     *cpe:2.3:a:opera:opera:*:*:*:*:*:*:*:*
AND
     OR
          *cpe:2.3:a:ietf:transport_layer_security:*:*:*:*:*:*:*:* versions up to (including) 1.2
     OR
          cpe:2.3:a:apple:safari:-:*:*:*:*:*:*:*
          cpe:2.3:a:google:chrome:-:*:*:*:*:*:*:*
          cpe:2.3:a:microsoft:internet_explorer:-:*:*:*:*:*:*:*
          cpe:2.3:a:mozilla:firefox:-:*:*:*:*:*:*:*
          cpe:2.3:a:opera:opera_browser:-:*:*:*:*:*:*:*
Removed CVSS V3
NIST AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H

								
						
Added CVSS V3.1

								
							
							
						
NIST AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
Added CWE

								
							
							
						
NIST CWE-295
Removed CWE
NIST CWE-310

								
						
Changed Reference Type
http://twitter.com/matthew_d_green/statuses/630908726950674433 Press/Media Coverage
http://twitter.com/matthew_d_green/statuses/630908726950674433 Press/Media Coverage, Technical Description, Third Party Advisory
Changed Reference Type
http://www.openwall.com/lists/oss-security/2016/09/20/4 Mailing List, Third Party Advisory
http://www.openwall.com/lists/oss-security/2016/09/20/4 Mailing List, Technical Description, Third Party Advisory
Changed Reference Type
http://www.securityfocus.com/bid/93071 No Types Assigned
http://www.securityfocus.com/bid/93071 Broken Link, Third Party Advisory, VDB Entry
Changed Reference Type
https://kcitls.org Technical Description
https://kcitls.org Exploit, Technical Description
Changed Reference Type
https://security.netapp.com/advisory/ntap-20180626-0002/ No Types Assigned
https://security.netapp.com/advisory/ntap-20180626-0002/ Third Party Advisory
Changed Reference Type
https://www.usenix.org/system/files/conference/woot15/woot15-paper-hlauschek.pdf Technical Description
https://www.usenix.org/system/files/conference/woot15/woot15-paper-hlauschek.pdf Exploit, Mitigation, Technical Description