{"id":"CVE-2015-4000","details":"The TLS protocol 1.2 and earlier, when a DHE_EXPORT ciphersuite is enabled on a server but not on a client, does not properly convey a DHE_EXPORT choice, which allows man-in-the-middle attackers to conduct cipher-downgrade attacks by rewriting a ClientHello with DHE replaced by DHE_EXPORT and then rewriting a ServerHello with DHE_EXPORT replaced by DHE, aka the \"Logjam\" issue.","modified":"2026-01-30T02:05:48.792767Z","published":"2015-05-21T00:59:00Z","withdrawn":"2026-01-27T04:15:01.575682Z","related":["CGA-56gj-q646-p24j","MGASA-2015-0246","MGASA-2015-0260","MGASA-2015-0268","MGASA-2015-0277","MGASA-2015-0280","SUSE-FU-2022:0445-1","SUSE-RU-2015:0769-1","SUSE-SU-2015:0182-2","SUSE-SU-2015:0543-1","SUSE-SU-2015:0545-1","SUSE-SU-2015:0545-2","SUSE-SU-2015:0546-1","SUSE-SU-2015:0547-1","SUSE-SU-2015:0578-1","SUSE-SU-2015:0620-1","SUSE-SU-2015:0946-1","SUSE-SU-2015:1143-1","SUSE-SU-2015:1150-1","SUSE-SU-2015:1177-1","SUSE-SU-2015:1177-2","SUSE-SU-2015:1182-1","SUSE-SU-2015:1182-2","SUSE-SU-2015:1183-1","SUSE-SU-2015:1183-2","SUSE-SU-2015:1184-1","SUSE-SU-2015:1184-2","SUSE-SU-2015:1185-1","SUSE-SU-2015:1268-1","SUSE-SU-2015:1268-2","SUSE-SU-2015:1269-1","SUSE-SU-2015:1319-1","SUSE-SU-2015:1320-1","SUSE-SU-2015:1329-1","SUSE-SU-2015:1331-1","SUSE-SU-2015:1345-1","SUSE-SU-2015:1375-1","SUSE-SU-2015:1449-1","SUSE-SU-2015:1482-1","SUSE-SU-2015:1509-1","SUSE-SU-2015:1526-1","SUSE-SU-2015:1544-1","SUSE-SU-2015:1581-1","SUSE-SU-2015:1663-1","SUSE-SU-2015:1695-1","SUSE-SU-2015:1840-1","SUSE-SU-2015:1851-1","SUSE-SU-2016:0224-1","SUSE-SU-2016:0262-1","SUSE-SU-2016:0344-1","SUSE-SU-2016:1618-1","SUSE-SU-2016:2209-1","SUSE-SU-2016:2385-1","SUSE-SU-2018:1768-1","SUSE-SU-2023:0586-1","SUSE-SU-2023:4506-1","SUSE-SU-2023:4507-1","SUSE-SU-403","SUSE-SU-403 Forbidden-1","openSUSE-SU-2024:10071-1","openSUSE-SU-2024:10197-1","openSUSE-SU-2024:10230-1","openSUSE-SU-2024:10268-1","openSUSE-SU-2024:10309-1","openSUSE-SU-2024:10371-1","openSUSE-SU-2024:10451-1","openSUSE-SU-2024:10534-1","openSUSE-SU-2024:14572-1"],"references":[{"type":"ADVISORY","url":"http://aix.software.ibm.com/aix/efixes/security/sendmail_advisory2.asc"},{"type":"ADVISORY","url":"http://fortiguard.com/advisory/2015-07-09-cve-2015-1793-openssl-alternative-chains-certificate-forgery"},{"type":"ARTICLE","url":"http://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2015-008.txt.asc"},{"type":"ADVISORY","url":"http://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c04876402"},{"type":"ADVISORY","url":"http://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c04949778"},{"type":"ADVISORY","url":"http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10681"},{"type":"ADVISORY","url":"http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10727"},{"type":"ARTICLE","url":"http://lists.apple.com/archives/security-announce/2015/Jun/msg00001.html"},{"type":"ARTICLE","url":"http://lists.apple.com/archives/security-announce/2015/Jun/msg00002.html"},{"type":"ARTICLE","url":"http://lists.fedoraproject.org/pipermail/package-announce/2015-June/159314.html"},{"type":"ARTICLE","url":"http://lists.fedoraproject.org/pipermail/package-announce/2015-June/159351.html"},{"type":"ARTICLE","url":"http://lists.fedoraproject.org/pipermail/package-announce/2015-June/160117.html"},{"type":"ARTICLE","url":"http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00023.html"},{"type":"ARTICLE","url":"http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00024.html"},{"type":"ARTICLE","url":"http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00026.html"},{"type":"ARTICLE","url":"http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00001.html"},{"type":"ARTICLE","url":"http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00003.html"},{"type":"ARTICLE","url":"http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00004.html"},{"type":"ARTICLE","url":"http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00005.html"},{"type":"ARTICLE","url":"http