Vulnerability Name:

CVE-2021-3450 (CCN-198754)

Assigned:2021-03-25
Published:2021-03-25
Updated:2023-08-04
Summary:
CVSS v3 Severity:7.4 High (CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N)
6.4 Medium (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): High
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): High
Integrity (I): High
Availibility (A): None
7.4 High (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:H)
6.4 Medium (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:H/E:U/RL:O/RC:C)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): High
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): None
Integrity (I): High
Availibility (A): High
7.4 High (REDHAT CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N)
6.4 Medium (REDHAT Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): High
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): High
Integrity (I): High
Availibility (A): None
CVSS v2 Severity:5.8 Medium (CVSS v2 Vector: AV:N/AC:M/Au:N/C:P/I:P/A:N)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Medium
Authentication (Au): None
Impact Metrics:Confidentiality (C): Partial
Integrity (I): Partial
Availibility (A): None
7.1 High (CCN CVSS v2 Vector: AV:N/AC:H/Au:N/C:N/I:C/A:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): High
Athentication (Au): None
Impact Metrics:Confidentiality (C): None
Integrity (I): Complete
Availibility (A): Complete
Vulnerability Consequences:Bypass Security
References:Source: MITRE
Type: CNA
CVE-2021-3450

Source: openssl-security@openssl.org
Type: Mailing List, Third Party Advisory
openssl-security@openssl.org

Source: openssl-security@openssl.org
Type: Mailing List, Third Party Advisory
openssl-security@openssl.org

Source: openssl-security@openssl.org
Type: Mailing List, Third Party Advisory
openssl-security@openssl.org

Source: openssl-security@openssl.org
Type: Mailing List, Third Party Advisory
openssl-security@openssl.org

Source: openssl-security@openssl.org
Type: Third Party Advisory
openssl-security@openssl.org

Source: XF
Type: UNKNOWN
openssl-cve20213450-sec-bypass(198754)

Source: openssl-security@openssl.org
Type: Mailing List, Patch, Vendor Advisory
openssl-security@openssl.org

Source: openssl-security@openssl.org
Type: Third Party Advisory
openssl-security@openssl.org

Source: openssl-security@openssl.org
Type: Third Party Advisory
openssl-security@openssl.org

Source: openssl-security@openssl.org
Type: Mailing List, Third Party Advisory
openssl-security@openssl.org

Source: openssl-security@openssl.org
Type: Mailing List, Vendor Advisory
openssl-security@openssl.org

Source: CCN
Type: Node.js Blog, 2021-04-06
April 2021 Security Releases

Source: openssl-security@openssl.org
Type: Third Party Advisory
openssl-security@openssl.org

Source: openssl-security@openssl.org
Type: Third Party Advisory
openssl-security@openssl.org

Source: openssl-security@openssl.org
Type: Third Party Advisory
openssl-security@openssl.org

Source: openssl-security@openssl.org
Type: Third Party Advisory
openssl-security@openssl.org

Source: CCN
Type: Cisco Security Advisory cisco-sa-openssl-2021-GHY28dJd
Multiple Vulnerabilities in OpenSSL Affecting Cisco Products: March 2021

Source: openssl-security@openssl.org
Type: Third Party Advisory
openssl-security@openssl.org

Source: CCN
Type: IBM Security Bulletin 6442895 (Rational ClearQuest)
Vulnerabilities in OpenSSL affect IBM Rational ClearQuest (CVE-2021-3449, CVE-2021-3450)

Source: CCN
Type: IBM Security Bulletin 6443733 (i)
OpenSSL for IBM i is affected by CVE-2021-3449 and CVE-2021-3450

Source: CCN
Type: IBM Security Bulletin 6445493 (Watson Speech Services)
Update available for OpenSSL vulnerabilities affecting IBM Watson Speech Services 1.2.1

