7.5
CVSSv3

CVE-2016-2183

Published: 01/09/2016 Updated: 12/02/2023
CVSS v2 Base Score: 5 | Impact Score: 2.9 | Exploitability Score: 10
CVSS v3 Base Score: 7.5 | Impact Score: 3.6 | Exploitability Score: 3.9
VMScore: 448
Vector: AV:N/AC:L/Au:N/C:P/I:N/A:N

Vulnerability Summary

The DES and Triple DES ciphers, as used in the TLS, SSH, and IPSec protocols and other protocols and products, have a birthday bound of approximately four billion blocks, which makes it easier for remote malicious users to obtain cleartext data via a birthday attack against a long-duration encrypted session, as demonstrated by an HTTPS session using Triple DES in CBC mode, aka a "Sweet32" attack.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

redhat enterprise linux 7.0

redhat enterprise linux 6.0

redhat jboss enterprise application platform 6.0.0

redhat jboss enterprise web server 2.0.0

redhat enterprise linux 5.0

redhat jboss enterprise web server 1.0.0

redhat jboss web server 3.0

python python

cisco content security management appliance 9.7.0-006

cisco content security management appliance 9.6.6-068

openssl openssl 1.0.1m

openssl openssl 1.0.2a

openssl openssl 1.0.1j

openssl openssl 1.0.1h

openssl openssl 1.0.2e

openssl openssl 1.0.1r

openssl openssl 1.0.2b

openssl openssl 1.0.1c

openssl openssl 1.0.1g

openssl openssl 1.0.1a

openssl openssl 1.0.2h

openssl openssl 1.0.1d

openssl openssl 1.0.1t

openssl openssl 1.0.2c

openssl openssl 1.0.1p

openssl openssl 1.0.1k

openssl openssl 1.0.1b

openssl openssl 1.0.1n

openssl openssl 1.0.1q

openssl openssl 1.0.1e

openssl openssl 1.0.1l

openssl openssl 1.0.1f

openssl openssl 1.0.1o

openssl openssl 1.0.2f

openssl openssl 1.0.1i

openssl openssl 1.0.2d

oracle database 12.1.0.2

oracle database 11.2.0.4

nodejs node.js

Vendor Advisories

Several security issues were fixed in OpenJDK 8 ...
USN-3087-1 introduced a regression in OpenSSL ...
Several security issues were fixed in OpenSSL ...
Several security issues were fixed in OpenJDK 7 ...
Several security issues were fixed in OpenJDK 6 ...
Several security issues were fixed in NSS ...
Several security issues were fixed in NSS ...
It was discovered that OpenSSL did not always use constant time operations when computing Digital Signature Algorithm (DSA) signatures A local attacker could possibly use this flaw to obtain a private DSA key belonging to another user or service running on the same system (CVE-2016-2178) It was discovered that the Datagram TLS (DTLS) implementati ...
It was discovered that the RMI registry and DCG implementations in the RMI component of OpenJDK performed deserialization of untrusted inputs A remote attacker could possibly use this flaw to execute arbitrary code with the privileges of RMI registry or a Java RMI application (CVE-2017-3241) This issue was addressed by introducing whitelists of c ...
A flaw was found in the way the DES/3DES cipher was used as part of the TLS/SSL protocol A man-in-the-middle attacker could use this flaw to recover some plaintext data by capturing large amounts of encrypted traffic between TLS/SSL server and client if the communication used a DES/3DES based ciphersuite ...
Synopsis Important: OpenShift Container Platform 4616 security and bug fix update Type/Severity Security Advisory: Important Topic Red Hat OpenShift Container Platform release 4616 is now available withupdates to packages and images that fix several bugsRed Hat Product Security has rated this update as ...
Synopsis Moderate: OpenShift Container Platform 4513 openshift-enterprise-console-container security update Type/Severity Security Advisory: Moderate Topic An update for openshift-enterprise-console-container is now available for Red Hat OpenShift Container Platform 45Red Hat Product Security has rated ...
Synopsis Moderate: Red Hat Quay 302 security and bug fix update Type/Severity Security Advisory: Moderate Topic An update is now available for Red Hat Quay 3Red Hat Product Security has rated this update as having a security impactof Moderate A Common Vulnerability Scoring System (CVSS) base score, whic ...