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00006.html"},{"type":"ARTICLE","url":"http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00007.html"},{"type":"ARTICLE","url":"http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00025.html"},{"type":"ARTICLE","url":"http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00031.html"},{"type":"ARTICLE","url":"http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00033.html"},{"type":"ARTICLE","url":"http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00034.html"},{"type":"ARTICLE","url":"http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00037.html"},{"type":"ARTICLE","url":"http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00039.html"},{"type":"ARTICLE","url":"http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00040.html"},{"type":"ARTICLE","url":"http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00046.html"},{"type":"ARTICLE","url":"http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00047.html"},{"type":"ARTICLE","url":"http://lists.opensuse.org/opensuse-security-announce/2015-08/msg00021.html"},{"type":"ARTICLE","url":"http://lists.opensuse.org/opensuse-security-announce/2015-09/msg00017.html"},{"type":"ARTICLE","url":"http://lists.opensuse.org/opensuse-security-announce/2015-10/msg00001.html"},{"type":"ARTICLE","url":"http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00031.html"},{"type":"ARTICLE","url":"http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00032.html"},{"type":"ARTICLE","url":"http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00037.html"},{"type":"ARTICLE","url":"http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00039.html"},{"type":"ARTICLE","url":"http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00040.html"},{"type":"ARTICLE","url":"http://lists.opensuse.org/opensuse-updates/2015-07/msg00016.html"},{"type":"ARTICLE","url":"http://lists.opensuse.org/opensuse-updates/2015-10/msg00011.html"},{"type":"ARTICLE","url":"http://lists.opensuse.org/opensuse-updates/2016-02/msg00094.html"},{"type":"ARTICLE","url":"http://lists.opensuse.org/opensuse-updates/2016-02/msg00097.html"},{"type":"ARTICLE","url":"http://marc.info/?l=bugtraq&m=143506486712441&w=2"},{"type":"ARTICLE","url":"http://marc.info/?l=bugtraq&m=143557934009303&w=2"},{"type":"ARTICLE","url":"http://marc.info/?l=bugtraq&m=143558092609708&w=2"},{"type":"ARTICLE","url":"http://marc.info/?l=bugtraq&m=143628304012255&w=2"},{"type":"ARTICLE","url":"http://marc.info/?l=bugtraq&m=143637549705650&w=2"},{"type":"ARTICLE","url":"http://marc.info/?l=bugtraq&m=143655800220052&w=2"},{"type":"ARTICLE","url":"http://marc.info/?l=bugtraq&m=143880121627664&w=2"},{"type":"ARTICLE","url":"http://marc.info/?l=bugtraq&m=144043644216842&w=2"},{"type":"ARTICLE","url":"http://marc.info/?l=bugtraq&m=144050121701297&w=2"},{"type":"ARTICLE","url":"http://marc.info/?l=bugtraq&m=144060576831314&w=2"},{"type":"ARTICLE","url":"http://marc.info/?l=bugtraq&m=144060606031437&w=2"},{"type":"ARTICLE","url":"http://marc.info/?l=bugtraq&m=144061542602287&w=2"},{"type":"ARTICLE","url":"http://marc.info/?l=bugtraq&m=144069189622016&w=2"},{"type":"ARTICLE","url":"http://marc.info/?l=bugtraq&m=144102017024820&w=2"},{"type":"ARTICLE","url":"http://marc.info/?l=bugtraq&m=144104533800819&w=2"},{"type":"ARTICLE","url":"http://marc.info/?l=bugtraq&m=144493176821532&w=2"},{"type":"ARTICLE","url":"http://marc.info/?l=bugtraq&m=145409266329539&w=2"},{"type":"ARTICLE","url":"http://openwall.com/lists/oss-security/2015/05/20/8"},{"type":"ADVISORY","url":"http://rhn.redhat.com/errata/RHSA-2015-1072.html"},{"type":"ADVISORY","url":"http://rhn.redhat.com/errata/RHSA-2015-1185.html"},{"type":"ADVISORY","url":"http://rhn.redhat.com/errata/RHSA-2015-1197.html"},{"type":"ADVISORY","url":"http://rhn.redhat.com/errata/RHSA-2015-1228.html"},{"type":"ADVISORY","url":"http://rhn.redhat.com/errata/RHSA-2015-1229.html"},{"type":"ADVISORY","url":"http://rhn.redhat.com/errata/RHSA-2015-1230.html"},