Source: CCN
Type: IBM Security Bulletin 6447788 (Sterling Connect:Express for UNIX)
OpenSSL Vulnerabilities Affect IBM Sterling Connect:Express for UNIX (CVE-2021-3049, CVE-2021-3050)

Source: CCN
Type: IBM Security Bulletin 6448846 (App Connect Enterprise Certified Container)
IBM App Connect Enterprise Certified Container may be affected by OpenSSL vulnerabilities (CVE-2021-3449 and CVE-2021-3450)

Source: CCN
Type: IBM Security Bulletin 6454457 (Elastic Storage Server)
IBM Elastic Storage System systems are affected by vulnerabilities in OpenSSL

Source: CCN
Type: IBM Security Bulletin 6454803 (Spectrum Control)
Vulnerabilities in XStream, Java, OpenSSL, WebSphere Application Server Liberty and Node.js affect IBM Spectrum Control

Source: CCN
Type: IBM Security Bulletin 6462927 (Rational ClearCase)
Vulnerability in OpenSSL affects IBM Rational ClearCase (CVE-2020-1971, CVE-2021-23839, CVE-2021-23840, CVE-2021-23841, CVE-2021-23839, CVE-2021-23840, CVE-2021-23841)

Source: CCN
Type: IBM Security Bulletin 6463307 (MQ for HPE NonStop)
IBM MQ for HPE NonStop Server is affected by OpenSSL vulnerabilities (CVE-2021-3449 and CVE-2021-3450)

Source: CCN
Type: IBM Security Bulletin 6463309 (WebSphere MQ for HP NonStop)
WebSphere MQ for HP NonStop Server is affected by OpenSSL vulnerabilities (CVE-2021-3449 and CVE-2021-3450)

Source: CCN
Type: IBM Security Bulletin 6466315 (App Connect Enterprise)
Vulnerabilities in OpenSSL affect IBM Integration Bus and IBM App Connect Enterprise v11 (CVE-2021-3449 , CVE-2021-3450)

Source: CCN
Type: IBM Security Bulletin 6466329 (Cloud Transformation Advisor)
IBM Cloud Transformation Advisor is affected by Node.js vulnerabilities

Source: CCN
Type: IBM Security Bulletin 6466639 (Cloud Pak for Integration)
IBM Cloud Pak for Integration is vulnerable to OpenSSL vulnerabilities (CVE-2021-3449 and CVE-2021-3450)

Source: CCN
Type: IBM Security Bulletin 6467073 (Business Automation Workflow)
Security vulnerabilities in IBM SDK for Node.js might affect the configuration editor used by IBM Business Automation Workflow and Business Process Manager (BPM)

Source: CCN
Type: IBM Security Bulletin 6467639 (Integration Bus)
IBM Integration Bus and IBM App Connect Enterprise v11 are affected by vulnerabilities in Node.js (CVE-2021-3450, CVE-2021-3449)

Source: CCN
Type: IBM Security Bulletin 6467937 (MobileFirst Foundation)
OpenSSL publicly disclosed vulnerability affects IBM MobileFirst Platform Foundation.

Source: CCN
Type: IBM Security Bulletin 6472137 (Netcool/System Service Monitor)
Multiple vulnerabilities in OpenSSL affect IBM Tivoli Netcool System Service Monitors/Application Service Monitors

Source: CCN
Type: IBM Security Bulletin 6473493 (InfoSphere Information Server)
Multiple vulnerabilities in OpenSSL affects IBM InfoSphere Information Server

Source: CCN
Type: IBM Security Bulletin 6476334 (WA for ICP)
Potential vulnerability with Node.js

Source: CCN
Type: IBM Security Bulletin 6476346 (Security Verify Gateway)
Multiple Security Vulnerabilities fixed in Openssl as shipped with IBM Security Verify products

Source: CCN
Type: IBM Security Bulletin 6476632 (WA for ICP)
Potential vulnerability in OpenSSL

