cpe:/a:nodejs:node.js:6.6.0 cpe:/a:openssl:openssl:1.0.1 cpe:/a:openssl:openssl:1.0.1:beta1 cpe:/a:openssl:openssl:1.0.1:beta2 cpe:/a:openssl:openssl:1.0.1:beta3 cpe:/a:openssl:openssl:1.0.1a cpe:/a:openssl:openssl:1.0.1b cpe:/a:openssl:openssl:1.0.1c cpe:/a:openssl:openssl:1.0.1d cpe:/a:openssl:openssl:1.0.1e cpe:/a:openssl:openssl:1.0.1f cpe:/a:openssl:openssl:1.0.1g cpe:/a:openssl:openssl:1.0.1h cpe:/a:openssl:openssl:1.0.1i cpe:/a:openssl:openssl:1.0.1j cpe:/a:openssl:openssl:1.0.1k cpe:/a:openssl:openssl:1.0.1l cpe:/a:openssl:openssl:1.0.1m cpe:/a:openssl:openssl:1.0.1n cpe:/a:openssl:openssl:1.0.1o cpe:/a:openssl:openssl:1.0.1p cpe:/a:openssl:openssl:1.0.1q cpe:/a:openssl:openssl:1.0.1r cpe:/a:openssl:openssl:1.0.1s cpe:/a:openssl:openssl:1.0.1t cpe:/a:openssl:openssl:1.0.2 cpe:/a:openssl:openssl:1.0.2:beta1 cpe:/a:openssl:openssl:1.0.2:beta2 cpe:/a:openssl:openssl:1.0.2:beta3 cpe:/a:openssl:openssl:1.0.2a cpe:/a:openssl:openssl:1.0.2b cpe:/a:openssl:openssl:1.0.2c cpe:/a:openssl:openssl:1.0.2d cpe:/a:openssl:openssl:1.0.2e cpe:/a:openssl:openssl:1.0.2f cpe:/a:openssl:openssl:1.0.2h cpe:/a:openssl:openssl:1.1.0 cpe:/o:novell:suse_linux_enterprise_module_for_web_scripting:12.0 CVE-2016-6304 2016-09-26T15:59:00.157-04:00 2018-04-19T21:29:16.980-04:00 7.8 NETWORK LOW NONE NONE NONE COMPLETE http://nvd.nist.gov 2016-10-12T15:33:03.553-04:00 SECTRACK 1036878 SECTRACK 1037640 BID 93150 FREEBSD FreeBSD-SA-16:26 GENTOO GLSA-201612-16 REDHAT RHSA-2016:1940 REDHAT RHSA-2016:2802 REDHAT RHSA-2017:1413 REDHAT RHSA-2017:1414 REDHAT RHSA-2017:1415 REDHAT RHSA-2017:1658 REDHAT RHSA-2017:1659 REDHAT RHSA-2017:1801 REDHAT RHSA-2017:1802 REDHAT RHSA-2017:2493 REDHAT RHSA-2017:2494 SUSE SUSE-SU-2016:2470 CONFIRM http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10759 CONFIRM http://www-01.ibm.com/support/docview.wss?uid=swg21995039 CONFIRM http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html CONFIRM http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html CONFIRM http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html CONFIRM http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html CONFIRM http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html CONFIRM http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2016-3090545.html CONFIRM http://www.oracle.com/technetwork/topics/security/ovmbulletinoct2016-3090547.html CONFIRM http://www.splunk.com/view/SP-CAAAPSV CONFIRM http://www.splunk.com/view/SP-CAAAPUE CONFIRM https://bto.bluecoat.com/security-advisory/sa132 CONFIRM https://git.openssl.org/?p=openssl.git;a=commit;h=2c0d295e26306e15a92eb23a84a1802005c1c137 CONFIRM https://kc.mcafee.com/corporate/index?page=content&id=SB10171 CONFIRM https://nodejs.org/en/blog/vulnerability/september-2016-security-releases/ CONFIRM https://www.openssl.org/news/secadv/20160922.txt CONFIRM https://www.tenable.com/security/tns-2016-16 CONFIRM https://www.tenable.com/security/tns-2016-20 CONFIRM https://www.tenable.com/security/tns-2016-21 Multiple memory leaks in t1_lib.c in OpenSSL before 1.0.1u, 1.0.2 before 1.0.2i, and 1.1.0 before 1.1.0a allow remote attackers to cause a denial of service (memory consumption) via large OCSP Status Request extensions.