{
  "document": {
    "aggregate_severity": {
      "text": "High"
    },
    "category": "csaf_vex",
    "csaf_version": "2.0",
    "distribution": {
      "text": "TuxCare License Agreement",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "publisher": {
      "category": "vendor",
      "contact_details": "https://tuxcare.com/contact/",
      "name": "TuxCare",
      "namespace": "https://tuxcare.com/"
    },
    "references": [
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.tuxcare.com/csaf/v2/els_os/centos7els/vex/2014/cve-2014-0224-els_os-centos7els.json"
      }
    ],
    "title": "Security update on CVE-2014-0224",
    "tracking": {
      "current_release_date": "2025-12-23T20:55:41Z",
      "generator": {
        "date": "2025-12-23T20:55:41Z",
        "engine": {
          "name": "pyCSAF"
        }
      },
      "id": "CVE-2014-0224-ELS_OS-CENTOS7ELS",
      "initial_release_date": "2014-06-05T21:55:00Z",
      "revision_history": [
        {
          "date": "2014-06-05T21:55:00Z",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2025-10-16T19:12:33Z",
          "number": "2",
          "summary": "Official Publication"
        },
        {
          "date": "2025-11-29T10:40:21Z",
          "number": "3",
          "summary": "Update document"
        },
        {
          "date": "2025-12-23T20:55:41Z",
          "number": "4",
          "summary": "Update document"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Community Enterprise Operating System 7",
                "product": {
                  "name": "Community Enterprise Operating System 7",
                  "product_id": "CentOS-7",
                  "product_identification_helper": {
                    "cpe": "cpe:2.3:o:centos:centos:7:*:*:*:*:*:*:*"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Community Enterprise Operating System"
          }
        ],
        "category": "vendor",
        "name": "Red Hat, Inc."
      },
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_version",
                "name": "openssl-1:1.0.2k-26.el7_9.tuxcare.els1.x86_64",
                "product": {
                  "name": "openssl-1:1.0.2k-26.el7_9.tuxcare.els1.x86_64",
                  "product_id": "openssl-1:1.0.2k-26.el7_9.tuxcare.els1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/tuxcare/openssl@1.0.2k-26.el7_9.tuxcare.els1?arch=x86_64&epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openssl-1:1.0.2k-26.el7_9.tuxcare.els2.x86_64",
                "product": {
                  "name": "openssl-1:1.0.2k-26.el7_9.tuxcare.els2.x86_64",
                  "product_id": "openssl-1:1.0.2k-26.el7_9.tuxcare.els2.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/tuxcare/openssl@1.0.2k-26.el7_9.tuxcare.els2?arch=x86_64&epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openssl-1:1.0.2k-26.el7_9.tuxcare.els3.x86_64",
                "product": {
                  "name": "openssl-1:1.0.2k-26.el7_9.tuxcare.els3.x86_64",
                  "product_id": "openssl-1:1.0.2k-26.el7_9.tuxcare.els3.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/tuxcare/openssl@1.0.2k-26.el7_9.tuxcare.els3?arch=x86_64&epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openssl-1:1.0.2k-26.el7_9.tuxcare.els4.x86_64",
                "product": {
                  "name": "openssl-1:1.0.2k-26.el7_9.tuxcare.els4.x86_64",
                  "product_id": "openssl-1:1.0.2k-26.el7_9.tuxcare.els4.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/tuxcare/openssl@1.0.2k-26.el7_9.tuxcare.els4?arch=x86_64&epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openssl-1:1.0.2k-26.el7_9.tuxcare.els5.x86_64",
                "product": {
                  "name": "openssl-1:1.0.2k-26.el7_9.tuxcare.els5.x86_64",
                  "product_id": "openssl-1:1.0.2k-26.el7_9.tuxcare.els5.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/tuxcare/openssl@1.0.2k-26.el7_9.tuxcare.els5?arch=x86_64&epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openssl-1:1.0.2k-26.el7_9.tuxcare.els6.x86_64",
                "product": {
                  "name": "openssl-1:1.0.2k-26.el7_9.tuxcare.els6.x86_64",
                  "product_id": "openssl-1:1.0.2k-26.el7_9.tuxcare.els6.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/tuxcare/openssl@1.0.2k-26.el7_9.tuxcare.els6?arch=x86_64&epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openssl-devel-1:1.0.2k-26.el7_9.tuxcare.els3.x86_64",
                "product": {
                  "name": "openssl-devel-1:1.0.2k-26.el7_9.tuxcare.els3.x86_64",
                  "product_id": "openssl-devel-1:1.0.2k-26.el7_9.tuxcare.els3.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/tuxcare/openssl-devel@1.0.2k-26.el7_9.tuxcare.els3?arch=x86_64&epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openssl-devel-1:1.0.2k-26.el7_9.tuxcare.els4.x86_64",
                "product": {
                  "name": "openssl-devel-1:1.0.2k-26.el7_9.tuxcare.els4.x86_64",
                  "product_id": "openssl-devel-1:1.0.2k-26.el7_9.tuxcare.els4.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/tuxcare/openssl-devel@1.0.2k-26.el7_9.tuxcare.els4?arch=x86_64&epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openssl-devel-1:1.0.2k-26.el7_9.tuxcare.els5.x86_64",
                "product": {
                  "name": "openssl-devel-1:1.0.2k-26.el7_9.tuxcare.els5.x86_64",
                  "product_id": "openssl-devel-1:1.0.2k-26.el7_9.tuxcare.els5.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/tuxcare/openssl-devel@1.0.2k-26.el7_9.tuxcare.els5?arch=x86_64&epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openssl-devel-1:1.0.2k-26.el7_9.tuxcare.els6.x86_64",
                "product": {
                  "name": "openssl-devel-1:1.0.2k-26.el7_9.tuxcare.els6.x86_64",
                  "product_id": "openssl-devel-1:1.0.2k-26.el7_9.tuxcare.els6.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/tuxcare/openssl-devel@1.0.2k-26.el7_9.tuxcare.els6?arch=x86_64&epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openssl-libs-1:1.0.2k-26.el7_9.tuxcare.els3.x86_64",
                "product": {
                  "name": "openssl-libs-1:1.0.2k-26.el7_9.tuxcare.els3.x86_64",
                  "product_id": "openssl-libs-1:1.0.2k-26.el7_9.tuxcare.els3.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/tuxcare/openssl-libs@1.0.2k-26.el7_9.tuxcare.els3?arch=x86_64&epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openssl-libs-1:1.0.2k-26.el7_9.tuxcare.els4.x86_64",
                "product": {
                  "name": "openssl-libs-1:1.0.2k-26.el7_9.tuxcare.els4.x86_64",
                  "product_id": "openssl-libs-1:1.0.2k-26.el7_9.tuxcare.els4.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/tuxcare/openssl-libs@1.0.2k-26.el7_9.tuxcare.els4?arch=x86_64&epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openssl-libs-1:1.0.2k-26.el7_9.tuxcare.els5.x86_64",
                "product": {
                  "name": "openssl-libs-1:1.0.2k-26.el7_9.tuxcare.els5.x86_64",
                  "product_id": "openssl-libs-1:1.0.2k-26.el7_9.tuxcare.els5.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/tuxcare/openssl-libs@1.0.2k-26.el7_9.tuxcare.els5?arch=x86_64&epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openssl-libs-1:1.0.2k-26.el7_9.tuxcare.els6.x86_64",
                "product": {
                  "name": "openssl-libs-1:1.0.2k-26.el7_9.tuxcare.els6.x86_64",
                  "product_id": "openssl-libs-1:1.0.2k-26.el7_9.tuxcare.els6.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/tuxcare/openssl-libs@1.0.2k-26.el7_9.tuxcare.els6?arch=x86_64&epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openssl-perl-1:1.0.2k-26.el7_9.tuxcare.els3.x86_64",
                "product": {
                  "name": "openssl-perl-1:1.0.2k-26.el7_9.tuxcare.els3.x86_64",
                  "product_id": "openssl-perl-1:1.0.2k-26.el7_9.tuxcare.els3.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/tuxcare/openssl-perl@1.0.2k-26.el7_9.tuxcare.els3?arch=x86_64&epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openssl-perl-1:1.0.2k-26.el7_9.tuxcare.els4.x86_64",
                "product": {
                  "name": "openssl-perl-1:1.0.2k-26.el7_9.tuxcare.els4.x86_64",
                  "product_id": "openssl-perl-1:1.0.2k-26.el7_9.tuxcare.els4.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/tuxcare/openssl-perl@1.0.2k-26.el7_9.tuxcare.els4?arch=x86_64&epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openssl-perl-1:1.0.2k-26.el7_9.tuxcare.els5.x86_64",
                "product": {
                  "name": "openssl-perl-1:1.0.2k-26.el7_9.tuxcare.els5.x86_64",
                  "product_id": "openssl-perl-1:1.0.2k-26.el7_9.tuxcare.els5.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/tuxcare/openssl-perl@1.0.2k-26.el7_9.tuxcare.els5?arch=x86_64&epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openssl-perl-1:1.0.2k-26.el7_9.tuxcare.els6.x86_64",
                "product": {
                  "name": "openssl-perl-1:1.0.2k-26.el7_9.tuxcare.els6.x86_64",
                  "product_id": "openssl-perl-1:1.0.2k-26.el7_9.tuxcare.els6.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/tuxcare/openssl-perl@1.0.2k-26.el7_9.tuxcare.els6?arch=x86_64&epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openssl-static-1:1.0.2k-26.el7_9.tuxcare.els3.x86_64",
                "product": {
                  "name": "openssl-static-1:1.0.2k-26.el7_9.tuxcare.els3.x86_64",
                  "product_id": "openssl-static-1:1.0.2k-26.el7_9.tuxcare.els3.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/tuxcare/openssl-static@1.0.2k-26.el7_9.tuxcare.els3?arch=x86_64&epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openssl-static-1:1.0.2k-26.el7_9.tuxcare.els4.x86_64",
                "product": {
                  "name": "openssl-static-1:1.0.2k-26.el7_9.tuxcare.els4.x86_64",
                  "product_id": "openssl-static-1:1.0.2k-26.el7_9.tuxcare.els4.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/tuxcare/openssl-static@1.0.2k-26.el7_9.tuxcare.els4?arch=x86_64&epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openssl-static-1:1.0.2k-26.el7_9.tuxcare.els5.x86_64",
                "product": {
                  "name": "openssl-static-1:1.0.2k-26.el7_9.tuxcare.els5.x86_64",
                  "product_id": "openssl-static-1:1.0.2k-26.el7_9.tuxcare.els5.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/tuxcare/openssl-static@1.0.2k-26.el7_9.tuxcare.els5?arch=x86_64&epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openssl-static-1:1.0.2k-26.el7_9.tuxcare.els6.x86_64",
                "product": {
                  "name": "openssl-static-1:1.0.2k-26.el7_9.tuxcare.els6.x86_64",
                  "product_id": "openssl-static-1:1.0.2k-26.el7_9.tuxcare.els6.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/tuxcare/openssl-static@1.0.2k-26.el7_9.tuxcare.els6?arch=x86_64&epoch=1"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "openssl-devel-1:1.0.2k-26.el7_9.tuxcare.els3.i686",
                "product": {
                  "name": "openssl-devel-1:1.0.2k-26.el7_9.tuxcare.els3.i686",
                  "product_id": "openssl-devel-1:1.0.2k-26.el7_9.tuxcare.els3.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/tuxcare/openssl-devel@1.0.2k-26.el7_9.tuxcare.els3?arch=i686&epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openssl-devel-1:1.0.2k-26.el7_9.tuxcare.els4.i686",
                "product": {
                  "name": "openssl-devel-1:1.0.2k-26.el7_9.tuxcare.els4.i686",
                  "product_id": "openssl-devel-1:1.0.2k-26.el7_9.tuxcare.els4.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/tuxcare/openssl-devel@1.0.2k-26.el7_9.tuxcare.els4?arch=i686&epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openssl-devel-1:1.0.2k-26.el7_9.tuxcare.els5.i686",
                "product": {
                  "name": "openssl-devel-1:1.0.2k-26.el7_9.tuxcare.els5.i686",
                  "product_id": "openssl-devel-1:1.0.2k-26.el7_9.tuxcare.els5.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/tuxcare/openssl-devel@1.0.2k-26.el7_9.tuxcare.els5?arch=i686&epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openssl-devel-1:1.0.2k-26.el7_9.tuxcare.els6.i686",
                "product": {
                  "name": "openssl-devel-1:1.0.2k-26.el7_9.tuxcare.els6.i686",
                  "product_id": "openssl-devel-1:1.0.2k-26.el7_9.tuxcare.els6.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/tuxcare/openssl-devel@1.0.2k-26.el7_9.tuxcare.els6?arch=i686&epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openssl-libs-1:1.0.2k-26.el7_9.tuxcare.els3.i686",
                "product": {
