FKIE_CVE-2014-6502

Vulnerability from fkie_nvd - Published: 2014-10-15 22:55 - Updated: 2025-04-12 10:46
Severity ?
Summary
Unspecified vulnerability in Oracle Java SE 5.0u71, 6u81, 7u67, and 8u20, and Java SE Embedded 7u60, allows remote attackers to affect integrity via unknown vectors related to Libraries.
References
secalert_us@oracle.comhttp://linux.oracle.com/errata/ELSA-2014-1633.html
secalert_us@oracle.comhttp://linux.oracle.com/errata/ELSA-2014-1634.html
secalert_us@oracle.comhttp://linux.oracle.com/errata/ELSA-2014-1636
secalert_us@oracle.comhttp://lists.opensuse.org/opensuse-security-announce/2014-11/msg00013.html
secalert_us@oracle.comhttp://lists.opensuse.org/opensuse-security-announce/2014-11/msg00021.html
secalert_us@oracle.comhttp://lists.opensuse.org/opensuse-security-announce/2014-12/msg00002.html
secalert_us@oracle.comhttp://lists.opensuse.org/opensuse-security-announce/2015-02/msg00026.html
secalert_us@oracle.comhttp://lists.opensuse.org/opensuse-security-announce/2015-02/msg00027.html
secalert_us@oracle.comhttp://lists.opensuse.org/opensuse-security-announce/2015-02/msg00033.html
secalert_us@oracle.comhttp://lists.opensuse.org/opensuse-security-announce/2015-02/msg00036.html
secalert_us@oracle.comhttp://marc.info/?l=bugtraq&m=141775382904016&w=2
secalert_us@oracle.comhttp://rhn.redhat.com/errata/RHSA-2014-1620.html
secalert_us@oracle.comhttp://rhn.redhat.com/errata/RHSA-2014-1633.html
secalert_us@oracle.comhttp://rhn.redhat.com/errata/RHSA-2014-1634.html
secalert_us@oracle.comhttp://rhn.redhat.com/errata/RHSA-2014-1636.html
secalert_us@oracle.comhttp://rhn.redhat.com/errata/RHSA-2014-1657.html
secalert_us@oracle.comhttp://rhn.redhat.com/errata/RHSA-2014-1658.html
secalert_us@oracle.comhttp://rhn.redhat.com/errata/RHSA-2014-1876.html
secalert_us@oracle.comhttp://rhn.redhat.com/errata/RHSA-2014-1877.html
secalert_us@oracle.comhttp://rhn.redhat.com/errata/RHSA-2014-1880.html
secalert_us@oracle.comhttp://rhn.redhat.com/errata/RHSA-2014-1881.html
secalert_us@oracle.comhttp://rhn.redhat.com/errata/RHSA-2014-1882.html
secalert_us@oracle.comhttp://rhn.redhat.com/errata/RHSA-2015-0264.html
secalert_us@oracle.comhttp://secunia.com/advisories/60414
secalert_us@oracle.comhttp://secunia.com/advisories/60416
secalert_us@oracle.comhttp://secunia.com/advisories/60417
secalert_us@oracle.comhttp://secunia.com/advisories/61018
secalert_us@oracle.comhttp://secunia.com/advisories/61020
secalert_us@oracle.comhttp://secunia.com/advisories/61143
secalert_us@oracle.comhttp://secunia.com/advisories/61163
secalert_us@oracle.comhttp://secunia.com/advisories/61164
secalert_us@oracle.comhttp://secunia.com/advisories/61346
secalert_us@oracle.comhttp://secunia.com/advisories/61609
secalert_us@oracle.comhttp://secunia.com/advisories/61629
secalert_us@oracle.comhttp://secunia.com/advisories/61928
secalert_us@oracle.comhttp://security.gentoo.org/glsa/glsa-201502-12.xml
secalert_us@oracle.comhttp://www-01.ibm.com/support/docview.wss?uid=swg21688283
secalert_us@oracle.comhttp://www.debian.org/security/2014/dsa-3077
secalert_us@oracle.comhttp://www.debian.org/security/2014/dsa-3080
secalert_us@oracle.comhttp://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.htmlPatch, Vendor Advisory
secalert_us@oracle.comhttp://www.securityfocus.com/bid/70533
secalert_us@oracle.comhttp://www.ubuntu.com/usn/USN-2386-1
secalert_us@oracle.comhttp://www.ubuntu.com/usn/USN-2388-1
secalert_us@oracle.comhttp://www.ubuntu.com/usn/USN-2388-2
af854a3a-2127-422b-91ae-364da2661108http://linux.oracle.com/errata/ELSA-2014-1633.html
af854a3a-2127-422b-91ae-364da2661108http://linux.oracle.com/errata/ELSA-2014-1634.html
af854a3a-2127-422b-91ae-364da2661108http://linux.oracle.com/errata/ELSA-2014-1636
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-security-announce/2014-11/msg00013.html
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-security-announce/2014-11/msg00021.html
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-security-announce/2014-12/msg00002.html
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00026.html
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00027.html
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00033.html
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00036.html
af854a3a-2127-422b-91ae-364da2661108http://marc.info/?l=bugtraq&m=141775382904016&w=2