Synopsis Moderate: python security update Type/Severity Security Advisory: Moderate Topic An update for python is now available for Red Hat Enterprise Linux 7Red Hat Product Security has rated this update as having a security impact of Moderate A Common Vulnerability Scoring System (CVSS) base score, whic ...
Synopsis Moderate: java-180-ibm security update Type/Severity Security Advisory: Moderate Topic An update for java-180-ibm is now available for Red Hat Enterprise Linux 6 Supplementary and Red Hat Enterprise Linux 7 SupplementaryRed Hat Product Security has rated this update as having a security impact ...
Synopsis Important: Red Hat JBoss Core Services security update Type/Severity Security Advisory: Important Topic An update is now available for JBoss Core Services on Red Hat Enterprise Linux 7Red Hat Product Security has rated this update as having a security impact of Important A Common Vulnerability Sc ...
Synopsis Important: Red Hat JBoss Core Services security update Type/Severity Security Advisory: Important Topic An update is now available for Red Hat JBoss Core ServicesRed Hat Product Security has rated this update as having a security impact of Important A Common Vulnerability Scoring System (CVSS) ba ...
Synopsis Moderate: OpenShift Container Platform 4118 security update Type/Severity Security Advisory: Moderate Topic An update for golang-github-openshift-oauth-proxy-container is now available for Red Hat OpenShift Container Platform 41Red Hat Product Security has rated this update as having a security ...
Synopsis Moderate: OpenShift Container Platform 311 security update Type/Severity Security Advisory: Moderate Topic Red Hat OpenShift Container Platform release 311170 is now available withupdates to packages and images that fix several bugsRed Hat Product Security has rated this update as having a secu ...
Synopsis Critical: java-170-ibm security update Type/Severity Security Advisory: Critical Topic An update for java-170-ibm is now available for Red Hat Enterprise Linux 5SupplementaryRed Hat Product Security has rated this update as having a security impact ofCritical A Common Vulnerability Scoring Sy ...
Synopsis Moderate: java-171-ibm security update Type/Severity Security Advisory: Moderate Topic An update for java-171-ibm is now available for Red HatSatellite 57 and Red Hat Satellite 56Red Hat Product Security has rated this update as having a security impact of Moderate A Common Vulnerability Sc ...
Synopsis Important: Red Hat JBoss Enterprise Application Platform 6418 security update Type/Severity Security Advisory: Important Topic An update is now available for Red Hat JBoss Enterprise Application Platform 64 for RHEL 6 and Red Hat JBoss Enterprise Application Platform 64 for RHEL 7Red Hat Produ ...
Synopsis Critical: java-171-ibm security update Type/Severity Security Advisory: Critical Topic An update for java-171-ibm is now available for Red Hat Enterprise Linux 6 Supplementary and Red Hat Enterprise Linux 7 SupplementaryRed Hat Product Security has rated this update as having a security impact ...
Synopsis Critical: java-170-openjdk security update Type/Severity Security Advisory: Critical Topic An update for java-170-openjdk is now available for Red Hat Enterprise Linux5, Red Hat Enterprise Linux 6, and Red Hat Enterprise Linux 7Red Hat Product Security has rated this update as having a securit ...
Synopsis Critical: java-180-oracle security update Type/Severity Security Advisory: Critical Topic An update for java-180-oracle is now available for Oracle Java for Red Hat Enterprise Linux 6 and Oracle Java for Red Hat Enterprise Linux 7Red Hat Product Security has rated this update as having a secur ...
Synopsis Critical: java-160-sun security update Type/Severity Security Advisory: Critical Topic An update for java-160-sun is now available for Oracle Java for Red Hat Enterprise Linux 5, Oracle Java for Red Hat Enterprise Linux 6, and Oracle Java for Red Hat Enterprise Linux 7Red Hat Product Security ...
Synopsis Important: Red Hat JBoss Web Server security and bug fix update Type/Severity Security Advisory: Important Topic An update is now available for Red Hat JBoss Enterprise Web Server 212 for RHEL 6 and Red Hat JBoss Enterprise Web Server 212 for RHEL 7Red Hat Product Security has rated this updat ...