                  "name": "openssl-libs-1:1.0.2k-26.el7_9.tuxcare.els3.i686",
                  "product_id": "openssl-libs-1:1.0.2k-26.el7_9.tuxcare.els3.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/tuxcare/openssl-libs@1.0.2k-26.el7_9.tuxcare.els3?arch=i686&epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openssl-libs-1:1.0.2k-26.el7_9.tuxcare.els4.i686",
                "product": {
                  "name": "openssl-libs-1:1.0.2k-26.el7_9.tuxcare.els4.i686",
                  "product_id": "openssl-libs-1:1.0.2k-26.el7_9.tuxcare.els4.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/tuxcare/openssl-libs@1.0.2k-26.el7_9.tuxcare.els4?arch=i686&epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openssl-libs-1:1.0.2k-26.el7_9.tuxcare.els5.i686",
                "product": {
                  "name": "openssl-libs-1:1.0.2k-26.el7_9.tuxcare.els5.i686",
                  "product_id": "openssl-libs-1:1.0.2k-26.el7_9.tuxcare.els5.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/tuxcare/openssl-libs@1.0.2k-26.el7_9.tuxcare.els5?arch=i686&epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openssl-libs-1:1.0.2k-26.el7_9.tuxcare.els6.i686",
                "product": {
                  "name": "openssl-libs-1:1.0.2k-26.el7_9.tuxcare.els6.i686",
                  "product_id": "openssl-libs-1:1.0.2k-26.el7_9.tuxcare.els6.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/tuxcare/openssl-libs@1.0.2k-26.el7_9.tuxcare.els6?arch=i686&epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openssl-static-1:1.0.2k-26.el7_9.tuxcare.els3.i686",
                "product": {
                  "name": "openssl-static-1:1.0.2k-26.el7_9.tuxcare.els3.i686",
                  "product_id": "openssl-static-1:1.0.2k-26.el7_9.tuxcare.els3.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/tuxcare/openssl-static@1.0.2k-26.el7_9.tuxcare.els3?arch=i686&epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openssl-static-1:1.0.2k-26.el7_9.tuxcare.els4.i686",
                "product": {
                  "name": "openssl-static-1:1.0.2k-26.el7_9.tuxcare.els4.i686",
                  "product_id": "openssl-static-1:1.0.2k-26.el7_9.tuxcare.els4.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/tuxcare/openssl-static@1.0.2k-26.el7_9.tuxcare.els4?arch=i686&epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openssl-static-1:1.0.2k-26.el7_9.tuxcare.els5.i686",
                "product": {
                  "name": "openssl-static-1:1.0.2k-26.el7_9.tuxcare.els5.i686",
                  "product_id": "openssl-static-1:1.0.2k-26.el7_9.tuxcare.els5.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/tuxcare/openssl-static@1.0.2k-26.el7_9.tuxcare.els5?arch=i686&epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openssl-static-1:1.0.2k-26.el7_9.tuxcare.els6.i686",
                "product": {
                  "name": "openssl-static-1:1.0.2k-26.el7_9.tuxcare.els6.i686",
                  "product_id": "openssl-static-1:1.0.2k-26.el7_9.tuxcare.els6.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/tuxcare/openssl-static@1.0.2k-26.el7_9.tuxcare.els6?arch=i686&epoch=1"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "i686"
          }
        ],
        "category": "vendor",
        "name": "TuxCare"
      },
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_version",
                "name": "openssl-1:1.0.2k-26.el7_9.x86_64",
                "product": {
                  "name": "openssl-1:1.0.2k-26.el7_9.x86_64",
                  "product_id": "openssl-1:1.0.2k-26.el7_9.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/centos/openssl@1.0.2k-26.el7_9?arch=x86_64&epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openssl-devel-1:1.0.2k-26.el7_9.x86_64",
                "product": {
                  "name": "openssl-devel-1:1.0.2k-26.el7_9.x86_64",
                  "product_id": "openssl-devel-1:1.0.2k-26.el7_9.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/centos/openssl-devel@1.0.2k-26.el7_9?arch=x86_64&epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openssl-libs-1:1.0.2k-26.el7_9.x86_64",
                "product": {
                  "name": "openssl-libs-1:1.0.2k-26.el7_9.x86_64",
                  "product_id": "openssl-libs-1:1.0.2k-26.el7_9.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/centos/openssl-libs@1.0.2k-26.el7_9?arch=x86_64&epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openssl-perl-1:1.0.2k-26.el7_9.x86_64",
                "product": {
                  "name": "openssl-perl-1:1.0.2k-26.el7_9.x86_64",
                  "product_id": "openssl-perl-1:1.0.2k-26.el7_9.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/centos/openssl-perl@1.0.2k-26.el7_9?arch=x86_64&epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openssl-static-1:1.0.2k-26.el7_9.x86_64",
                "product": {
                  "name": "openssl-static-1:1.0.2k-26.el7_9.x86_64",
                  "product_id": "openssl-static-1:1.0.2k-26.el7_9.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/centos/openssl-static@1.0.2k-26.el7_9?arch=x86_64&epoch=1"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "openssl-devel-1:1.0.2k-26.el7_9.i686",
                "product": {
                  "name": "openssl-devel-1:1.0.2k-26.el7_9.i686",
                  "product_id": "openssl-devel-1:1.0.2k-26.el7_9.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/centos/openssl-devel@1.0.2k-26.el7_9?arch=i686&epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openssl-libs-1:1.0.2k-26.el7_9.i686",
                "product": {
                  "name": "openssl-libs-1:1.0.2k-26.el7_9.i686",
                  "product_id": "openssl-libs-1:1.0.2k-26.el7_9.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/centos/openssl-libs@1.0.2k-26.el7_9?arch=i686&epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openssl-static-1:1.0.2k-26.el7_9.i686",
                "product": {
                  "name": "openssl-static-1:1.0.2k-26.el7_9.i686",
                  "product_id": "openssl-static-1:1.0.2k-26.el7_9.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/centos/openssl-static@1.0.2k-26.el7_9?arch=i686&epoch=1"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "i686"
          }
        ],
        "category": "vendor",
        "name": "Red Hat, Inc."
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-1:1.0.2k-26.el7_9.tuxcare.els1.x86_64 as a component of Community Enterprise Operating System 7",
          "product_id": "CentOS-7:openssl-1:1.0.2k-26.el7_9.tuxcare.els1.x86_64"
        },
        "product_reference": "openssl-1:1.0.2k-26.el7_9.tuxcare.els1.x86_64",
        "relates_to_product_reference": "CentOS-7"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-1:1.0.2k-26.el7_9.tuxcare.els2.x86_64 as a component of Community Enterprise Operating System 7",
          "product_id": "CentOS-7:openssl-1:1.0.2k-26.el7_9.tuxcare.els2.x86_64"
        },
        "product_reference": "openssl-1:1.0.2k-26.el7_9.tuxcare.els2.x86_64",
        "relates_to_product_reference": "CentOS-7"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-1:1.0.2k-26.el7_9.tuxcare.els3.x86_64 as a component of Community Enterprise Operating System 7",
          "product_id": "CentOS-7:openssl-1:1.0.2k-26.el7_9.tuxcare.els3.x86_64"
        },
        "product_reference": "openssl-1:1.0.2k-26.el7_9.tuxcare.els3.x86_64",
        "relates_to_product_reference": "CentOS-7"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-1:1.0.2k-26.el7_9.tuxcare.els4.x86_64 as a component of Community Enterprise Operating System 7",
          "product_id": "CentOS-7:openssl-1:1.0.2k-26.el7_9.tuxcare.els4.x86_64"
        },
        "product_reference": "openssl-1:1.0.2k-26.el7_9.tuxcare.els4.x86_64",
        "relates_to_product_reference": "CentOS-7"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-1:1.0.2k-26.el7_9.tuxcare.els5.x86_64 as a component of Community Enterprise Operating System 7",
          "product_id": "CentOS-7:openssl-1:1.0.2k-26.el7_9.tuxcare.els5.x86_64"
        },
        "product_reference": "openssl-1:1.0.2k-26.el7_9.tuxcare.els5.x86_64",
        "relates_to_product_reference": "CentOS-7"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-1:1.0.2k-26.el7_9.tuxcare.els6.x86_64 as a component of Community Enterprise Operating System 7",
          "product_id": "CentOS-7:openssl-1:1.0.2k-26.el7_9.tuxcare.els6.x86_64"
        },
        "product_reference": "openssl-1:1.0.2k-26.el7_9.tuxcare.els6.x86_64",
        "relates_to_product_reference": "CentOS-7"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-devel-1:1.0.2k-26.el7_9.tuxcare.els3.i686 as a component of Community Enterprise Operating System 7",
          "product_id": "CentOS-7:openssl-devel-1:1.0.2k-26.el7_9.tuxcare.els3.i686"
        },
        "product_reference": "openssl-devel-1:1.0.2k-26.el7_9.tuxcare.els3.i686",
        "relates_to_product_reference": "CentOS-7"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-devel-1:1.0.2k-26.el7_9.tuxcare.els3.x86_64 as a component of Community Enterprise Operating System 7",
          "product_id": "CentOS-7:openssl-devel-1:1.0.2k-26.el7_9.tuxcare.els3.x86_64"
        },
        "product_reference": "openssl-devel-1:1.0.2k-26.el7_9.tuxcare.els3.x86_64",
        "relates_to_product_reference": "CentOS-7"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-devel-1:1.0.2k-26.el7_9.tuxcare.els4.i686 as a component of Community Enterprise Operating System 7",
          "product_id": "CentOS-7:openssl-devel-1:1.0.2k-26.el7_9.tuxcare.els4.i686"
        },
        "product_reference": "openssl-devel-1:1.0.2k-26.el7_9.tuxcare.els4.i686",
        "relates_to_product_reference": "CentOS-7"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-devel-1:1.0.2k-26.el7_9.tuxcare.els4.x86_64 as a component of Community Enterprise Operating System 7",
          "product_id": "CentOS-7:openssl-devel-1:1.0.2k-26.el7_9.tuxcare.els4.x86_64"
        },
        "product_reference": "openssl-devel-1:1.0.2k-26.el7_9.tuxcare.els4.x86_64",
        "relates_to_product_reference": "CentOS-7"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-devel-1:1.0.2k-26.el7_9.tuxcare.els5.i686 as a component of Community Enterprise Operating System 7",
          "product_id": "CentOS-7:openssl-devel-1:1.0.2k-26.el7_9.tuxcare.els5.i686"
        },
        "product_reference": "openssl-devel-1:1.0.2k-26.el7_9.tuxcare.els5.i686",
        "relates_to_product_reference": "CentOS-7"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-devel-1:1.0.2k-26.el7_9.tuxcare.els5.x86_64 as a component of Community Enterprise Operating System 7",
          "product_id": "CentOS-7:openssl-devel-1:1.0.2k-26.el7_9.tuxcare.els5.x86_64"
        },
        "product_reference": "openssl-devel-1:1.0.2k-26.el7_9.tuxcare.els5.x86_64",
        "relates_to_product_reference": "CentOS-7"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-devel-1:1.0.2k-26.el7_9.tuxcare.els6.i686 as a component of Community Enterprise Operating System 7",
          "product_id": "CentOS-7:openssl-devel-1:1.0.2k-26.el7_9.tuxcare.els6.i686"
        },
        "product_reference": "openssl-devel-1:1.0.2k-26.el7_9.tuxcare.els6.i686",
        "relates_to_product_reference": "CentOS-7"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-devel-1:1.0.2k-26.el7_9.tuxcare.els6.x86_64 as a component of Community Enterprise Operating System 7",
          "product_id": "CentOS-7:openssl-devel-1:1.0.2k-26.el7_9.tuxcare.els6.x86_64"
        },
        "product_reference": "openssl-devel-1:1.0.2k-26.el7_9.tuxcare.els6.x86_64",
        "relates_to_product_reference": "CentOS-7"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-libs-1:1.0.2k-26.el7_9.tuxcare.els3.i686 as a component of Community Enterprise Operating System 7",
          "product_id": "CentOS-7:openssl-libs-1:1.0.2k-26.el7_9.tuxcare.els3.i686"
        },
        "product_reference": "openssl-libs-1:1.0.2k-26.el7_9.tuxcare.els3.i686",
        "relates_to_product_reference": "CentOS-7"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-libs-1:1.0.2k-26.el7_9.tuxcare.els3.x86_64 as a component of Community Enterprise Operating System 7",
          "product_id": "CentOS-7:openssl-libs-1:1.0.2k-26.el7_9.tuxcare.els3.x86_64"
        },
        "product_reference": "openssl-libs-1:1.0.2k-26.el7_9.tuxcare.els3.x86_64",
        "relates_to_product_reference": "CentOS-7"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-libs-1:1.0.2k-26.el7_9.tuxcare.els4.i686 as a component of Community Enterprise Operating System 7",
          "product_id": "CentOS-7:openssl-libs-1:1.0.2k-26.el7_9.tuxcare.els4.i686"
        },
        "product_reference": "openssl-libs-1:1.0.2k-26.el7_9.tuxcare.els4.i686",