Source: CCN
Type: IBM Security Bulletin 6476940 (Cloud Pak for Security)
Cloud Pak for Security has several security vulnerabilities addressed in the latest version

Source: CCN
Type: IBM Security Bulletin 6477016 (API Connect)
IBM API Connect is impacted by multiple OpenSSL vulnerabilities

Source: CCN
Type: IBM Security Bulletin 6479351 (Workload Scheduler)
Multiple vulnerabilities in OpenSSL may affect IBM Workload Scheduler

Source: CCN
Type: IBM Security Bulletin 6486347 (Cloud Private)
IBM Cloud Private is vulnerable to OpenSSL vulnerabilities (CVE-2021-3449, CVE-2021-3450)

Source: CCN
Type: IBM Security Bulletin 6491127 (Security Guardium Insights)
IBM Security Guardium Insights is affected by multiple vulnerabilities (CVE-2021-3538, CVE-2021-33502, CVE-2021-3450, CVE-2021-3449)

Source: CCN
Type: IBM Security Bulletin 6491653 (Security Verify Bridge)
ultiple vulnerabilities fixed in IBM Security Verify Bridge - Docker

Source: CCN
Type: IBM Security Bulletin 6493729 (Cloud Pak for Security)
Cloud Pak for Security is vulnerable to several CVEs

Source: CCN
Type: IBM Security Bulletin 6520474 (QRadar SIEM)
IBM QRadar SIEM Application Framework Base Image is vulnerable to using components with Known Vulnerabilities

Source: CCN
Type: IBM Security Bulletin 6520674 (QRadar SIEM)
IBM QRadar SIEM Application Framework v1 (CentOS6) is End of Life

Source: CCN
Type: IBM Security Bulletin 6523070 (Power System AC922 8335-GTH)
This Power System update is being released to address CVE 2021-3450 and CVE 2021-3449

Source: CCN
Type: IBM Security Bulletin 6536652 (App Connect Professional)
App Connect Professional & IBM WebSphere Cast Iron Solution are affected by OpenSSL vulnerability

Source: CCN
Type: IBM Security Bulletin 6538418 (Security Verify Access)
Multiple Security Vulnerabilities fixed in IBM Security Verify Access

Source: CCN
Type: IBM Security Bulletin 6589173 (Security Verify Adapter)
IBM Security Verify Adapters are vulnerable to denial of service and bypass security restrictions due to OpenSSL (CVE-2021-3449, CVE-2021-3450)

Source: CCN
Type: IBM Security Bulletin 6591203 (Netcool Agile Service Manager)
Multiple Vulnerabilities in Node.js affects IBM Netcool Agile Service Manager

Source: CCN
Type: IBM Security Bulletin 6985587 (Safer Payments)
OpenSSL security vulnerability CVE-2021-3449 and CVE-2021-3450 in IBM Safer Payments versions of 6.1 and 6.2 below 6.1.0.08 and 6.2.1.03

Source: CCN
Type: OpenSSL Security Advisory [25 March 2021]
OpenSSL Security Advisory [25 March 2021]

Source: openssl-security@openssl.org
Type: Vendor Advisory
openssl-security@openssl.org

Source: openssl-security@openssl.org
Type: Patch, Third Party Advisory
openssl-security@openssl.org

Source: CCN
Type: Oracle Critical Patch Update Advisory - April 2021
Oracle Critical Patch Update Advisory - April 2021

Source: openssl-security@openssl.org
Type: Patch, Third Party Advisory
openssl-security@openssl.org

Source: CCN
Type: Oracle CPUApr2022
Oracle Critical Patch Update Advisory - April 2022

Source: openssl-security@openssl.org
Type: Patch, Third Party Advisory
openssl-security@openssl.org

Source: CCN
Type: Oracle CPUJul2021
Oracle Critical Patch Update Advisory - July 2021

Source: CCN
Type: Oracle CPUJul2022
Oracle Critical Patch Update Advisory - July 2022