Synopsis Critical: java-180-openjdk security update Type/Severity Security Advisory: Critical Topic An update for java-180-openjdk is now available for Red Hat Enterprise Linux 6 and Red Hat Enterprise Linux 7Red Hat Product Security has rated this update as having a security impact of Critical A Comm ...
Synopsis Important: Red Hat JBoss Enterprise Application Platform 6418 security update Type/Severity Security Advisory: Important Topic An update is now available for Red Hat JBoss Enterprise Application PlatformRed Hat Product Security has rated this update as having a security impact of Important A Co ...
Synopsis Important: Red Hat JBoss Core Services security update Type/Severity Security Advisory: Important Topic An update is now available for JBoss Core Services on Red Hat Enterprise Linux 6Red Hat Product Security has rated this update as having a security impact of Important A Common Vulnerability Sc ...
Synopsis Critical: java-170-oracle security update Type/Severity Security Advisory: Critical Topic An update for java-170-oracle is now available for Oracle Java for Red Hat Enterprise Linux 5, Oracle Java for Red Hat Enterprise Linux 6, and Oracle Java for Red Hat Enterprise Linux 7Red Hat Product Sec ...
Synopsis Critical: java-160-ibm security update Type/Severity Security Advisory: Critical Topic An update for java-160-ibm is now available for Red Hat Enterprise Linux 5Supplementary and Red Hat Enterprise Linux 6 SupplementaryRed Hat Product Security has rated this update as having a security impact ...
Synopsis Important: openssl security update Type/Severity Security Advisory: Important Topic An update for openssl is now available for Red Hat Enterprise Linux 6 and Red Hat Enterprise Linux 7Red Hat Product Security has rated this update as having a security impact of Important A Common Vulnerability Sc ...
Synopsis Important: Red Hat JBoss Web Server security and bug fix update Type/Severity Security Advisory: Important Topic An update is now available for Red Hat JBoss Enterprise Web Server 212Red Hat Product Security has rated this update as having a security impact of Important A Common Vulnerability S ...
On September 22, 2016, the OpenSSL Software Foundation released an advisory that describes 14 vulnerabilities Of these 14 vulnerabilities, the OpenSSL Software Foundation classifies one as “Critical Severity,” one as “Moderate Severity,” and the other 12 as “Low Severity” Subsequently, on September 26, the OpenSSL Software Foundatio ...
SWEET32 (sweet32info) is an attack on older block cipher algorithms that use a block size of 64 bits In mitigation for the SWEET32 attack DES based ciphersuites have been moved from the HIGH cipherstring group to MEDIUM ...
Log Correlation Engine (LCE) 500 is impacted by multiple vulnerabilities reported in a third-party library and an encryption algorithm LCE was errantly using 3DES on TCP port 1243 The following vulnerabilities have been resolved with the updated libraries cURL / libcurl lib/urlc allocate_conn() Function OCSP Stapling Validation Failure MitM ...
Nessus is potentially impacted by several vulnerabilities in OpenSSL (20160926) that were recently disclosed and fixed Note that due to the time involved in doing a full analysis of each issue, Tenable has opted to upgrade the included version of OpenSSL as a precaution, and to save time These vulnerabilities may impact Nessus and include: CVE-2 ...
LCE 481 is possibly impacted by multiple vulnerabilities reported in third-party libraries Tenable has not investigated each one to determine if it is exploitable or the vulnerable code path can be reached Instead, Dev has upgraded the impacted libraries as a faster and safer alternative Due to the number of library upgrades and the potential ...
Tenable's Passive Vulnerability Scanner (PVS) uses third-party libraries to provide certain standardized functionality Four of these libraries were found to contain vulnerabilities and were fixed upstream Those fixes have been integrated despite there being no known exploitation scenarios related to PVS OpenSSL ssl/statem/statemc read_state_ma ...