        "relates_to_product_reference": "CentOS-7"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-libs-1:1.0.2k-26.el7_9.tuxcare.els4.x86_64 as a component of Community Enterprise Operating System 7",
          "product_id": "CentOS-7:openssl-libs-1:1.0.2k-26.el7_9.tuxcare.els4.x86_64"
        },
        "product_reference": "openssl-libs-1:1.0.2k-26.el7_9.tuxcare.els4.x86_64",
        "relates_to_product_reference": "CentOS-7"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-libs-1:1.0.2k-26.el7_9.tuxcare.els5.i686 as a component of Community Enterprise Operating System 7",
          "product_id": "CentOS-7:openssl-libs-1:1.0.2k-26.el7_9.tuxcare.els5.i686"
        },
        "product_reference": "openssl-libs-1:1.0.2k-26.el7_9.tuxcare.els5.i686",
        "relates_to_product_reference": "CentOS-7"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-libs-1:1.0.2k-26.el7_9.tuxcare.els5.x86_64 as a component of Community Enterprise Operating System 7",
          "product_id": "CentOS-7:openssl-libs-1:1.0.2k-26.el7_9.tuxcare.els5.x86_64"
        },
        "product_reference": "openssl-libs-1:1.0.2k-26.el7_9.tuxcare.els5.x86_64",
        "relates_to_product_reference": "CentOS-7"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-libs-1:1.0.2k-26.el7_9.tuxcare.els6.i686 as a component of Community Enterprise Operating System 7",
          "product_id": "CentOS-7:openssl-libs-1:1.0.2k-26.el7_9.tuxcare.els6.i686"
        },
        "product_reference": "openssl-libs-1:1.0.2k-26.el7_9.tuxcare.els6.i686",
        "relates_to_product_reference": "CentOS-7"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-libs-1:1.0.2k-26.el7_9.tuxcare.els6.x86_64 as a component of Community Enterprise Operating System 7",
          "product_id": "CentOS-7:openssl-libs-1:1.0.2k-26.el7_9.tuxcare.els6.x86_64"
        },
        "product_reference": "openssl-libs-1:1.0.2k-26.el7_9.tuxcare.els6.x86_64",
        "relates_to_product_reference": "CentOS-7"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-perl-1:1.0.2k-26.el7_9.tuxcare.els3.x86_64 as a component of Community Enterprise Operating System 7",
          "product_id": "CentOS-7:openssl-perl-1:1.0.2k-26.el7_9.tuxcare.els3.x86_64"
        },
        "product_reference": "openssl-perl-1:1.0.2k-26.el7_9.tuxcare.els3.x86_64",
        "relates_to_product_reference": "CentOS-7"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-perl-1:1.0.2k-26.el7_9.tuxcare.els4.x86_64 as a component of Community Enterprise Operating System 7",
          "product_id": "CentOS-7:openssl-perl-1:1.0.2k-26.el7_9.tuxcare.els4.x86_64"
        },
        "product_reference": "openssl-perl-1:1.0.2k-26.el7_9.tuxcare.els4.x86_64",
        "relates_to_product_reference": "CentOS-7"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-perl-1:1.0.2k-26.el7_9.tuxcare.els5.x86_64 as a component of Community Enterprise Operating System 7",
          "product_id": "CentOS-7:openssl-perl-1:1.0.2k-26.el7_9.tuxcare.els5.x86_64"
        },
        "product_reference": "openssl-perl-1:1.0.2k-26.el7_9.tuxcare.els5.x86_64",
        "relates_to_product_reference": "CentOS-7"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-perl-1:1.0.2k-26.el7_9.tuxcare.els6.x86_64 as a component of Community Enterprise Operating System 7",
          "product_id": "CentOS-7:openssl-perl-1:1.0.2k-26.el7_9.tuxcare.els6.x86_64"
        },
        "product_reference": "openssl-perl-1:1.0.2k-26.el7_9.tuxcare.els6.x86_64",
        "relates_to_product_reference": "CentOS-7"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-static-1:1.0.2k-26.el7_9.tuxcare.els3.i686 as a component of Community Enterprise Operating System 7",
          "product_id": "CentOS-7:openssl-static-1:1.0.2k-26.el7_9.tuxcare.els3.i686"
        },
        "product_reference": "openssl-static-1:1.0.2k-26.el7_9.tuxcare.els3.i686",
        "relates_to_product_reference": "CentOS-7"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-static-1:1.0.2k-26.el7_9.tuxcare.els3.x86_64 as a component of Community Enterprise Operating System 7",
          "product_id": "CentOS-7:openssl-static-1:1.0.2k-26.el7_9.tuxcare.els3.x86_64"
        },
        "product_reference": "openssl-static-1:1.0.2k-26.el7_9.tuxcare.els3.x86_64",
        "relates_to_product_reference": "CentOS-7"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-static-1:1.0.2k-26.el7_9.tuxcare.els4.i686 as a component of Community Enterprise Operating System 7",
          "product_id": "CentOS-7:openssl-static-1:1.0.2k-26.el7_9.tuxcare.els4.i686"
        },
        "product_reference": "openssl-static-1:1.0.2k-26.el7_9.tuxcare.els4.i686",
        "relates_to_product_reference": "CentOS-7"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-static-1:1.0.2k-26.el7_9.tuxcare.els4.x86_64 as a component of Community Enterprise Operating System 7",
          "product_id": "CentOS-7:openssl-static-1:1.0.2k-26.el7_9.tuxcare.els4.x86_64"
        },
        "product_reference": "openssl-static-1:1.0.2k-26.el7_9.tuxcare.els4.x86_64",
        "relates_to_product_reference": "CentOS-7"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-static-1:1.0.2k-26.el7_9.tuxcare.els5.i686 as a component of Community Enterprise Operating System 7",
          "product_id": "CentOS-7:openssl-static-1:1.0.2k-26.el7_9.tuxcare.els5.i686"
        },
        "product_reference": "openssl-static-1:1.0.2k-26.el7_9.tuxcare.els5.i686",
        "relates_to_product_reference": "CentOS-7"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-static-1:1.0.2k-26.el7_9.tuxcare.els5.x86_64 as a component of Community Enterprise Operating System 7",
          "product_id": "CentOS-7:openssl-static-1:1.0.2k-26.el7_9.tuxcare.els5.x86_64"
        },
        "product_reference": "openssl-static-1:1.0.2k-26.el7_9.tuxcare.els5.x86_64",
        "relates_to_product_reference": "CentOS-7"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-static-1:1.0.2k-26.el7_9.tuxcare.els6.i686 as a component of Community Enterprise Operating System 7",
          "product_id": "CentOS-7:openssl-static-1:1.0.2k-26.el7_9.tuxcare.els6.i686"
        },
        "product_reference": "openssl-static-1:1.0.2k-26.el7_9.tuxcare.els6.i686",
        "relates_to_product_reference": "CentOS-7"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-static-1:1.0.2k-26.el7_9.tuxcare.els6.x86_64 as a component of Community Enterprise Operating System 7",
          "product_id": "CentOS-7:openssl-static-1:1.0.2k-26.el7_9.tuxcare.els6.x86_64"
        },
        "product_reference": "openssl-static-1:1.0.2k-26.el7_9.tuxcare.els6.x86_64",
        "relates_to_product_reference": "CentOS-7"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-1:1.0.2k-26.el7_9.x86_64 as a component of Community Enterprise Operating System 7",
          "product_id": "CentOS-7:openssl-1:1.0.2k-26.el7_9.x86_64"
        },
        "product_reference": "openssl-1:1.0.2k-26.el7_9.x86_64",
        "relates_to_product_reference": "CentOS-7"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-devel-1:1.0.2k-26.el7_9.i686 as a component of Community Enterprise Operating System 7",
          "product_id": "CentOS-7:openssl-devel-1:1.0.2k-26.el7_9.i686"
        },
        "product_reference": "openssl-devel-1:1.0.2k-26.el7_9.i686",
        "relates_to_product_reference": "CentOS-7"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-devel-1:1.0.2k-26.el7_9.x86_64 as a component of Community Enterprise Operating System 7",
          "product_id": "CentOS-7:openssl-devel-1:1.0.2k-26.el7_9.x86_64"
        },
        "product_reference": "openssl-devel-1:1.0.2k-26.el7_9.x86_64",
        "relates_to_product_reference": "CentOS-7"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-libs-1:1.0.2k-26.el7_9.i686 as a component of Community Enterprise Operating System 7",
          "product_id": "CentOS-7:openssl-libs-1:1.0.2k-26.el7_9.i686"
        },
        "product_reference": "openssl-libs-1:1.0.2k-26.el7_9.i686",
        "relates_to_product_reference": "CentOS-7"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-libs-1:1.0.2k-26.el7_9.x86_64 as a component of Community Enterprise Operating System 7",
          "product_id": "CentOS-7:openssl-libs-1:1.0.2k-26.el7_9.x86_64"
        },
        "product_reference": "openssl-libs-1:1.0.2k-26.el7_9.x86_64",
        "relates_to_product_reference": "CentOS-7"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-perl-1:1.0.2k-26.el7_9.x86_64 as a component of Community Enterprise Operating System 7",
          "product_id": "CentOS-7:openssl-perl-1:1.0.2k-26.el7_9.x86_64"
        },
        "product_reference": "openssl-perl-1:1.0.2k-26.el7_9.x86_64",
        "relates_to_product_reference": "CentOS-7"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-static-1:1.0.2k-26.el7_9.i686 as a component of Community Enterprise Operating System 7",
          "product_id": "CentOS-7:openssl-static-1:1.0.2k-26.el7_9.i686"
        },
        "product_reference": "openssl-static-1:1.0.2k-26.el7_9.i686",
        "relates_to_product_reference": "CentOS-7"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-static-1:1.0.2k-26.el7_9.x86_64 as a component of Community Enterprise Operating System 7",
          "product_id": "CentOS-7:openssl-static-1:1.0.2k-26.el7_9.x86_64"
        },
        "product_reference": "openssl-static-1:1.0.2k-26.el7_9.x86_64",
        "relates_to_product_reference": "CentOS-7"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2014-0224",
      "cwe": {
        "id": "CWE-326",
        "name": "Inadequate Encryption Strength"
      },
      "notes": [
        {
          "category": "description",
          "text": "OpenSSL before 0.9.8za, 1.0.0 before 1.0.0m, and 1.0.1 before 1.0.1h does not properly restrict processing of ChangeCipherSpec messages, which allows man-in-the-middle attackers to trigger use of a zero-length master key in certain OpenSSL-to-OpenSSL communications, and consequently hijack sessions or obtain sensitive information, via a crafted TLS handshake, aka the \"CCS Injection\" vulnerability.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "CentOS-7:openssl-1:1.0.2k-26.el7_9.tuxcare.els1.x86_64",
          "CentOS-7:openssl-1:1.0.2k-26.el7_9.tuxcare.els2.x86_64",
          "CentOS-7:openssl-1:1.0.2k-26.el7_9.tuxcare.els3.x86_64",
          "CentOS-7:openssl-1:1.0.2k-26.el7_9.tuxcare.els4.x86_64",
          "CentOS-7:openssl-1:1.0.2k-26.el7_9.tuxcare.els5.x86_64",
          "CentOS-7:openssl-1:1.0.2k-26.el7_9.tuxcare.els6.x86_64",
          "CentOS-7:openssl-devel-1:1.0.2k-26.el7_9.tuxcare.els3.i686",
          "CentOS-7:openssl-devel-1:1.0.2k-26.el7_9.tuxcare.els3.x86_64",
          "CentOS-7:openssl-devel-1:1.0.2k-26.el7_9.tuxcare.els4.i686",
          "CentOS-7:openssl-devel-1:1.0.2k-26.el7_9.tuxcare.els4.x86_64",
          "CentOS-7:openssl-devel-1:1.0.2k-26.el7_9.tuxcare.els5.i686",
          "CentOS-7:openssl-devel-1:1.0.2k-26.el7_9.tuxcare.els5.x86_64",
          "CentOS-7:openssl-devel-1:1.0.2k-26.el7_9.tuxcare.els6.i686",
          "CentOS-7:openssl-devel-1:1.0.2k-26.el7_9.tuxcare.els6.x86_64",
          "CentOS-7:openssl-libs-1:1.0.2k-26.el7_9.tuxcare.els3.i686",
          "CentOS-7:openssl-libs-1:1.0.2k-26.el7_9.tuxcare.els3.x86_64",
          "CentOS-7:openssl-libs-1:1.0.2k-26.el7_9.tuxcare.els4.i686",
          "CentOS-7:openssl-libs-1:1.0.2k-26.el7_9.tuxcare.els4.x86_64",
          "CentOS-7:openssl-libs-1:1.0.2k-26.el7_9.tuxcare.els5.i686",
          "CentOS-7:openssl-libs-1:1.0.2k-26.el7_9.tuxcare.els5.x86_64",
          "CentOS-7:openssl-libs-1:1.0.2k-26.el7_9.tuxcare.els6.i686",
          "CentOS-7:openssl-libs-1:1.0.2k-26.el7_9.tuxcare.els6.x86_64",
          "CentOS-7:openssl-perl-1:1.0.2k-26.el7_9.tuxcare.els3.x86_64",
          "CentOS-7:openssl-perl-1:1.0.2k-26.el7_9.tuxcare.els4.x86_64",
          "CentOS-7:openssl-perl-1:1.0.2k-26.el7_9.tuxcare.els5.x86_64",
          "CentOS-7:openssl-perl-1:1.0.2k-26.el7_9.tuxcare.els6.x86_64",
          "CentOS-7:openssl-static-1:1.0.2k-26.el7_9.tuxcare.els3.i686",
          "CentOS-7:openssl-static-1:1.0.2k-26.el7_9.tuxcare.els3.x86_64",
          "CentOS-7:openssl-static-1:1.0.2k-26.el7_9.tuxcare.els4.i686",
          "CentOS-7:openssl-static-1:1.0.2k-26.el7_9.tuxcare.els4.x86_64",
          "CentOS-7:openssl-static-1:1.0.2k-26.el7_9.tuxcare.els5.i686",
          "CentOS-7:openssl-static-1:1.0.2k-26.el7_9.tuxcare.els5.x86_64",
          "CentOS-7:openssl-static-1:1.0.2k-26.el7_9.tuxcare.els6.i686",
          "CentOS-7:openssl-static-1:1.0.2k-26.el7_9.tuxcare.els6.x86_64"
        ],
        "known_affected": [
          "CentOS-7:openssl-1:1.0.2k-26.el7_9.x86_64",
          "CentOS-7:openssl-devel-1:1.0.2k-26.el7_9.i686",