Source: openssl-security@openssl.org
Type: Patch, Third Party Advisory
openssl-security@openssl.org

Source: CCN
Type: Oracle CPUOct2021
Oracle Critical Patch Update Advisory - October 2021

Source: openssl-security@openssl.org
Type: Patch, Third Party Advisory
openssl-security@openssl.org

Source: openssl-security@openssl.org
Type: Third Party Advisory
openssl-security@openssl.org

Source: openssl-security@openssl.org
Type: Third Party Advisory
openssl-security@openssl.org

Source: openssl-security@openssl.org
Type: Third Party Advisory
openssl-security@openssl.org

Source: CCN
Type: WhiteSource Vulnerability Database
CVE-2021-3450

Vulnerable Configuration:Configuration RedHat 1:
  • cpe:/o:redhat:enterprise_linux:8:*:*:*:*:*:*:*
  • Configuration RedHat 2:
  • cpe:/o:redhat:enterprise_linux:8::baseos:*:*:*:*:*

  • Configuration CCN 1:
  • cpe:/a:openssl:openssl:1.1.1h:*:*:*:*:*:*:*
  • OR cpe:/a:openssl:openssl:1.1.1i:*:*:*:*:*:*:*
  • OR cpe:/a:openssl:openssl:1.1.1j:*:*:*:*:*:*:*
  • AND
  • cpe:/a:ibm:rational_clearcase:8.0.1:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:business_process_manager:8.5:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:rational_clearcase:8.0.0:*:*:*:*:*:*:*
  • OR cpe:/o:ibm:i:7.1:*:*:*:*:*:*:*
  • OR cpe:/o:ibm:i:7.2:*:*:*:*:*:*:*
  • OR cpe:/a:cisco:prime_infrastructure:-:*:*:*:*:*:*:*
  • OR cpe:/a:cisco:video_surveillance_media_server:-:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:netcool/system_service_monitor:4.0.1:*:*:*:*:*:*:*
  • OR cpe:/o:ibm:i:7.3:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:api_connect:5.0.0.0:*:*:*:*:*:*:*
  • OR cpe:/a:cisco:evolved_programmable_network_manager:*:*:*:*:*:*:*:*
  • OR cpe:/a:cisco:meeting_server:-:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:rational_clearquest:9.0.1:*:*:*:*:*:*:*
  • OR cpe:/a:oracle:jd_edwards_world_security:a9.4:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:workload_scheduler:9.4:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:business_process_manager:8.6:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:rational_clearcase:9.0.1:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:infosphere_information_server:11.7:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:qradar_security_information_and_event_manager:7.3:*:*:*:*:*:*:*
  • OR cpe:/a:nodejs:node.js:10:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:workload_automation:9.4:*:*:*:*:*:*:*
  • OR cpe:/a:oracle:peoplesoft_enterprise_peopletools:8.57:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:sterling_connect:express:1.5.0:*:*:*:unix:*:*:*
  • OR cpe:/a:ibm:integration_bus:10.0.0:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:app_connect:11.0.0.0:*:*:*:enterprise:*:*:*
  • OR cpe:/a:ibm:integration_bus:10.0.0.0:*:*:*:*:*:*:*
  • OR cpe:/h:cisco:ip_conference_phone_7832:-:*:*:*:*:*:*:*
  • OR cpe:/h:cisco:ip_conference_phone_8832:-:*:*:*:*:*:*:*
  • OR cpe:/o:ibm:i:7.4:*:*:*:*:*:*:*
  • OR cpe:/a:nodejs:node.js:12:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:spectrum_control:5.3.1:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:spectrum_control:5.3.2:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:spectrum_control:5.3.3:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:spectrum_control:5.3.0.1:*:*:*:*:*:*:*
  • OR cpe:/a:cisco:managed_services_accelerator:-:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:mq_for_hpe_nonstop:8.1.0:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:mq_for_hpe_nonstop:8.0.4:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:elastic_storage_server:6.0.0:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:workload_automation:9.5:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:cloud_private:3.2.1:cd:*:*:*:*:*:*