Exploits

IBM Informix Dynamic Server suffers from dll injection, PHP code injection, and heap buffer overflow vulnerabilities ...
Orion Elite Hidden IP Browser Pro versions 10 through 79 have insecure versions of Tor and OpenSSL included and also suffer from man-in-the-middle vulnerabilities ...

Github Repositories

Support This is a community project and while you will see contributions from the Deep Security team, there is no official Trend Micro support for this project The official documentation for the Deep Security APIs is available from the Trend Micro Online Help Centre Tutorials, feature-specific help, and other information about Deep Security is available from the Deep Security

An asynchronous, non-blocking shadowsocks client and server written in Perl.

NAME Net::Shadowsocks - the asynchronous, non-blocking shadowsocks client and server VERSION Version 0934 SYNOPSIS DESCRIPTION Shadowsocks is a secure transport protocol based on SOCKS Protocol Version 5 (RFC 1928 )Net::Shadowsocks is a Perl implementation of the shadowsocks (Chinese: 影梭) protocol client and server ssclientpl is the asynchronous, non-blocking shadows

DES encryption/decryption for SML

DESMOS An implementation of DES encryption/decryption for SML (written specifically for Moscow ML, may or may not work with other dialects) Fulfills Ronald Rivest's correctness test for DES implementations This code was written as an assignment for the course Data Security at the IT University of Copenhagen in the Fall 2003 semester, and includes a short report in Danish

Python implemented batch nmap scanning, the target is different ports of different ips

Nmap-based-batch-vulnerability-scanning 脚本仅供交流学习或进行被授权的扫描,禁止用于未授权扫描他人资产!随意使用有触犯法律的风险,请遵守法律法规,违反法律责任自负! Python implemented batch nmap scanning, the target is different ports of different ips(ip:port) 注意: 脚本基于nmap,务必安装nmap且加入环

Scripts used to combine Qualys scans and Trend Micro Deep Security recommendation scan results into reports.

Support This is a community project and while you will see contributions from the Deep Security team, there is no official Trend Micro support for this project The official documentation for the Deep Security APIs is available from the Trend Micro Online Help Centre Tutorials, feature-specific help, and other information about Deep Security is available from the Deep Security

Python implemented batch nmap scanning, the target is different ports of different ips

Nmap-based-batch-vulnerability-scanning 脚本仅供交流学习或进行被授权的扫描,禁止用于未授权扫描他人资产!随意使用有触犯法律的风险,请遵守法律法规,违反法律责任自负! Python implemented batch nmap scanning, the target is different ports of different ips(ip:port) 注意: 脚本基于nmap,务必安装nmap且加入环

Cipher TLS removing vulnerabilities from openvas

Remove cipher from Rocky Linux and RHEL 8 List Policy update-crypto-policies --show Create sub policy to disable CBC vim /etc/crypto-policies/policies/modules/DISABLE-CBCpmod Removing CBC tls_cipher = -AES-256-CBC -AES-128-CBC cipher = -AES-128-CBC -AES-256-CBC -CAMELLIA-256-CBC -CAMELLIA-128-CBC ss

Performance comparison between CBC-DES, CBC-TDES, CBC-AES128, CBC-AES192, CBC-AES256, Ascon-128, Ascon-128a, and Ascon-80pq.

Crypto Performance comparison between CBC-DES, CBC-TDES, CBC-AES128, CBC-AES192, and CBC-AES256 Performance is measured in Python 392 and the encryption algorithms are implemented in PyCryptodome 3150 The results are given in microseconds as an average of 1000000 runs using 1000 different keys The test was performed on a Raspberry Pi 4 Model B with 8GB of RAM and a SanDi

lineBOT 注意事項 1當開發者架設LINE Messaging API的Webhook伺服器時,只能使用 https 協定 a HTTPS伺服器所使用的根憑證(Root CA)必須是在LINE平台的白名單列表中,否則LINE平台會拒絕傳送訊息。 在白名單列表中大多數的憑證都需要付費申請,但是LINE平台也支援常用的免費憑證,例如Let&rsquo

Recent Articles

Before you slink off to the pub, be sure to patch these 19 serious vulns in Juniper Networks kit
The Register • Richard Chirgwin • 10 Jan 2019

Happy New Year from the Gin Palace

Juniper Networks has had its first big bug day in months, with 19 patches announced covering everything from third-party package catchups to critical errors in password handling. For the sake of organisation, let's pick up patches in the Junos OS first (there being so many patches, The Register will focus on those rated "High" and "Critical"). First on the critical list is CVE-2019-0006, which affects Junos OS 14.1X53, 15.1, and 15.1X53 running on EX, QFX and MX units. A crafted HTTP packet can ...