          "CentOS-7:openssl-devel-1:1.0.2k-26.el7_9.x86_64",
          "CentOS-7:openssl-libs-1:1.0.2k-26.el7_9.i686",
          "CentOS-7:openssl-libs-1:1.0.2k-26.el7_9.x86_64",
          "CentOS-7:openssl-perl-1:1.0.2k-26.el7_9.x86_64",
          "CentOS-7:openssl-static-1:1.0.2k-26.el7_9.i686",
          "CentOS-7:openssl-static-1:1.0.2k-26.el7_9.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2014-0224"
        },
        {
          "category": "external",
          "summary": "http://aix.software.ibm.com/aix/efixes/security/openssl_advisory9.asc",
          "url": "http://aix.software.ibm.com/aix/efixes/security/openssl_advisory9.asc"
        },
        {
          "category": "external",
          "summary": "http://ccsinjection.lepidum.co.jp",
          "url": "http://ccsinjection.lepidum.co.jp/"
        },
        {
          "category": "external",
          "summary": "http://dev.mysql.com/doc/relnotes/workbench/en/wb-news-6-1-7.html",
          "url": "http://dev.mysql.com/doc/relnotes/workbench/en/wb-news-6-1-7.html"
        },
        {
          "category": "external",
          "summary": "http://esupport.trendmicro.com/solution/en-US/1103813.aspx",
          "url": "http://esupport.trendmicro.com/solution/en-US/1103813.aspx"
        },
        {
          "category": "external",
          "summary": "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10629",
          "url": "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10629"
        },
        {
          "category": "external",
          "summary": "http://kb.juniper.net/InfoCenter/index?page=content&id=KB29195",
          "url": "http://kb.juniper.net/InfoCenter/index?page=content&id=KB29195"
        },
        {
          "category": "external",
          "summary": "http://kb.juniper.net/InfoCenter/index?page=content&id=KB29217",
          "url": "http://kb.juniper.net/InfoCenter/index?page=content&id=KB29217"
        },
        {
          "category": "external",
          "summary": "http://linux.oracle.com/errata/ELSA-2014-1053.html",
          "url": "http://linux.oracle.com/errata/ELSA-2014-1053.html"
        },
        {
          "category": "external",
          "summary": "http://lists.fedoraproject.org/pipermail/package-announce/2014-August/136470.html",
          "url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-August/136470.html"
        },
        {
          "category": "external",
          "summary": "http://lists.fedoraproject.org/pipermail/package-announce/2014-August/136473.html",
          "url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-August/136473.html"
        },
        {
          "category": "external",
          "summary": "http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00027.html",
          "url": "http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00027.html"
        },
        {
          "category": "external",
          "summary": "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.html",
          "url": "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.html"
        },
        {
          "category": "external",
          "summary": "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00011.html",
          "url": "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00011.html"
        },
        {
          "category": "external",
          "summary": "http://lists.opensuse.org/opensuse-updates/2015-02/msg00030.html",
          "url": "http://lists.opensuse.org/opensuse-updates/2015-02/msg00030.html"
        },
        {
          "category": "external",
          "summary": "http://marc.info/?l=bugtraq&m=140266410314613&w=2",
          "url": "http://marc.info/?l=bugtraq&m=140266410314613&w=2"
        },
        {
          "category": "external",
          "summary": "http://marc.info/?l=bugtraq&m=140317760000786&w=2",
          "url": "http://marc.info/?l=bugtraq&m=140317760000786&w=2"
        },
        {
          "category": "external",
          "summary": "http://marc.info/?l=bugtraq&m=140369637402535&w=2",
          "url": "http://marc.info/?l=bugtraq&m=140369637402535&w=2"
        },
        {
          "category": "external",
          "summary": "http://marc.info/?l=bugtraq&m=140386311427810&w=2",
          "url": "http://marc.info/?l=bugtraq&m=140386311427810&w=2"
        },
        {
          "category": "external",
          "summary": "http://marc.info/?l=bugtraq&m=140389274407904&w=2",
          "url": "http://marc.info/?l=bugtraq&m=140389274407904&w=2"
        },
        {
          "category": "external",
          "summary": "http://marc.info/?l=bugtraq&m=140389355508263&w=2",
          "url": "http://marc.info/?l=bugtraq&m=140389355508263&w=2"
        },
        {
          "category": "external",
          "summary": "http://marc.info/?l=bugtraq&m=140431828824371&w=2",
          "url": "http://marc.info/?l=bugtraq&m=140431828824371&w=2"
        },
        {
          "category": "external",
          "summary": "http://marc.info/?l=bugtraq&m=140448122410568&w=2",
          "url": "http://marc.info/?l=bugtraq&m=140448122410568&w=2"
        },
        {
          "category": "external",
          "summary": "http://marc.info/?l=bugtraq&m=140482916501310&w=2",
          "url": "http://marc.info/?l=bugtraq&m=140482916501310&w=2"
        },
        {
          "category": "external",
          "summary": "http://marc.info/?l=bugtraq&m=140491231331543&w=2",
          "url": "http://marc.info/?l=bugtraq&m=140491231331543&w=2"
        },
        {
          "category": "external",
          "summary": "http://marc.info/?l=bugtraq&m=140499864129699&w=2",
          "url": "http://marc.info/?l=bugtraq&m=140499864129699&w=2"
        },
        {
          "category": "external",
          "summary": "http://marc.info/?l=bugtraq&m=140544599631400&w=2",
          "url": "http://marc.info/?l=bugtraq&m=140544599631400&w=2"
        },
        {
          "category": "external",
          "summary": "http://marc.info/?l=bugtraq&m=140604261522465&w=2",
          "url": "http://marc.info/?l=bugtraq&m=140604261522465&w=2"
        },
        {
          "category": "external",
          "summary": "http://marc.info/?l=bugtraq&m=140621259019789&w=2",
          "url": "http://marc.info/?l=bugtraq&m=140621259019789&w=2"
        },
        {
          "category": "external",
          "summary": "http://marc.info/?l=bugtraq&m=140672208601650&w=2",
          "url": "http://marc.info/?l=bugtraq&m=140672208601650&w=2"
        },
        {
          "category": "external",
          "summary": "http://marc.info/?l=bugtraq&m=140752315422991&w=2",
          "url": "http://marc.info/?l=bugtraq&m=140752315422991&w=2"
        },
        {
          "category": "external",
          "summary": "http://marc.info/?l=bugtraq&m=140784085708882&w=2",
          "url": "http://marc.info/?l=bugtraq&m=140784085708882&w=2"
        },
        {
          "category": "external",
          "summary": "http://marc.info/?l=bugtraq&m=140794476212181&w=2",
          "url": "http://marc.info/?l=bugtraq&m=140794476212181&w=2"
        },
        {
          "category": "external",
          "summary": "http://marc.info/?l=bugtraq&m=140852757108392&w=2",
          "url": "http://marc.info/?l=bugtraq&m=140852757108392&w=2"
        },
        {
          "category": "external",
          "summary": "http://marc.info/?l=bugtraq&m=140852826008699&w=2",
          "url": "http://marc.info/?l=bugtraq&m=140852826008699&w=2"
        },
        {
          "category": "external",
          "summary": "http://marc.info/?l=bugtraq&m=140870499402361&w=2",
          "url": "http://marc.info/?l=bugtraq&m=140870499402361&w=2"
        },
        {
          "category": "external",
          "summary": "http://marc.info/?l=bugtraq&m=140904544427729&w=2",
          "url": "http://marc.info/?l=bugtraq&m=140904544427729&w=2"
        },
        {
          "category": "external",
          "summary": "http://marc.info/?l=bugtraq&m=140983229106599&w=2",
          "url": "http://marc.info/?l=bugtraq&m=140983229106599&w=2"
        },
        {
          "category": "external",
          "summary": "http://marc.info/?l=bugtraq&m=141025641601169&w=2",
          "url": "http://marc.info/?l=bugtraq&m=141025641601169&w=2"
        },
        {
          "category": "external",
          "summary": "http://marc.info/?l=bugtraq&m=141147110427269&w=2",
          "url": "http://marc.info/?l=bugtraq&m=141147110427269&w=2"
        },
        {
          "category": "external",
          "summary": "http://marc.info/?l=bugtraq&m=141164638606214&w=2",
          "url": "http://marc.info/?l=bugtraq&m=141164638606214&w=2"
        },
        {
          "category": "external",
          "summary": "http://marc.info/?l=bugtraq&m=141383410222440&w=2",
          "url": "http://marc.info/?l=bugtraq&m=141383410222440&w=2"
        },
        {
          "category": "external",
          "summary": "http://marc.info/?l=bugtraq&m=141383465822787&w=2",
          "url": "http://marc.info/?l=bugtraq&m=141383465822787&w=2"
        },
        {
          "category": "external",
          "summary": "http://marc.info/?l=bugtraq&m=141658880509699&w=2",
          "url": "http://marc.info/?l=bugtraq&m=141658880509699&w=2"
        },
        {
          "category": "external",
          "summary": "http://marc.info/?l=bugtraq&m=142350350616251&w=2",
          "url": "http://marc.info/?l=bugtraq&m=142350350616251&w=2"
        },
        {
          "category": "external",
          "summary": "http://marc.info/?l=bugtraq&m=142546741516006&w=2",
          "url": "http://marc.info/?l=bugtraq&m=142546741516006&w=2"
        },
        {
          "category": "external",
          "summary": "http://marc.info/?l=bugtraq&m=142805027510172&w=2",
          "url": "http://marc.info/?l=bugtraq&m=142805027510172&w=2"
        },
        {
          "category": "external",
          "summary": "http://puppetlabs.com/security/cve/cve-2014-0224",
          "url": "http://puppetlabs.com/security/cve/cve-2014-0224"
        },
        {
          "category": "external",
          "summary": "http://rhn.redhat.com/errata/RHSA-2014-0624.html",
          "url": "http://rhn.redhat.com/errata/RHSA-2014-0624.html"
        },
        {
          "category": "external",
          "summary": "http://rhn.redhat.com/errata/RHSA-2014-0626.html",
          "url": "http://rhn.redhat.com/errata/RHSA-2014-0626.html"
        },
        {
          "category": "external",
          "summary": "http://rhn.redhat.com/errata/RHSA-2014-0627.html",
          "url": "http://rhn.redhat.com/errata/RHSA-2014-0627.html"
        },
        {
          "category": "external",
          "summary": "http://rhn.redhat.com/errata/RHSA-2014-0630.html",
          "url": "http://rhn.redhat.com/errata/RHSA-2014-0630.html"
        },
        {
          "category": "external",
          "summary": "http://rhn.redhat.com/errata/RHSA-2014-0631.html",
          "url": "http://rhn.redhat.com/errata/RHSA-2014-0631.html"
        },
        {
          "category": "external",
          "summary": "http://rhn.redhat.com/errata/RHSA-2014-0632.html",
          "url": "http://rhn.redhat.com/errata/RHSA-2014-0632.html"
        },
        {
          "category": "external",
          "summary": "http://rhn.redhat.com/errata/RHSA-2014-0633.html",
          "url": "http://rhn.redhat.com/errata/RHSA-2014-0633.html"
        },
        {
          "category": "external",
          "summary": "http://rhn.redhat.com/errata/RHSA-2014-0680.html",
          "url": "http://rhn.redhat.com/errata/RHSA-2014-0680.html"
        },
        {
          "category": "external",
          "summary": "http://seclists.org/fulldisclosure/2014/Dec/23",
          "url": "http://seclists.org/fulldisclosure/2014/Dec/23"
        },
        {
          "category": "external",
          "summary": "http://seclists.org/fulldisclosure/2014/Jun/38",
          "url": "http://seclists.org/fulldisclosure/2014/Jun/38"
        },
        {
          "category": "external",
          "summary": "http://secunia.com/advisories/58128",
          "url": "http://secunia.com/advisories/58128"
        },
        {
          "category": "external",
          "summary": "http://secunia.com/advisories/58337",
          "url": "http://secunia.com/advisories/58337"
        },
        {
          "category": "external",
          "summary": "http://secunia.com/advisories/58385",
          "url": "http://secunia.com/advisories/58385"
        },
        {
          "category": "external",
          "summary": "http://secunia.com/advisories/58433",
          "url": "http://secunia.com/advisories/58433"
        },
        {
          "category": "external",