  • OR cpe:/a:nodejs:node.js:14.0:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:qradar_security_information_and_event_manager:7.4:-:*:*:*:*:*:*
  • OR cpe:/a:ibm:business_automation_workflow:18.0:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:business_automation_workflow:19.0:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:business_automation_workflow:20.0:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:rational_clearquest:9.0.0:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:rational_clearquest:9.0.2:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:cloud_private:3.2.2:cd:*:*:*:*:*:*
  • OR cpe:/a:ibm:spectrum_control:5.3.4:*:standard:*:*:*:*:*
  • OR cpe:/a:ibm:spectrum_control:5.3.5:*:standard:*:*:*:*:*
  • OR cpe:/a:ibm:spectrum_control:5.3.6:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:spectrum_control:5.3.7:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:api_connect:10.0.0:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:security_verify_access:10.0.0:*:*:*:*:*:*:*
  • OR cpe:/h:cisco:webex_room_phone:-:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:spectrum_control:5.4.1:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:security_verify_access:10.0.2.0:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:cloud_pak_for_security:1.6.0.0:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:cloud_pak_for_security:1.5.0.1:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:cloud_pak_for_security:1.5.0.0:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:workload_scheduler:9.5:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:cloud_pak_for_security:1.6.0.1:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:app_connect_enterprise:12.0.1.0:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:api_connect:5.0.8.11:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:cloud_pak_for_security:1.7.0.0:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:cloud_pak_for_security:1.7.1.0:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:cloud_pak_for_security:1.7.2.0:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:security_verify_access:10.0.1.0:*:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    Oval Definitions
    Definition IDClassTitleLast Modified
    oval:org.opensuse.security:def:8181
    P
    Security update for terraform-provider-null (Important)
    2023-06-21
    oval:org.opensuse.security:def:8157
    P
    Security update for terraform-provider-aws (Important)
    2023-06-21
    oval:org.opensuse.security:def:7630
    P
    libopenssl-1_1-devel-1.1.1l-150500.15.4 on GA media (Moderate)
    2023-06-12
    oval:org.opensuse.security:def:8156
    P
    Security update for openvswitch (Important)
    2023-05-19
    oval:org.opensuse.security:def:6094
    P
    Security update for squid (Important)
    2022-07-12
    oval:org.opensuse.security:def:3045
    P
    cups-pk-helper-0.2.5-5.1 on GA media (Moderate)
    2022-06-28
    oval:org.opensuse.security:def:94675
    P
    libopenssl-1_1-devel-1.1.1l-150400.5.14 on GA media (Moderate)
    2022-06-22
    oval:org.opensuse.security:def:99503
    P
    (Important)
    2022-03-23
    oval:org.opensuse.security:def:112741
    P
    libopenssl-1_1-devel-1.1.1l-1.2 on GA media (Moderate)
    2022-01-17
    oval:org.opensuse.security:def:99702
    P
    (Important)
    2021-12-06
    oval:org.opensuse.security:def:100011
    P
    (Moderate)
    2021-11-04
    oval:org.opensuse.security:def:106213
    P
    libopenssl-1_1-devel-1.1.1l-1.2 on GA media (Moderate)
    2021-10-01
    oval:org.opensuse.security:def:110973
    P