{"type":"ADVISORY","url":"http://rhn.redhat.com/errata/RHSA-2015-1241.html"},{"type":"ADVISORY","url":"http://rhn.redhat.com/errata/RHSA-2015-1242.html"},{"type":"ADVISORY","url":"http://rhn.redhat.com/errata/RHSA-2015-1243.html"},{"type":"ADVISORY","url":"http://rhn.redhat.com/errata/RHSA-2015-1485.html"},{"type":"ADVISORY","url":"http://rhn.redhat.com/errata/RHSA-2015-1486.html"},{"type":"ADVISORY","url":"http://rhn.redhat.com/errata/RHSA-2015-1488.html"},{"type":"ADVISORY","url":"http://rhn.redhat.com/errata/RHSA-2015-1526.html"},{"type":"ADVISORY","url":"http://rhn.redhat.com/errata/RHSA-2015-1544.html"},{"type":"ADVISORY","url":"http://rhn.redhat.com/errata/RHSA-2015-1604.html"},{"type":"ADVISORY","url":"http://rhn.redhat.com/errata/RHSA-2016-1624.html"},{"type":"ADVISORY","url":"http://rhn.redhat.com/errata/RHSA-2016-2056.html"},{"type":"ADVISORY","url":"http://support.apple.com/kb/HT204941"},{"type":"ADVISORY","url":"http://support.apple.com/kb/HT204942"},{"type":"ADVISORY","url":"http://support.citrix.com/article/CTX201114"},{"type":"ADVISORY","url":"http://www-01.ibm.com/support/docview.wss?uid=swg21959111"},{"type":"ADVISORY","url":"http://www-01.ibm.com/support/docview.wss?uid=swg21959195"},{"type":"ADVISORY","url":"http://www-01.ibm.com/support/docview.wss?uid=swg21959325"},{"type":"ADVISORY","url":"http://www-01.ibm.com/support/docview.wss?uid=swg21959453"},{"type":"ADVISORY","url":"http://www-01.ibm.com/support/docview.wss?uid=swg21959481"},{"type":"ADVISORY","url":"http://www-01.ibm.com/support/docview.wss?uid=swg21959517"},{"type":"ADVISORY","url":"http://www-01.ibm.com/support/docview.wss?uid=swg21959530"},{"type":"ADVISORY","url":"http://www-01.ibm.com/support/docview.wss?uid=swg21959539"},{"type":"ADVISORY","url":"http://www-01.ibm.com/support/docview.wss?uid=swg21959636"},{"type":"ADVISORY","url":"http://www-01.ibm.com/support/docview.wss?uid=swg21959812"},{"type":"ADVISORY","url":"http://www-01.ibm.com/support/docview.wss?uid=swg21960191"},{"type":"ADVISORY","url":"http://www-01.ibm.com/support/docview.wss?uid=swg21961717"},{"type":"ADVISORY","url":"http://www-01.ibm.com/support/docview.wss?uid=swg21962455"},{"type":"ADVISORY","url":"http://www-01.ibm.com/support/docview.wss?uid=swg21962739"},{"type":"ADVISORY","url":"http://www-304.ibm.com/support/docview.wss?uid=swg21958984"},{"type":"ADVISORY","url":"http://www-304.ibm.com/support/docview.wss?uid=swg21959132"},{"type":"ADVISORY","url":"http://www-304.ibm.com/support/docview.wss?uid=swg21960041"},{"type":"ADVISORY","url":"http://www-304.ibm.com/support/docview.wss?uid=swg21960194"},{"type":"ADVISORY","url":"http://www-304.ibm.com/support/docview.wss?uid=swg21960380"},{"type":"ADVISORY","url":"http://www-304.ibm.com/support/docview.wss?uid=swg21960418"},{"type":"ADVISORY","url":"http://www-304.ibm.com/support/docview.wss?uid=swg21962816"},{"type":"ADVISORY","url":"http://www-304.ibm.com/support/docview.wss?uid=swg21967893"},{"type":"ADVISORY","url":"http://www.debian.org/security/2015/dsa-3287"},{"type":"ADVISORY","url":"http://www.debian.org/security/2015/dsa-3300"},{"type":"ADVISORY","url":"http://www.debian.org/security/2015/dsa-3316"},{"type":"ADVISORY","url":"http://www.debian.org/security/2015/dsa-3324"},{"type":"ADVISORY","url":"http://www.debian.org/security/2015/dsa-3339"},{"type":"ADVISORY","url":"http://www.debian.org/security/2016/dsa-3688"},{"type":"ADVISORY","url":"http://www.fortiguard.com/advisory/2015-05-20-logjam-attack"},{"type":"ADVISORY","url":"http://www.mozilla.org/security/announce/2015/mfsa2015-70.html"},{"type":"FIX","url":"http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html"},{"type":"FIX","url":"http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html"},{"type":"ADVISORY","url":"http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html"},{"type":"ADVISORY","url":"http://www.oracle.com/technetwork/topics/security/bulletinjul2015-2511963.html"},{"type":"ADVISORY","url":"http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