          "summary": "http://secunia.com/advisories/58492",
          "url": "http://secunia.com/advisories/58492"
        },
        {
          "category": "external",
          "summary": "http://secunia.com/advisories/58579",
          "url": "http://secunia.com/advisories/58579"
        },
        {
          "category": "external",
          "summary": "http://secunia.com/advisories/58615",
          "url": "http://secunia.com/advisories/58615"
        },
        {
          "category": "external",
          "summary": "http://secunia.com/advisories/58639",
          "url": "http://secunia.com/advisories/58639"
        },
        {
          "category": "external",
          "summary": "http://secunia.com/advisories/58660",
          "url": "http://secunia.com/advisories/58660"
        },
        {
          "category": "external",
          "summary": "http://secunia.com/advisories/58667",
          "url": "http://secunia.com/advisories/58667"
        },
        {
          "category": "external",
          "summary": "http://secunia.com/advisories/58713",
          "url": "http://secunia.com/advisories/58713"
        },
        {
          "category": "external",
          "summary": "http://secunia.com/advisories/58714",
          "url": "http://secunia.com/advisories/58714"
        },
        {
          "category": "external",
          "summary": "http://secunia.com/advisories/58716",
          "url": "http://secunia.com/advisories/58716"
        },
        {
          "category": "external",
          "summary": "http://secunia.com/advisories/58719",
          "url": "http://secunia.com/advisories/58719"
        },
        {
          "category": "external",
          "summary": "http://secunia.com/advisories/58742",
          "url": "http://secunia.com/advisories/58742"
        },
        {
          "category": "external",
          "summary": "http://secunia.com/advisories/58743",
          "url": "http://secunia.com/advisories/58743"
        },
        {
          "category": "external",
          "summary": "http://secunia.com/advisories/58745",
          "url": "http://secunia.com/advisories/58745"
        },
        {
          "category": "external",
          "summary": "http://secunia.com/advisories/58759",
          "url": "http://secunia.com/advisories/58759"
        },
        {
          "category": "external",
          "summary": "http://secunia.com/advisories/58930",
          "url": "http://secunia.com/advisories/58930"
        },
        {
          "category": "external",
          "summary": "http://secunia.com/advisories/58939",
          "url": "http://secunia.com/advisories/58939"
        },
        {
          "category": "external",
          "summary": "http://secunia.com/advisories/58945",
          "url": "http://secunia.com/advisories/58945"
        },
        {
          "category": "external",
          "summary": "http://secunia.com/advisories/58977",
          "url": "http://secunia.com/advisories/58977"
        },
        {
          "category": "external",
          "summary": "http://secunia.com/advisories/59004",
          "url": "http://secunia.com/advisories/59004"
        },
        {
          "category": "external",
          "summary": "http://secunia.com/advisories/59012",
          "url": "http://secunia.com/advisories/59012"
        },
        {
          "category": "external",
          "summary": "http://secunia.com/advisories/59040",
          "url": "http://secunia.com/advisories/59040"
        },
        {
          "category": "external",
          "summary": "http://secunia.com/advisories/59043",
          "url": "http://secunia.com/advisories/59043"
        },
        {
          "category": "external",
          "summary": "http://secunia.com/advisories/59055",
          "url": "http://secunia.com/advisories/59055"
        },
        {
          "category": "external",
          "summary": "http://secunia.com/advisories/59063",
          "url": "http://secunia.com/advisories/59063"
        },
        {
          "category": "external",
          "summary": "http://secunia.com/advisories/59093",
          "url": "http://secunia.com/advisories/59093"
        },
        {
          "category": "external",
          "summary": "http://secunia.com/advisories/59101",
          "url": "http://secunia.com/advisories/59101"
        },
        {
          "category": "external",
          "summary": "http://secunia.com/advisories/59120",
          "url": "http://secunia.com/advisories/59120"
        },
        {
          "category": "external",
          "summary": "http://secunia.com/advisories/59126",
          "url": "http://secunia.com/advisories/59126"
        },
        {
          "category": "external",
          "summary": "http://secunia.com/advisories/59132",
          "url": "http://secunia.com/advisories/59132"
        },
        {
          "category": "external",
          "summary": "http://secunia.com/advisories/59135",
          "url": "http://secunia.com/advisories/59135"
        },
        {
          "category": "external",
          "summary": "http://secunia.com/advisories/59142",
          "url": "http://secunia.com/advisories/59142"
        },
        {
          "category": "external",
          "summary": "http://secunia.com/advisories/59162",
          "url": "http://secunia.com/advisories/59162"
        },
        {
          "category": "external",
          "summary": "http://secunia.com/advisories/59163",
          "url": "http://secunia.com/advisories/59163"
        },
        {
          "category": "external",
          "summary": "http://secunia.com/advisories/59167",
          "url": "http://secunia.com/advisories/59167"
        },
        {
          "category": "external",
          "summary": "http://secunia.com/advisories/59175",
          "url": "http://secunia.com/advisories/59175"
        },
        {
          "category": "external",
          "summary": "http://secunia.com/advisories/59186",
          "url": "http://secunia.com/advisories/59186"
        },
        {
          "category": "external",
          "summary": "http://secunia.com/advisories/59188",
          "url": "http://secunia.com/advisories/59188"
        },
        {
          "category": "external",
          "summary": "http://secunia.com/advisories/59189",
          "url": "http://secunia.com/advisories/59189"
        },
        {
          "category": "external",
          "summary": "http://secunia.com/advisories/59190",
          "url": "http://secunia.com/advisories/59190"
        },
        {
          "category": "external",
          "summary": "http://secunia.com/advisories/59191",
          "url": "http://secunia.com/advisories/59191"
        },
        {
          "category": "external",
          "summary": "http://secunia.com/advisories/59192",
          "url": "http://secunia.com/advisories/59192"
        },
        {
          "category": "external",
          "summary": "http://secunia.com/advisories/59202",
          "url": "http://secunia.com/advisories/59202"
        },
        {
          "category": "external",
          "summary": "http://secunia.com/advisories/59211",
          "url": "http://secunia.com/advisories/59211"
        },
        {
          "category": "external",
          "summary": "http://secunia.com/advisories/59214",
          "url": "http://secunia.com/advisories/59214"
        },
        {
          "category": "external",
          "summary": "http://secunia.com/advisories/59215",
          "url": "http://secunia.com/advisories/59215"
        },
        {
          "category": "external",
          "summary": "http://secunia.com/advisories/59223",
          "url": "http://secunia.com/advisories/59223"
        },
        {
          "category": "external",
          "summary": "http://secunia.com/advisories/59231",
          "url": "http://secunia.com/advisories/59231"
        },
        {
          "category": "external",
          "summary": "http://secunia.com/advisories/59264",
          "url": "http://secunia.com/advisories/59264"
        },
        {
          "category": "external",
          "summary": "http://secunia.com/advisories/59282",
          "url": "http://secunia.com/advisories/59282"
        },
        {
          "category": "external",
          "summary": "http://secunia.com/advisories/59284",
          "url": "http://secunia.com/advisories/59284"
        },
        {
          "category": "external",
          "summary": "http://secunia.com/advisories/59287",
          "url": "http://secunia.com/advisories/59287"
        },
        {
          "category": "external",
          "summary": "http://secunia.com/advisories/59300",
          "url": "http://secunia.com/advisories/59300"
        },
        {
          "category": "external",
          "summary": "http://secunia.com/advisories/59301",
          "url": "http://secunia.com/advisories/59301"
        },
        {
          "category": "external",
          "summary": "http://secunia.com/advisories/59305",
          "url": "http://secunia.com/advisories/59305"
        },
        {
          "category": "external",
          "summary": "http://secunia.com/advisories/59306",
          "url": "http://secunia.com/advisories/59306"
        },
        {
          "category": "external",
          "summary": "http://secunia.com/advisories/59310",
          "url": "http://secunia.com/advisories/59310"
        },
        {
          "category": "external",
          "summary": "http://secunia.com/advisories/59325",
          "url": "http://secunia.com/advisories/59325"
        },
        {
          "category": "external",
          "summary": "http://secunia.com/advisories/59338",
          "url": "http://secunia.com/advisories/59338"
        },
        {
          "category": "external",
          "summary": "http://secunia.com/advisories/59342",
          "url": "http://secunia.com/advisories/59342"
        },
        {
          "category": "external",
          "summary": "http://secunia.com/advisories/59347",
          "url": "http://secunia.com/advisories/59347"
        },
        {
          "category": "external",
          "summary": "http://secunia.com/advisories/59354",
          "url": "http://secunia.com/advisories/59354"
        },
        {
          "category": "external",
          "summary": "http://secunia.com/advisories/59362",
          "url": "http://secunia.com/advisories/59362"
        },
        {
          "category": "external",
          "summary": "http://secunia.com/advisories/59364",
          "url": "http://secunia.com/advisories/59364"
        },
        {
          "category": "external",
          "summary": "http://secunia.com/advisories/59365",
          "url": "http://secunia.com/advisories/59365"
        },
        {
          "category": "external",
          "summary": "http://secunia.com/advisories/59368",
          "url": "http://secunia.com/advisories/59368"
        },
        {
          "category": "external",
          "summary": "http://secunia.com/advisories/59370",
          "url": "http://secunia.com/advisories/59370"
        },
        {
          "category": "external",
          "summary": "http://secunia.com/advisories/59374",
          "url": "http://secunia.com/advisories/59374"
        },
        {
          "category": "external",
          "summary": "http://secunia.com/advisories/59375",
          "url": "http://secunia.com/advisories/59375"
        },
        {
          "category": "external",
          "summary": "http://secunia.com/advisories/59380",
          "url": "http://secunia.com/advisories/59380"
        },
        {
          "category": "external",
          "summary": "http://secunia.com/advisories/59383",
          "url": "http://secunia.com/advisories/59383"
        },
        {
          "category": "external",
          "summary": "http://secunia.com/advisories/59389",
          "url": "http://secunia.com/advisories/59389"
        },
        {
          "category": "external",
          "summary": "http://secunia.com/advisories/59413",
          "url": "http://secunia.com/advisories/59413"
        },
        {
          "category": "external",
          "summary": "http://secunia.com/advisories/59429",
          "url": "http://secunia.com/advisories/59429"
        },
        {
          "category": "external",
          "summary": "http://secunia.com/advisories/59435",
          "url": "http://secunia.com/advisories/59435"
        },
        {
          "category": "external",
          "summary": "http://secunia.com/advisories/59437",
          "url": "http://secunia.com/advisories/59437"
        },
        {