    Security update for nodejs12 (Important)
    2021-07-19
    oval:org.opensuse.security:def:110976
    P
    Security update for nodejs10 (Important)
    2021-07-19
    oval:org.opensuse.security:def:10118
    P
    Security update for nodejs10 (Important)
    2021-07-15
    oval:org.opensuse.security:def:99112
    P
    Security update for nodejs10 (Important)
    2021-07-15
    oval:org.opensuse.security:def:92752
    P
    Security update for nodejs10 (Important)
    2021-07-15
    oval:org.opensuse.security:def:69893
    P
    Security update for nodejs10 (Important)
    2021-07-15
    oval:org.opensuse.security:def:118574
    P
    Security update for nodejs10 (Important)
    2021-07-15
    oval:org.opensuse.security:def:9364
    P
    Security update for nodejs10 (Important)
    2021-07-15
    oval:org.opensuse.security:def:92162
    P
    Security update for nodejs10 (Important)
    2021-07-15
    oval:org.opensuse.security:def:10304
    P
    Security update for nodejs10 (Important)
    2021-07-15
    oval:org.opensuse.security:def:8620
    P
    Security update for nodejs10 (Important)
    2021-07-15
    oval:org.opensuse.security:def:99304
    P
    Security update for nodejs10 (Important)
    2021-07-15
    oval:org.opensuse.security:def:109478
    P
    Security update for nodejs10 (Important)
    2021-07-15
    oval:org.opensuse.security:def:92950
    P
    Security update for nodejs10 (Important)
    2021-07-15
    oval:org.opensuse.security:def:70258
    P
    Security update for nodejs10 (Important)
    2021-07-15
    oval:org.opensuse.security:def:67183
    P
    Security update for nodejs10 (Important)
    2021-07-15
    oval:org.opensuse.security:def:9554
    P
    Security update for nodejs10 (Important)
    2021-07-15
    oval:org.opensuse.security:def:96122
    P
    Security update for nodejs10 (Important)
    2021-07-15
    oval:org.opensuse.security:def:111623
    P
    Security update for nodejs10 (Important)
    2021-07-15
    oval:org.opensuse.security:def:92354
    P
    Security update for nodejs10 (Important)
    2021-07-15
    oval:org.opensuse.security:def:69504
    P
    Security update for nodejs10 (Important)
    2021-07-15
    oval:org.opensuse.security:def:76251
    P
    Security update for nodejs10 (Important)
    2021-07-15
    oval:org.opensuse.security:def:8806
    P
    Security update for nodejs10 (Important)
    2021-07-15
    oval:org.opensuse.security:def:93103
    P
    Security update for nodejs10 (Important)
    2021-07-15
    oval:org.opensuse.security:def:70444
    P
    Security update for nodejs10 (Important)
    2021-07-15
    oval:org.opensuse.security:def:9753
    P
    Security update for nodejs10 (Important)
    2021-07-15
    oval:org.opensuse.security:def:102812
    P
    Security update for nodejs10 (Important)
    2021-07-15
    oval:org.opensuse.security:def:98917
    P
    Security update for nodejs10 (Important)
    2021-07-15
    oval:org.opensuse.security:def:92553
    P
    Security update for nodejs10 (Important)
    2021-07-15
    oval:org.opensuse.security:def:69694
    P
    Security update for nodejs10 (Important)
    2021-07-15
    oval:org.opensuse.security:def:9001
    P
    Security update for nodejs10 (Important)
    2021-07-15
    oval:org.opensuse.security:def:93256
    P
    Security update for nodejs10 (Important)
    2021-07-15
    oval:org.opensuse.security:def:91967
    P
    Security update for nodejs10 (Important)
    2021-07-15
    oval:org.opensuse.security:def:69246
    P
    Security update for nodejs10 (Important)
    2021-07-15
    oval:org.opensuse.security:def:102264
    P
    Security update for nodejs12 (Important)
    2021-07-14