References

CWE-200https://bugzilla.redhat.com/show_bug.cgi?id=1369383https://www.openssl.org/blog/blog/2016/08/24/sweet32/https://access.redhat.com/articles/2548661https://www.ietf.org/mail-archive/web/tls/current/msg04560.htmlhttps://www.nccgroup.trust/us/about-us/newsroom-and-events/blog/2016/august/new-practical-attacks-on-64-bit-block-ciphers-3des-blowfish/https://github.com/ssllabs/ssllabs-scan/issues/387#issuecomment-242514633https://blog.cryptographyengineering.com/2016/08/24/attack-of-week-64-bit-ciphers-in-tls/https://www.sigsac.org/ccs/CCS2016/accepted-papers/https://www.teskalabs.com/blog/teskalabs-bulletin-160826-seacat-sweet32-issuehttps://access.redhat.com/security/cve/cve-2016-2183https://nakedsecurity.sophos.com/2016/08/25/anatomy-of-a-cryptographic-collision-the-sweet32-attack/https://sweet32.info/http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00013.htmlhttps://nodejs.org/en/blog/vulnerability/september-2016-security-releases/https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05302448https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05309984http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.htmlhttp://www.oracle.com/technetwork/topics/security/ovmbulletinoct2016-3090547.htmlhttp://www.oracle.com/technetwork/topics/security/linuxbulletinoct2016-3090545.htmlhttps://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05323116http://www.securityfocus.com/bid/92630https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05349499https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05356388http://www.splunk.com/view/SP-CAAAPUEhttp://www.splunk.com/view/SP-CAAAPSVhttps://security.gentoo.org/glsa/201612-16https://kc.mcafee.com/corporate/index?page=content&id=SB10171https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA40312https://bto.bluecoat.com/security-advisory/sa133http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10759https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05369403http://www.securityfocus.com/bid/95568https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05369415https://www.tenable.com/security/tns-2016-16http://www-01.ibm.com/support/docview.wss?uid=swg21995039http://www-01.ibm.com/support/docview.wss?uid=swg21991482http://www-01.ibm.com/support/docview.wss?uid=nas8N1021697https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05385680https://security.gentoo.org/glsa/201701-65https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390849https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03725en_ushttps://security.gentoo.org/glsa/201707-01http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.htmlhttps://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbgn03765en_ushttp://www.securitytracker.com/id/1036696http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.htmlhttps://www.tenable.com/security/tns-2017-09https://www.tenable.com/security/tns-2016-21https://www.tenable.com/security/tns-2016-20https://security.netapp.com/advisory/ntap-20170119-0001/https://security.netapp.com/advisory/ntap-20160915-0001/https://access.redhat.com/errata/RHSA-2017:3240https://access.redhat.com/errata/RHSA-2017:3239https://access.redhat.com/errata/RHSA-2017:3114https://access.redhat.com/errata/RHSA-2017:3113https://access.redhat.com/errata/RHSA-2017:2710https://access.redhat.com/errata/RHSA-2017:2709https://access.redhat.com/errata/RHSA-2017:2708https://access.redhat.com/errata/RHSA-2017:1216http://rhn.redhat.com/errata/RHSA-2017-0462.htmlhttp://rhn.redhat.com/errata/RHSA-2017-0338.htmlhttp://rhn.redhat.com/errata/RHSA-2017-0337.htmlhttp://rhn.redhat.com/errata/RHSA-2017-0336.htmlhttp://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.htmlhttps://ics-cert.us-cert.gov/advisories/ICSMA-18-058-02http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.htmlhttps://access.redhat.com/errata/RHSA-2018:2123https://www.mitel.com/en-ca/support/security-advisories/mitel-product-security-advisory-17-0008https://access.redhat.com/errata/RHSA-2019:1245https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.htmlhttps://access.redhat.com/errata/RHSA-2019:2859https