          "category": "external",
          "summary": "http://secunia.com/advisories/59438",
          "url": "http://secunia.com/advisories/59438"
        },
        {
          "category": "external",
          "summary": "http://secunia.com/advisories/59440",
          "url": "http://secunia.com/advisories/59440"
        },
        {
          "category": "external",
          "summary": "http://secunia.com/advisories/59441",
          "url": "http://secunia.com/advisories/59441"
        },
        {
          "category": "external",
          "summary": "http://secunia.com/advisories/59442",
          "url": "http://secunia.com/advisories/59442"
        },
        {
          "category": "external",
          "summary": "http://secunia.com/advisories/59444",
          "url": "http://secunia.com/advisories/59444"
        },
        {
          "category": "external",
          "summary": "http://secunia.com/advisories/59445",
          "url": "http://secunia.com/advisories/59445"
        },
        {
          "category": "external",
          "summary": "http://secunia.com/advisories/59446",
          "url": "http://secunia.com/advisories/59446"
        },
        {
          "category": "external",
          "summary": "http://secunia.com/advisories/59447",
          "url": "http://secunia.com/advisories/59447"
        },
        {
          "category": "external",
          "summary": "http://secunia.com/advisories/59448",
          "url": "http://secunia.com/advisories/59448"
        },
        {
          "category": "external",
          "summary": "http://secunia.com/advisories/59449",
          "url": "http://secunia.com/advisories/59449"
        },
        {
          "category": "external",
          "summary": "http://secunia.com/advisories/59450",
          "url": "http://secunia.com/advisories/59450"
        },
        {
          "category": "external",
          "summary": "http://secunia.com/advisories/59451",
          "url": "http://secunia.com/advisories/59451"
        },
        {
          "category": "external",
          "summary": "http://secunia.com/advisories/59454",
          "url": "http://secunia.com/advisories/59454"
        },
        {
          "category": "external",
          "summary": "http://secunia.com/advisories/59459",
          "url": "http://secunia.com/advisories/59459"
        },
        {
          "category": "external",
          "summary": "http://secunia.com/advisories/59460",
          "url": "http://secunia.com/advisories/59460"
        },
        {
          "category": "external",
          "summary": "http://secunia.com/advisories/59483",
          "url": "http://secunia.com/advisories/59483"
        },
        {
          "category": "external",
          "summary": "http://secunia.com/advisories/59490",
          "url": "http://secunia.com/advisories/59490"
        },
        {
          "category": "external",
          "summary": "http://secunia.com/advisories/59491",
          "url": "http://secunia.com/advisories/59491"
        },
        {
          "category": "external",
          "summary": "http://secunia.com/advisories/59495",
          "url": "http://secunia.com/advisories/59495"
        },
        {
          "category": "external",
          "summary": "http://secunia.com/advisories/59502",
          "url": "http://secunia.com/advisories/59502"
        },
        {
          "category": "external",
          "summary": "http://secunia.com/advisories/59506",
          "url": "http://secunia.com/advisories/59506"
        },
        {
          "category": "external",
          "summary": "http://secunia.com/advisories/59514",
          "url": "http://secunia.com/advisories/59514"
        },
        {
          "category": "external",
          "summary": "http://secunia.com/advisories/59518",
          "url": "http://secunia.com/advisories/59518"
        },
        {
          "category": "external",
          "summary": "http://secunia.com/advisories/59525",
          "url": "http://secunia.com/advisories/59525"
        },
        {
          "category": "external",
          "summary": "http://secunia.com/advisories/59528",
          "url": "http://secunia.com/advisories/59528"
        },
        {
          "category": "external",
          "summary": "http://secunia.com/advisories/59529",
          "url": "http://secunia.com/advisories/59529"
        },
        {
          "category": "external",
          "summary": "http://secunia.com/advisories/59530",
          "url": "http://secunia.com/advisories/59530"
        },
        {
          "category": "external",
          "summary": "http://secunia.com/advisories/59589",
          "url": "http://secunia.com/advisories/59589"
        },
        {
          "category": "external",
          "summary": "http://secunia.com/advisories/59602",
          "url": "http://secunia.com/advisories/59602"
        },
        {
          "category": "external",
          "summary": "http://secunia.com/advisories/59655",
          "url": "http://secunia.com/advisories/59655"
        },
        {
          "category": "external",
          "summary": "http://secunia.com/advisories/59659",
          "url": "http://secunia.com/advisories/59659"
        },
        {
          "category": "external",
          "summary": "http://secunia.com/advisories/59661",
          "url": "http://secunia.com/advisories/59661"
        },
        {
          "category": "external",
          "summary": "http://secunia.com/advisories/59666",
          "url": "http://secunia.com/advisories/59666"
        },
        {
          "category": "external",
          "summary": "http://secunia.com/advisories/59669",
          "url": "http://secunia.com/advisories/59669"
        },
        {
          "category": "external",
          "summary": "http://secunia.com/advisories/59677",
          "url": "http://secunia.com/advisories/59677"
        },
        {
          "category": "external",
          "summary": "http://secunia.com/advisories/59721",
          "url": "http://secunia.com/advisories/59721"
        },
        {
          "category": "external",
          "summary": "http://secunia.com/advisories/59784",
          "url": "http://secunia.com/advisories/59784"
        },
        {
          "category": "external",
          "summary": "http://secunia.com/advisories/59824",
          "url": "http://secunia.com/advisories/59824"
        },
        {
          "category": "external",
          "summary": "http://secunia.com/advisories/59827",
          "url": "http://secunia.com/advisories/59827"
        },
        {
          "category": "external",
          "summary": "http://secunia.com/advisories/59878",
          "url": "http://secunia.com/advisories/59878"
        },
        {
          "category": "external",
          "summary": "http://secunia.com/advisories/59885",
          "url": "http://secunia.com/advisories/59885"
        },
        {
          "category": "external",
          "summary": "http://secunia.com/advisories/59894",
          "url": "http://secunia.com/advisories/59894"
        },
        {
          "category": "external",
          "summary": "http://secunia.com/advisories/59916",
          "url": "http://secunia.com/advisories/59916"
        },
        {
          "category": "external",
          "summary": "http://secunia.com/advisories/59990",
          "url": "http://secunia.com/advisories/59990"
        },
        {
          "category": "external",
          "summary": "http://secunia.com/advisories/60049",
          "url": "http://secunia.com/advisories/60049"
        },
        {
          "category": "external",
          "summary": "http://secunia.com/advisories/60066",
          "url": "http://secunia.com/advisories/60066"
        },
        {
          "category": "external",
          "summary": "http://secunia.com/advisories/60176",
          "url": "http://secunia.com/advisories/60176"
        },
        {
          "category": "external",
          "summary": "http://secunia.com/advisories/60522",
          "url": "http://secunia.com/advisories/60522"
        },
        {
          "category": "external",
          "summary": "http://secunia.com/advisories/60567",
          "url": "http://secunia.com/advisories/60567"
        },
        {
          "category": "external",
          "summary": "http://secunia.com/advisories/60571",
          "url": "http://secunia.com/advisories/60571"
        },
        {
          "category": "external",
          "summary": "http://secunia.com/advisories/60577",
          "url": "http://secunia.com/advisories/60577"
        },
        {
          "category": "external",
          "summary": "http://secunia.com/advisories/60819",
          "url": "http://secunia.com/advisories/60819"
        },
        {
          "category": "external",
          "summary": "http://secunia.com/advisories/61254",
          "url": "http://secunia.com/advisories/61254"
        },
        {
          "category": "external",
          "summary": "http://secunia.com/advisories/61815",
          "url": "http://secunia.com/advisories/61815"
        },
        {
          "category": "external",
          "summary": "http://security.gentoo.org/glsa/glsa-201407-05.xml",
          "url": "http://security.gentoo.org/glsa/glsa-201407-05.xml"
        },
        {
          "category": "external",
          "summary": "http://support.apple.com/kb/HT6443",
          "url": "http://support.apple.com/kb/HT6443"
        },
        {
          "category": "external",
          "summary": "http://support.citrix.com/article/CTX140876",
          "url": "http://support.citrix.com/article/CTX140876"
        },
        {
          "category": "external",
          "summary": "http://support.f5.com/kb/en-us/solutions/public/15000/300/sol15325.html",
          "url": "http://support.f5.com/kb/en-us/solutions/public/15000/300/sol15325.html"
        },
        {
          "category": "external",
          "summary": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140605-openssl",
          "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140605-openssl"
        },
        {
          "category": "external",
          "summary": "http://www-01.ibm.com/support/docview.wss?uid=isg400001841",
          "url": "http://www-01.ibm.com/support/docview.wss?uid=isg400001841"
        },
        {
          "category": "external",
          "summary": "http://www-01.ibm.com/support/docview.wss?uid=isg400001843",
          "url": "http://www-01.ibm.com/support/docview.wss?uid=isg400001843"
        },
        {
          "category": "external",
          "summary": "http://www-01.ibm.com/support/docview.wss?uid=nas8N1020163",
          "url": "http://www-01.ibm.com/support/docview.wss?uid=nas8N1020163"
        },
        {
          "category": "external",
          "summary": "http://www-01.ibm.com/support/docview.wss?uid=nas8N1020172",
          "url": "http://www-01.ibm.com/support/docview.wss?uid=nas8N1020172"
        },
        {
          "category": "external",
          "summary": "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004690",
          "url": "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004690"
        },
        {
          "category": "external",
          "summary": "http://www-01.ibm.com/support/docview.wss?uid=swg1IV61506",
          "url": "http://www-01.ibm.com/support/docview.wss?uid=swg1IV61506"
        },
        {
          "category": "external",
          "summary": "http://www-01.ibm.com/support/docview.wss?uid=swg21673137",
          "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21673137"
        },
        {
          "category": "external",
          "summary": "http://www-01.ibm.com/support/docview.wss?uid=swg21675626",
          "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21675626"
        },
        {
          "category": "external",
          "summary": "http://www-01.ibm.com/support/docview.wss?uid=swg21675821",
          "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21675821"
        },
        {
          "category": "external",
          "summary": "http://www-01.ibm.com/support/docview.wss?uid=swg21676035",
          "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21676035"
        },
        {
          "category": "external",
          "summary": "http://www-01.ibm.com/support/docview.wss?uid=swg21676062",
          "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21676062"
        },
        {
          "category": "external",
          "summary": "http://www-01.ibm.com/support/docview.wss?uid=swg21676071",
          "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21676071"