    oval:org.opensuse.security:def:109477
    P
    Security update for nodejs12 (Important)
    2021-07-14
    oval:org.opensuse.security:def:49444
    P
    Security update for nodejs12 (Important)
    2021-07-14
    oval:org.opensuse.security:def:96121
    P
    Security update for nodejs12 (Important)
    2021-07-14
    oval:org.opensuse.security:def:111621
    P
    Security update for nodejs12 (Important)
    2021-07-14
    oval:org.opensuse.security:def:69270
    P
    Security update for nodejs12 (Important)
    2021-07-14
    oval:org.opensuse.security:def:102811
    P
    Security update for nodejs12 (Important)
    2021-07-14
    oval:org.opensuse.security:def:20972
    P
    Security update for nodejs10 (Important)
    2021-07-14
    oval:org.opensuse.security:def:69245
    P
    Security update for nodejs12 (Important)
    2021-07-14
    oval:org.opensuse.security:def:49443
    P
    Security update for nodejs10 (Important)
    2021-07-14
    oval:org.opensuse.security:def:118573
    P
    Security update for nodejs12 (Important)
    2021-07-14
    oval:org.opensuse.security:def:20973
    P
    Security update for nodejs12 (Important)
    2021-07-14
    oval:com.redhat.rhsa:def:20211024
    P
    RHSA-2021:1024: openssl security update (Important)
    2021-03-30
    BACK
    openssl openssl 1.1.1h
    openssl openssl 1.1.1i
    openssl openssl 1.1.1j
    ibm rational clearcase 8.0.1
    ibm business process manager 8.5
    ibm rational clearcase 8.0.0
    ibm i 7.1
    ibm i 7.2
    cisco prime infrastructure -
    cisco video surveillance media server -
    ibm netcool/system service monitor 4.0.1
    ibm i 7.3
    ibm api connect 5.0.0.0
    cisco evolved programmable network manager *
    cisco meeting server -
    ibm rational clearquest 9.0.1
    oracle jd edwards world security a9.4
    ibm workload scheduler 9.4
    ibm business process manager 8.6
    ibm rational clearcase 9.0.1
    ibm infosphere information server 11.7
    ibm qradar security information and event manager 7.3
    nodejs node.js 10
    ibm workload automation 9.4
    oracle peoplesoft enterprise peopletools 8.57
    ibm sterling connect:express 1.5.0
    ibm integration bus 10.0.0
    ibm app connect 11.0.0.0
    ibm integration bus 10.0.0.0
    cisco ip conference phone 7832 -
    cisco ip conference phone 8832 -
    ibm i 7.4
    nodejs node.js 12
    ibm spectrum control 5.3.1
    ibm spectrum control 5.3.2
    ibm spectrum control 5.3.3
    ibm spectrum control 5.3.0.1
    cisco managed services accelerator -
    ibm mq for hpe nonstop 8.1.0
    ibm mq for hpe nonstop 8.0.4
    ibm elastic storage server 6.0.0
    ibm workload automation 9.5
    ibm cloud private 3.2.1 cd
    nodejs node.js 14.0
    ibm qradar security information and event manager 7.4 -
    ibm business automation workflow 18.0
    ibm business automation workflow 19.0
    ibm business automation workflow 20.0
    ibm rational clearquest 9.0.0
    ibm rational clearquest 9.0.2
    ibm cloud private 3.2.2 cd
    ibm spectrum control 5.3.4
    ibm spectrum control 5.3.5
    ibm spectrum control 5.3.6
    ibm spectrum control 5.3.7
    ibm api connect 10.0.0
    ibm security verify access 10.0.0
    cisco webex room phone -
    ibm spectrum control 5.4.1
    ibm security verify access 10.0.2.0
    ibm cloud pak for security 1.6.0.0
    ibm cloud pak for security 1.5.0.1
    ibm cloud pak for security 1.5.0.0
    ibm workload scheduler 9.5
    ibm cloud pak for security 1.6.0.1
    ibm app connect enterprise 12.0.1.0
    ibm api connect 5.0.8.11
    ibm cloud pak for security 1.7.0.0
    ibm cloud pak for security 1.7.1.0
    ibm cloud pak for security 1.7.2.0
    ibm security verify access 10.0.1.0