://www.oracle.com/security-alerts/cpujan2020.htmlhttps://access.redhat.com/errata/RHSA-2020:0451https://kc.mcafee.com/corporate/index?page=content&id=SB10310https://www.oracle.com/security-alerts/cpuapr2020.htmlhttps://www.oracle.com/security-alerts/cpujul2020.htmlhttps://www.oracle.com/security-alerts/cpuoct2020.htmlhttps://www.oracle.com/security-alerts/cpuoct2021.htmlhttp://www.ubuntu.com/usn/USN-3270-1https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c05369415http://lists.opensuse.org/opensuse-security-announce/2017-02/msg00028.htmlhttp://www.securityfocus.com/archive/1/archive/1/540341/100/0/threadedhttp://lists.opensuse.org/opensuse-security-announce/2017-01/msg00068.htmlhttps://seclists.org/bugtraq/2018/Nov/21http://lists.opensuse.org/opensuse-security-announce/2017-10/msg00010.htmlhttp://lists.opensuse.org/opensuse-security-announce/2016-10/msg00029.htmlhttps://www.arista.com/en/support/advisories-notices/security-advisories/1749-security-advisory-24http://www.ubuntu.com/usn/USN-3372-1http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00012.htmlhttp://seclists.org/fulldisclosure/2017/May/105https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c05385680https://softwaresupport.softwaregrp.com/document/-/facetsearch/document/KM03158613https://wiki.opendaylight.org/view/Security_Advisorieshttp://www.ubuntu.com/usn/USN-3087-2http://www.securityfocus.com/archive/1/archive/1/542005/100/0/threadedhttp://lists.opensuse.org/opensuse-security-announce/2017-02/msg00003.htmlhttp://lists.opensuse.org/opensuse-security-announce/2016-10/msg00011.htmlhttp://www.ubuntu.com/usn/USN-3087-1http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00031.htmlhttp://www.ubuntu.com/usn/USN-3194-1http://www.ubuntu.com/usn/USN-3179-1http://www.ubuntu.com/usn/USN-3198-1http://seclists.org/fulldisclosure/2017/Jul/31http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00021.htmlhttps://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c05369403http://lists.opensuse.org/opensuse-security-announce/2017-02/msg00032.htmlhttp://lists.opensuse.org/opensuse-security-announce/2016-09/msg00022.htmlhttp://www.securityfocus.com/archive/1/archive/1/541104/100/0/threadedhttp://www.securityfocus.com/archive/1/archive/1/539885/100/0/threadedhttp://lists.opensuse.org/opensuse-security-announce/2017-02/msg00023.htmlhttps://kc.mcafee.com/corporate/index?page=content&id=SB10215http://www.securityfocus.com/archive/1/539885/100/0/threadedhttp://lists.opensuse.org/opensuse-security-announce/2016-10/msg00005.htmlhttp://www.securityfocus.com/archive/1/542005/100/0/threadedhttps://support.f5.com/csp/article/K13167034https://www.exploit-db.com/exploits/42091/http://www.securityfocus.com/archive/1/archive/1/540129/100/0/threadedhttps://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c05390849http://www.debian.org/security/2016/dsa-3673http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00024.htmlhttp://www.securityfocus.com/archive/1/541104/100/0/threadedhttps://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c05390722https://kc.mcafee.com/corporate/index?page=content&id=SB10186http://packetstormsecurity.com/files/142756/IBM-Informix-Dynamic-Server-DLL-Injection-Code-Execution.htmlhttp://lists.opensuse.org/opensuse-security-announce/2018-02/msg00032.htmlhttps://softwaresupport.softwaregrp.com/document/-/facetsearch/document/KM03286178http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00023.htmlhttp://www.huawei.com/en/psirt/security-advisories/huawei-sa-20170322-01-openssl-enhttps://kc.mcafee.com/corporate/index?page=content&id=SB10197http://lists.opensuse.org/opensuse-security-announce/2017-05/msg00076.htmlhttp://lists.opensuse.org/opensuse-security-announce/2017-10/msg00011.htmlhttps://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c05302448http://www.securityfocus.com/archive/1/540341/100/0/threadedhttps://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdfhttps://nvd.nist.govhttps://www.theregister.co.uk/2019/01/10/juniper_january_2019_patch_day/https://usn.ubuntu.com/3179-1/https://www.cisa.gov/uscert/ics/advisories/icsa-22-160-01