        },
        {
          "category": "external",
          "summary": "http://www-01.ibm.com/support/docview.wss?uid=swg21676333",
          "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21676333"
        },
        {
          "category": "external",
          "summary": "http://www-01.ibm.com/support/docview.wss?uid=swg21676334",
          "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21676334"
        },
        {
          "category": "external",
          "summary": "http://www-01.ibm.com/support/docview.wss?uid=swg21676419",
          "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21676419"
        },
        {
          "category": "external",
          "summary": "http://www-01.ibm.com/support/docview.wss?uid=swg21676478",
          "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21676478"
        },
        {
          "category": "external",
          "summary": "http://www-01.ibm.com/support/docview.wss?uid=swg21676496",
          "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21676496"
        },
        {
          "category": "external",
          "summary": "http://www-01.ibm.com/support/docview.wss?uid=swg21676501",
          "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21676501"
        },
        {
          "category": "external",
          "summary": "http://www-01.ibm.com/support/docview.wss?uid=swg21676529",
          "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21676529"
        },
        {
          "category": "external",
          "summary": "http://www-01.ibm.com/support/docview.wss?uid=swg21676536",
          "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21676536"
        },
        {
          "category": "external",
          "summary": "http://www-01.ibm.com/support/docview.wss?uid=swg21676615",
          "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21676615"
        },
        {
          "category": "external",
          "summary": "http://www-01.ibm.com/support/docview.wss?uid=swg21676644",
          "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21676644"
        },
        {
          "category": "external",
          "summary": "http://www-01.ibm.com/support/docview.wss?uid=swg21676655",
          "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21676655"
        },
        {
          "category": "external",
          "summary": "http://www-01.ibm.com/support/docview.wss?uid=swg21676786",
          "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21676786"
        },
        {
          "category": "external",
          "summary": "http://www-01.ibm.com/support/docview.wss?uid=swg21676833",
          "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21676833"
        },
        {
          "category": "external",
          "summary": "http://www-01.ibm.com/support/docview.wss?uid=swg21676845",
          "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21676845"
        },
        {
          "category": "external",
          "summary": "http://www-01.ibm.com/support/docview.wss?uid=swg21676879",
          "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21676879"
        },
        {
          "category": "external",
          "summary": "http://www-01.ibm.com/support/docview.wss?uid=swg21676889",
          "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21676889"
        },
        {
          "category": "external",
          "summary": "http://www-01.ibm.com/support/docview.wss?uid=swg21677080",
          "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21677080"
        },
        {
          "category": "external",
          "summary": "http://www-01.ibm.com/support/docview.wss?uid=swg21677131",
          "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21677131"
        },
        {
          "category": "external",
          "summary": "http://www-01.ibm.com/support/docview.wss?uid=swg21677390",
          "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21677390"
        },
        {
          "category": "external",
          "summary": "http://www-01.ibm.com/support/docview.wss?uid=swg21677527",
          "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21677527"
        },
        {
          "category": "external",
          "summary": "http://www-01.ibm.com/support/docview.wss?uid=swg21677567",
          "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21677567"
        },
        {
          "category": "external",
          "summary": "http://www-01.ibm.com/support/docview.wss?uid=swg21677695",
          "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21677695"
        },
        {
          "category": "external",
          "summary": "http://www-01.ibm.com/support/docview.wss?uid=swg21677828",
          "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21677828"
        },
        {
          "category": "external",
          "summary": "http://www-01.ibm.com/support/docview.wss?uid=swg21677836",
          "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21677836"
        },
        {
          "category": "external",
          "summary": "http://www-01.ibm.com/support/docview.wss?uid=swg21678167",
          "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21678167"
        },
        {
          "category": "external",
          "summary": "http://www-01.ibm.com/support/docview.wss?uid=swg21678233",
          "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21678233"
        },
        {
          "category": "external",
          "summary": "http://www-01.ibm.com/support/docview.wss?uid=swg21678289",
          "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21678289"
        },
        {
          "category": "external",
          "summary": "http://www-01.ibm.com/support/docview.wss?uid=swg21683332",
          "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21683332"
        },
        {
          "category": "external",
          "summary": "http://www-01.ibm.com/support/docview.wss?uid=swg24037727",
          "url": "http://www-01.ibm.com/support/docview.wss?uid=swg24037727"
        },
        {
          "category": "external",
          "summary": "http://www-01.ibm.com/support/docview.wss?uid=swg24037729",
          "url": "http://www-01.ibm.com/support/docview.wss?uid=swg24037729"
        },
        {
          "category": "external",
          "summary": "http://www-01.ibm.com/support/docview.wss?uid=swg24037730",
          "url": "http://www-01.ibm.com/support/docview.wss?uid=swg24037730"
        },
        {
          "category": "external",
          "summary": "http://www-01.ibm.com/support/docview.wss?uid=swg24037731",
          "url": "http://www-01.ibm.com/support/docview.wss?uid=swg24037731"
        },
        {
          "category": "external",
          "summary": "http://www-01.ibm.com/support/docview.wss?uid=swg24037732",
          "url": "http://www-01.ibm.com/support/docview.wss?uid=swg24037732"
        },
        {
          "category": "external",
          "summary": "http://www-01.ibm.com/support/docview.wss?uid=swg24037761",
          "url": "http://www-01.ibm.com/support/docview.wss?uid=swg24037761"
        },
        {
          "category": "external",
          "summary": "http://www-01.ibm.com/support/docview.wss?uid=swg24037870",
          "url": "http://www-01.ibm.com/support/docview.wss?uid=swg24037870"
        },
        {
          "category": "external",
          "summary": "http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5095740",
          "url": "http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5095740"
        },
        {
          "category": "external",
          "summary": "http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5095754",
          "url": "http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5095754"
        },
        {
          "category": "external",
          "summary": "http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5095755",
          "url": "http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5095755"
        },
        {
          "category": "external",
          "summary": "http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5095756",
          "url": "http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5095756"
        },
        {
          "category": "external",
          "summary": "http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5095757",
          "url": "http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5095757"
        },
        {
          "category": "external",
          "summary": "http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=migr-5095737",
          "url": "http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=migr-5095737"
        },
        {
          "category": "external",
          "summary": "http://www.blackberry.com/btsc/KB36051",
          "url": "http://www.blackberry.com/btsc/KB36051"
        },
        {
          "category": "external",
          "summary": "http://www.f-secure.com/en/web/labs_global/fsc-2014-6",
          "url": "http://www.f-secure.com/en/web/labs_global/fsc-2014-6"
        },
        {
          "category": "external",
          "summary": "http://www.fortiguard.com/advisory/FG-IR-14-018/",
          "url": "http://www.fortiguard.com/advisory/FG-IR-14-018/"
        },
        {
          "category": "external",
          "summary": "http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-345106.htm",
          "url": "http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-345106.htm"
        },
        {
          "category": "external",
          "summary": "http://www.ibm.com/support/docview.wss?uid=isg3T1020948",
          "url": "http://www.ibm.com/support/docview.wss?uid=isg3T1020948"
        },
        {
          "category": "external",
          "summary": "http://www.ibm.com/support/docview.wss?uid=ssg1S1004678",
          "url": "http://www.ibm.com/support/docview.wss?uid=ssg1S1004678"
        },
        {
          "category": "external",
          "summary": "http://www.ibm.com/support/docview.wss?uid=swg1IT02314",
          "url": "http://www.ibm.com/support/docview.wss?uid=swg1IT02314"
        },
        {
          "category": "external",
          "summary": "http://www.ibm.com/support/docview.wss?uid=swg21676356",
          "url": "http://www.ibm.com/support/docview.wss?uid=swg21676356"
        },
        {
          "category": "external",
          "summary": "http://www.ibm.com/support/docview.wss?uid=swg21676793",
          "url": "http://www.ibm.com/support/docview.wss?uid=swg21676793"
        },
        {
          "category": "external",
          "summary": "http://www.ibm.com/support/docview.wss?uid=swg21676877",
          "url": "http://www.ibm.com/support/docview.wss?uid=swg21676877"
        },
        {
          "category": "external",
          "summary": "http://www.ibm.com/support/docview.wss?uid=swg24037783",
          "url": "http://www.ibm.com/support/docview.wss?uid=swg24037783"
        },
        {
          "category": "external",
          "summary": "http://www.innominate.com/data/downloads/manuals/mdm_1.5.2.1_Release_Notes.pdf",
          "url": "http://www.innominate.com/data/downloads/manuals/mdm_1.5.2.1_Release_Notes.pdf"
        },
        {
          "category": "external",
          "summary": "http://www.kb.cert.org/vuls/id/978508",
          "url": "http://www.kb.cert.org/vuls/id/978508"
        },
        {
          "category": "external",
          "summary": "http://www.kerio.com/support/kerio-control/release-history",
          "url": "http://www.kerio.com/support/kerio-control/release-history"
        },
        {
          "category": "external",
          "summary": "http://www.mandriva.com/security/advisories?name=MDVSA-2014:105",
          "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2014:105"
        },
        {
          "category": "external",
          "summary": "http://www.mandriva.com/security/advisories?name=MDVSA-2014:106",
          "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2014:106"
        },
        {
          "category": "external",
          "summary": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:062",
          "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:062"
        },
        {
          "category": "external",
          "summary": "http://www.novell.com/support/kb/doc.php?id=7015264",
          "url": "http://www.novell.com/support/kb/doc.php?id=7015264"
        },
        {
          "category": "external",
          "summary": "http://www.novell.com/support/kb/doc.php?id=7015300",
          "url": "http://www.novell.com/support/kb/doc.php?id=7015300"
