gptkbp:instance_of
|
gptkb:software
|
gptkbp:affects
|
gptkb:chess_match
|
gptkbp:allows
|
memory leak
|
gptkbp:certification
|
5.0
|
gptkbp:community_support
|
urgent
|
gptkbp:consequences
|
loss of sensitive data
|
gptkbp:content_type
|
gptkb:football_club
|
gptkbp:defense_mechanism
|
sending crafted heartbeat requests
|
gptkbp:difficulty
|
critical
|
gptkbp:discovered_by
|
gptkb:Neel_Mehta
|
gptkbp:economic_impact
|
trust issues
|
gptkbp:enforces
|
recommended
|
gptkbp:feedback
|
patching efforts
|
gptkbp:has_version
|
gptkb:Open_SSL_1.0.1g
|
https://www.w3.org/2000/01/rdf-schema#label
|
Heartbleed vulnerability
|
gptkbp:impact
|
data theft
|
gptkbp:is_affected_by
|
gptkb:server
|
gptkbp:is_influential_in
|
exposed private keys
|
gptkbp:is_monitored_by
|
conducted
|
gptkbp:is_vulnerable_to
|
2 years
critical
attackers
responsible
essential
buffer over-read
cryptographic vulnerability
heartbeat extension
|
gptkbp:issues
|
gptkb:HTTPS
|
gptkbp:latest_version
|
Open SSL 1.0.1 to 1.0.1f
|
gptkbp:media_coverage
|
extensive
|
gptkbp:open_to_public
|
April 7, 2014
|
gptkbp:primary_user
|
millions
|
gptkbp:public_perception
|
concerned
|
gptkbp:regulatory_compliance
|
required
increased
|
gptkbp:related_to
|
gptkb:TLS/_SSL_protocols
|
gptkbp:reports_to
|
published
|
gptkbp:responds_to
|
security patches
immediate
|
gptkbp:security_features
|
gptkb:standard
gptkb:CVE-2014-0160
ongoing
important
improved
regular updates
critical
widespread
reported
revised
enhanced
vulnerability scanners
NIST guidelines
|
gptkbp:student_organizations
|
various companies
|
gptkbp:supports
|
web servers
|
gptkbp:sustainability_initiatives
|
update Open SSL
|
gptkbp:updates
|
April 2014
necessary
|
gptkbp:year_created
|
April 2012
|