html"},{"type":"ADVISORY","url":"http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html"},{"type":"ADVISORY","url":"http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html"},{"type":"ADVISORY","url":"http://www.securityfocus.com/bid/74733"},{"type":"ADVISORY","url":"http://www.securityfocus.com/bid/91787"},{"type":"ADVISORY","url":"http://www.securitytracker.com/id/1032474"},{"type":"ADVISORY","url":"http://www.securitytracker.com/id/1032475"},{"type":"ADVISORY","url":"http://www.securitytracker.com/id/1032476"},{"type":"ADVISORY","url":"http://www.securitytracker.com/id/1032637"},{"type":"ADVISORY","url":"http://www.securitytracker.com/id/1032645"},{"type":"ADVISORY","url":"http://www.securitytracker.com/id/1032647"},{"type":"ADVISORY","url":"http://www.securitytracker.com/id/1032648"},{"type":"ADVISORY","url":"http://www.securitytracker.com/id/1032649"},{"type":"ADVISORY","url":"http://www.securitytracker.com/id/1032650"},{"type":"ADVISORY","url":"http://www.securitytracker.com/id/1032651"},{"type":"ADVISORY","url":"http://www.securitytracker.com/id/1032652"},{"type":"ADVISORY","url":"http://www.securitytracker.com/id/1032653"},{"type":"ADVISORY","url":"http://www.securitytracker.com/id/1032654"},{"type":"ADVISORY","url":"http://www.securitytracker.com/id/1032655"},{"type":"ADVISORY","url":"http://www.securitytracker.com/id/1032656"},{"type":"ADVISORY","url":"http://www.securitytracker.com/id/1032688"},{"type":"ADVISORY","url":"http://www.securitytracker.com/id/1032699"},{"type":"ADVISORY","url":"http://www.securitytracker.com/id/1032702"},{"type":"ADVISORY","url":"http://www.securitytracker.com/id/1032727"},{"type":"ADVISORY","url":"http://www.securitytracker.com/id/1032759"},{"type":"ADVISORY","url":"http://www.securitytracker.com/id/1032777"},{"type":"ADVISORY","url":"http://www.securitytracker.com/id/1032778"},{"type":"ADVISORY","url":"http://www.securitytracker.com/id/1032783"},{"type":"ADVISORY","url":"http://www.securitytracker.com/id/1032784"},{"type":"ADVISORY","url":"http://www.securitytracker.com/id/1032856"},{"type":"ADVISORY","url":"http://www.securitytracker.com/id/1032864"},{"type":"ADVISORY","url":"http://www.securitytracker.com/id/1032865"},{"type":"ADVISORY","url":"http://www.securitytracker.com/id/1032871"},{"type":"ADVISORY","url":"http://www.securitytracker.com/id/1032884"},{"type":"ADVISORY","url":"http://www.securitytracker.com/id/1032910"},{"type":"ADVISORY","url":"http://www.securitytracker.com/id/1032932"},{"type":"ADVISORY","url":"http://www.securitytracker.com/id/1032960"},{"type":"ADVISORY","url":"http://www.securitytracker.com/id/1033019"},{"type":"ADVISORY","url":"http://www.securitytracker.com/id/1033064"},{"type":"ADVISORY","url":"http://www.securitytracker.com/id/1033065"},{"type":"ADVISORY","url":"http://www.securitytracker.com/id/1033067"},{"type":"ADVISORY","url":"http://www.securitytracker.com/id/1033208"},{"type":"ADVISORY","url":"http://www.securitytracker.com/id/1033209"},{"type":"ADVISORY","url":"http://www.securitytracker.com/id/1033210"},{"type":"ADVISORY","url":"http://www.securitytracker.com/id/1033222"},{"type":"ADVISORY","url":"http://www.securitytracker.com/id/1033341"},{"type":"ADVISORY","url":"http://www.securitytracker.com/id/1033385"},{"type":"ADVISORY","url":"http://www.securitytracker.com/id/1033416"},{"type":"ADVISORY","url":"http://www.securitytracker.com/id/1033430"},{"type":"ADVISORY","url":"http://www.securitytracker.com/id/1033433"},{"type":"ADVISORY","url":"http://www.securitytracker.com/id/1033513"},{"type":"ADVISORY","url":"http://www.securitytracker.com/id/1033760"},{"type":"ADVISORY","url":"http://www.securitytracker.com/id/1033891"},{"type":"ADVISORY","url":"http://www.securitytracker.com/id/1033991"},{"type":"ADVISORY","url":"http://www.securitytracker.com/id/1034087"},{"type":"ADVISORY","url":"http://www.securitytracker.com/id/1034728"},{"type":"ADVISORY","url":"http://www.securitytracker.com/id/1034884"},{"type":"ADVISORY","url":"http://www.securitytracker.com/id/1036218"},{"type":"ADVISORY","url":"http://www.securitytracker.com/id/1040630"},{"type":"ADVISORY","url":"http://www.solarwinds.com/documentation/storage/storagemanager/docs/ReleaseNotes/releaseNotes.htm"},{"type":"ADVISORY","url":"http://www.ubuntu.com/usn/USN-2656-1"},{"type":"ADVISORY","url":"http://www.ubuntu.com/usn/USN-2656-2"},{"type":"ADVISORY","url":"http://www.ubuntu.com/usn/USN-2673-1"},{"type":"ADVISORY","url":"http://www.ubuntu.com/usn/USN-2696-1"},{"type":"ADVISORY","url":"http://www.ubuntu.com/usn/USN-2706-1"},{"type":"ADVISORY","url":"https://blog.cloudflare.com/logjam-the-latest-tls-vulnerability-explained/"},{"type":"ADVISORY","url":"https://bto.bluecoat.com/security-advisory/sa98"},{"type":"REPORT","url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1138554"},{"type":"ADVISORY","url":"https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf"},{"type":"ADVISORY","url":"https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.19.1_release_notes"},{"type":"ADVISORY","url":"https://h20564.www2.hp.com/hpsc/doc/public/display?docId=emr_na-c04718196"},{"type":"ADVISORY","url":"https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04770140"},{"type":"ADVISORY","url":"https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04772190"},{"type":"ADVISORY","url":"https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04773119"},{"type":"ADVISORY","url":"https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04773241"},{"type":"ADVISORY","url":"https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04832246"},{"type":"ADVISORY","url":"https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04918839"},{"type":"ADVISORY","url":"https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04923929"},{"type":"ADVISORY","url":"https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04926789"},{"type":"ADVISORY","url":"https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04740527"},{"type":"ADVISORY","url":"https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04953655"},{"type":"ADVISORY","url":"https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05045763"},{"type":"ADVISORY","url":"https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05128722"},{"type":"ADVISORY","url":"https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05193083"},{"type":"ADVISORY","url":"https://help.ecostruxureit.com/display/public/UADCO8x/StruxureWare+Data+Center+Operation+Software+Vulnerability+Fixes"},{"type":"ADVISORY","url":"https://kc.mcafee.com/corporate/index?page=content&id=SB10122"},{"type":"ADVISORY","url":"https://openssl.org/news/secadv/20150611.txt"},{"type":"ADVISORY","url":"https://puppet.com/security/cve/CVE-2015-4000"},{"type":"ADVISORY","url":"https://security.gentoo.org/glsa/201506-02"},{"type":"ADVISORY","url":"https://security.gentoo.org/glsa/201512-10"},{"type":"ADVISORY","url":"https://security.gentoo.org/glsa/201603-11"},{"type":"ADVISORY","url":"https://security.gentoo.org/glsa/201701-46"},{"type":"ADVISORY","url":"https://security.netapp.com/advisory/ntap-20150619-0001/"},{"type":"ADVISORY","url":"https://support.citrix.com/article/CTX216642"},{"type":"ADVISORY","url":"https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03831en_us"},{"type":"ADVISORY","url":"https://weakdh.org/"},{"type":"ADVISORY","url":"https://weakdh.org/imperfect-forward-secrecy.pdf"},{"type":"ADVISORY","url":"https://www-304.ibm.com/support/docview.wss?uid=swg21959745"},{"type":"ADVISORY","url":"https://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5098403"},{"type":"ADVISORY","url":"https://www.openssl.org/blog/blog/2015/05/20/logjam-freak-upcoming-changes/"},{"type":"ADVISORY","url":"https://www.openssl.org/news/secadv_20150611.txt"},{"type":"ADVISORY","url":"https://www.oracle.com/security-alerts/cpujan2021.html"},{"type":"ADVISORY","url":"https://www.suse.com/security/cve/CVE-2015-4000.html"}],"schema_version":"1.7.3","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N"}]}