        },
        {
          "category": "external",
          "summary": "http://www.openssl.org/news/secadv_20140605.txt",
          "url": "http://www.openssl.org/news/secadv_20140605.txt"
        },
        {
          "category": "external",
          "summary": "http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html",
          "url": "http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html"
        },
        {
          "category": "external",
          "summary": "http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html",
          "url": "http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html"
        },
        {
          "category": "external",
          "summary": "http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html",
          "url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html"
        },
        {
          "category": "external",
          "summary": "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html",
          "url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html"
        },
        {
          "category": "external",
          "summary": "http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html",
          "url": "http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html"
        },
        {
          "category": "external",
          "summary": "http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html",
          "url": "http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html"
        },
        {
          "category": "external",
          "summary": "http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html",
          "url": "http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html"
        },
        {
          "category": "external",
          "summary": "http://www.securityfocus.com/archive/1/534161/100/0/threaded",
          "url": "http://www.securityfocus.com/archive/1/534161/100/0/threaded"
        },
        {
          "category": "external",
          "summary": "http://www.securitytracker.com/id/1031032",
          "url": "http://www.securitytracker.com/id/1031032"
        },
        {
          "category": "external",
          "summary": "http://www.securitytracker.com/id/1031594",
          "url": "http://www.securitytracker.com/id/1031594"
        },
        {
          "category": "external",
          "summary": "http://www.splunk.com/view/SP-CAAAM2D",
          "url": "http://www.splunk.com/view/SP-CAAAM2D"
        },
        {
          "category": "external",
          "summary": "http://www.tenable.com/blog/nessus-527-and-pvs-403-are-available-for-download",
          "url": "http://www.tenable.com/blog/nessus-527-and-pvs-403-are-available-for-download"
        },
        {
          "category": "external",
          "summary": "http://www.vmware.com/security/advisories/VMSA-2014-0006.html",
          "url": "http://www.vmware.com/security/advisories/VMSA-2014-0006.html"
        },
        {
          "category": "external",
          "summary": "http://www.vmware.com/security/advisories/VMSA-2014-0012.html",
          "url": "http://www.vmware.com/security/advisories/VMSA-2014-0012.html"
        },
        {
          "category": "external",
          "summary": "http://www.websense.com/support/article/kbarticle/Vulnerabilities-resolved-in-TRITON-APX-Version-8-0",
          "url": "http://www.websense.com/support/article/kbarticle/Vulnerabilities-resolved-in-TRITON-APX-Version-8-0"
        },
        {
          "category": "external",
          "summary": "http://www14.software.ibm.com/webapp/set2/subscriptions/pqvcmjd?mode=18&ID=6060&myns=phmc&mync=E",
          "url": "http://www14.software.ibm.com/webapp/set2/subscriptions/pqvcmjd?mode=18&ID=6060&myns=phmc&mync=E"
        },
        {
          "category": "external",
          "summary": "http://www14.software.ibm.com/webapp/set2/subscriptions/pqvcmjd?mode=18&ID=6061&myns=phmc&mync=E",
          "url": "http://www14.software.ibm.com/webapp/set2/subscriptions/pqvcmjd?mode=18&ID=6061&myns=phmc&mync=E"
        },
        {
          "category": "external",
          "summary": "https://access.redhat.com/site/blogs/766093/posts/908133",
          "url": "https://access.redhat.com/site/blogs/766093/posts/908133"
        },
        {
          "category": "external",
          "summary": "https://blogs.oracle.com/sunsecurity/entry/cve_2014_0224_cryptographic_issues",
          "url": "https://blogs.oracle.com/sunsecurity/entry/cve_2014_0224_cryptographic_issues"
        },
        {
          "category": "external",
          "summary": "https://blogs.oracle.com/sunsecurity/entry/cve_2014_0224_cryptographic_issues1",
          "url": "https://blogs.oracle.com/sunsecurity/entry/cve_2014_0224_cryptographic_issues1"
        },
        {
          "category": "external",
          "summary": "https://bugzilla.redhat.com/show_bug.cgi?id=1103586",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1103586"
        },
        {
          "category": "external",
          "summary": "https://cert-portal.siemens.com/productcert/pdf/ssa-234763.pdf",
          "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-234763.pdf"
        },
        {
          "category": "external",
          "summary": "https://discussions.nessus.org/thread/7517",
          "url": "https://discussions.nessus.org/thread/7517"
        },
        {
          "category": "external",
          "summary": "https://filezilla-project.org/versions.php?type=server",
          "url": "https://filezilla-project.org/versions.php?type=server"
        },
        {
          "category": "external",
          "summary": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commit%3Bh=bc8923b1ec9c467755cd86f7848c50ee8812e441",
          "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commit%3Bh=bc8923b1ec9c467755cd86f7848c50ee8812e441"
        },
        {
          "category": "external",
          "summary": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05301946",
          "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05301946"
        },
        {
          "category": "external",
          "summary": "https://kb.bluecoat.com/index?page=content&id=SA80",
          "url": "https://kb.bluecoat.com/index?page=content&id=SA80"
        },
        {
          "category": "external",
          "summary": "https://kc.mcafee.com/corporate/index?page=content&id=SB10075",
          "url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10075"
        },
        {
          "category": "external",
          "summary": "https://www.arista.com/en/support/advisories-notices/security-advisories/941-security-advisory-0005",
          "url": "https://www.arista.com/en/support/advisories-notices/security-advisories/941-security-advisory-0005"
        },
        {
          "category": "external",
          "summary": "https://www.ibm.com/support/docview.wss?uid=ssg1S1004670",
          "url": "https://www.ibm.com/support/docview.wss?uid=ssg1S1004670"
        },
        {
          "category": "external",
          "summary": "https://www.ibm.com/support/docview.wss?uid=ssg1S1004671",
          "url": "https://www.ibm.com/support/docview.wss?uid=ssg1S1004671"
        },
        {
          "category": "external",
          "summary": "https://www.imperialviolet.org/2014/06/05/earlyccs.html",
          "url": "https://www.imperialviolet.org/2014/06/05/earlyccs.html"
        },
        {
          "category": "external",
          "summary": "https://www.intersectalliance.com/wp-content/uploads/release_notes/ReleaseNotes_for_SNARE_for_MSSQL.pdf",
          "url": "https://www.intersectalliance.com/wp-content/uploads/release_notes/ReleaseNotes_for_SNARE_for_MSSQL.pdf"
        },
        {
          "category": "external",
          "summary": "https://www.intersectalliance.com/wp-content/uploads/release_notes/ReleaseNotes_for_Snare_for_Windows.pdf",
          "url": "https://www.intersectalliance.com/wp-content/uploads/release_notes/ReleaseNotes_for_Snare_for_Windows.pdf"
        },
        {
          "category": "external",
          "summary": "https://www.novell.com/support/kb/doc.php?id=7015271",
          "url": "https://www.novell.com/support/kb/doc.php?id=7015271"
        },
        {
          "category": "external",
          "summary": "http://ccsinjection.lepidum.co.jp",
          "url": "http://ccsinjection.lepidum.co.jp/"
        }
      ],
      "release_date": "2014-06-05T21:55:00Z",
      "remediations": [
        {
          "category": "none_available",
          "details": "Affected",
          "product_ids": [
            "CentOS-7:openssl-1:1.0.2k-26.el7_9.x86_64",
            "CentOS-7:openssl-devel-1:1.0.2k-26.el7_9.i686",
            "CentOS-7:openssl-devel-1:1.0.2k-26.el7_9.x86_64",
            "CentOS-7:openssl-libs-1:1.0.2k-26.el7_9.i686",
            "CentOS-7:openssl-libs-1:1.0.2k-26.el7_9.x86_64",
            "CentOS-7:openssl-perl-1:1.0.2k-26.el7_9.x86_64",
            "CentOS-7:openssl-static-1:1.0.2k-26.el7_9.i686",
            "CentOS-7:openssl-static-1:1.0.2k-26.el7_9.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "availabilityImpact": "NONE",
            "baseScore": 5.8,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "PARTIAL",
            "integrityImpact": "PARTIAL",
            "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:N",
            "version": "2.0"
          },
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 7.4,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
            "version": "3.1"
          },
          "products": [
            "CentOS-7:openssl-1:1.0.2k-26.el7_9.tuxcare.els1.x86_64",
            "CentOS-7:openssl-1:1.0.2k-26.el7_9.tuxcare.els2.x86_64",
            "CentOS-7:openssl-1:1.0.2k-26.el7_9.tuxcare.els3.x86_64",
            "CentOS-7:openssl-1:1.0.2k-26.el7_9.tuxcare.els4.x86_64",
            "CentOS-7:openssl-1:1.0.2k-26.el7_9.tuxcare.els5.x86_64",
            "CentOS-7:openssl-1:1.0.2k-26.el7_9.tuxcare.els6.x86_64",
            "CentOS-7:openssl-1:1.0.2k-26.el7_9.x86_64",
            "CentOS-7:openssl-devel-1:1.0.2k-26.el7_9.i686",
            "CentOS-7:openssl-devel-1:1.0.2k-26.el7_9.tuxcare.els3.i686",
            "CentOS-7:openssl-devel-1:1.0.2k-26.el7_9.tuxcare.els3.x86_64",
            "CentOS-7:openssl-devel-1:1.0.2k-26.el7_9.tuxcare.els4.i686",
            "CentOS-7:openssl-devel-1:1.0.2k-26.el7_9.tuxcare.els4.x86_64",
            "CentOS-7:openssl-devel-1:1.0.2k-26.el7_9.tuxcare.els5.i686",
            "CentOS-7:openssl-devel-1:1.0.2k-26.el7_9.tuxcare.els5.x86_64",
            "CentOS-7:openssl-devel-1:1.0.2k-26.el7_9.tuxcare.els6.i686",
            "CentOS-7:openssl-devel-1:1.0.2k-26.el7_9.tuxcare.els6.x86_64",
            "CentOS-7:openssl-devel-1:1.0.2k-26.el7_9.x86_64",
            "CentOS-7:openssl-libs-1:1.0.2k-26.el7_9.i686",
            "CentOS-7:openssl-libs-1:1.0.2k-26.el7_9.tuxcare.els3.i686",
            "CentOS-7:openssl-libs-1:1.0.2k-26.el7_9.tuxcare.els3.x86_64",
            "CentOS-7:openssl-libs-1:1.0.2k-26.el7_9.tuxcare.els4.i686",
            "CentOS-7:openssl-libs-1:1.0.2k-26.el7_9.tuxcare.els4.x86_64",
            "CentOS-7:openssl-libs-1:1.0.2k-26.el7_9.tuxcare.els5.i686",
            "CentOS-7:openssl-libs-1:1.0.2k-26.el7_9.tuxcare.els5.x86_64",
            "CentOS-7:openssl-libs-1:1.0.2k-26.el7_9.tuxcare.els6.i686",
            "CentOS-7:openssl-libs-1:1.0.2k-26.el7_9.tuxcare.els6.x86_64",
            "CentOS-7:openssl-libs-1:1.0.2k-26.el7_9.x86_64",
            "CentOS-7:openssl-perl-1:1.0.2k-26.el7_9.tuxcare.els3.x86_64",
            "CentOS-7:openssl-perl-1:1.0.2k-26.el7_9.tuxcare.els4.x86_64",
            "CentOS-7:openssl-perl-1:1.0.2k-26.el7_9.tuxcare.els5.x86_64",
            "CentOS-7:openssl-perl-1:1.0.2k-26.el7_9.tuxcare.els6.x86_64",
            "CentOS-7:openssl-perl-1:1.0.2k-26.el7_9.x86_64",
            "CentOS-7:openssl-static-1:1.0.2k-26.el7_9.i686",
            "CentOS-7:openssl-static-1:1.0.2k-26.el7_9.tuxcare.els3.i686",
            "CentOS-7:openssl-static-1:1.0.2k-26.el7_9.tuxcare.els3.x86_64",
            "CentOS-7:openssl-static-1:1.0.2k-26.el7_9.tuxcare.els4.i686",
            "CentOS-7:openssl-static-1:1.0.2k-26.el7_9.tuxcare.els4.x86_64",
            "CentOS-7:openssl-static-1:1.0.2k-26.el7_9.tuxcare.els5.i686",
            "CentOS-7:openssl-static-1:1.0.2k-26.el7_9.tuxcare.els5.x86_64",
            "CentOS-7:openssl-static-1:1.0.2k-26.el7_9.tuxcare.els6.i686",
            "CentOS-7:openssl-static-1:1.0.2k-26.el7_9.tuxcare.els6.x86_64",
            "CentOS-7:openssl-static-1:1.0.2k-26.el7_9.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    }
  ]
}