af854a3a-2127-422b-91ae-364da2661108http://rhn.redhat.com/errata/RHSA-2014-1620.html
af854a3a-2127-422b-91ae-364da2661108http://rhn.redhat.com/errata/RHSA-2014-1633.html
af854a3a-2127-422b-91ae-364da2661108http://rhn.redhat.com/errata/RHSA-2014-1634.html
af854a3a-2127-422b-91ae-364da2661108http://rhn.redhat.com/errata/RHSA-2014-1636.html
af854a3a-2127-422b-91ae-364da2661108http://rhn.redhat.com/errata/RHSA-2014-1657.html
af854a3a-2127-422b-91ae-364da2661108http://rhn.redhat.com/errata/RHSA-2014-1658.html
af854a3a-2127-422b-91ae-364da2661108http://rhn.redhat.com/errata/RHSA-2014-1876.html
af854a3a-2127-422b-91ae-364da2661108http://rhn.redhat.com/errata/RHSA-2014-1877.html
af854a3a-2127-422b-91ae-364da2661108http://rhn.redhat.com/errata/RHSA-2014-1880.html
af854a3a-2127-422b-91ae-364da2661108http://rhn.redhat.com/errata/RHSA-2014-1881.html
af854a3a-2127-422b-91ae-364da2661108http://rhn.redhat.com/errata/RHSA-2014-1882.html
af854a3a-2127-422b-91ae-364da2661108http://rhn.redhat.com/errata/RHSA-2015-0264.html
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/60414
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/60416
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/60417
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/61018
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/61020
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/61143
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/61163
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/61164
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/61346
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/61609
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/61629
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/61928
af854a3a-2127-422b-91ae-364da2661108http://security.gentoo.org/glsa/glsa-201502-12.xml
af854a3a-2127-422b-91ae-364da2661108http://www-01.ibm.com/support/docview.wss?uid=swg21688283
af854a3a-2127-422b-91ae-364da2661108http://www.debian.org/security/2014/dsa-3077
af854a3a-2127-422b-91ae-364da2661108http://www.debian.org/security/2014/dsa-3080
af854a3a-2127-422b-91ae-364da2661108http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.htmlPatch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/70533
af854a3a-2127-422b-91ae-364da2661108http://www.ubuntu.com/usn/USN-2386-1
af854a3a-2127-422b-91ae-364da2661108http://www.ubuntu.com/usn/USN-2388-1
af854a3a-2127-422b-91ae-364da2661108http://www.ubuntu.com/usn/USN-2388-2
Impacted products
Vendor Product Version
oracle jdk 1.5.0
oracle jdk 1.6.0
oracle jdk 1.7.0
oracle jre 1.5.0
oracle jre 1.6.0
oracle jre 1.7.0
oracle jre 1.7.0
oracle jre 1.8.0

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:oracle:jdk:1.5.0:update_71:*:*:*:*:*:*",
              "matchCriteriaId": "ABFFC778-4647-464C-8D4B-C5FFF9A8B881",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:jdk:1.6.0:update81:*:*:*:*:*:*",
              "matchCriteriaId": "A96B7B6D-890C-4CAF-A273-01E17D3FDBBA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:jdk:1.7.0:update60:*:*:*:*:*:*",
              "matchCriteriaId": "B3D836B0-936A-445F-A08F-C962FC8B91EF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:jre:1.5.0:update_71:*:*:*:*:*:*",
              "matchCriteriaId": "2537DFD3-4ACE-4448-964A-18CE2B8C71BC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:jre:1.6.0:update_81:*:*:*:*:*:*",
              "matchCriteriaId": "6D7DEDD2-FEF2-4FEC-B9BF-C1C3FA247A02",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:jre:1.7.0:update_67:*:*:*:*:*:*",
              "matchCriteriaId": "CE789D26-302F-44CF-AF63-EA0BA73E49E9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:jre:1.7.0:update60:*:*:*:*:*:*",
              "matchCriteriaId": "A85E8DD9-9B00-4C7E-802D-6E6A1BD3B9C0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:jre:1.8.0:update_20:*:*:*:*:*:*",
              "matchCriteriaId": "D776872E-A50A-498D-A68B-84DD910ED429",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Unspecified vulnerability in Oracle Java SE 5.0u71, 6u81, 7u67, and 8u20, and Java SE Embedded 7u60, allows remote attackers to affect integrity via unknown vectors related to Libraries."
    },
    {
      "lang": "es",
      "value": "Vulnerabilidad sin especificar en Oracle Java SE 5.0u71, 6u81, 7u67 y 8u20, y Java SE Embedded 7u60, permite a atacantes remotos afectar la confidencialidad a trav\u00e9s de vectores relacionados con las librer\u00edas."
    }
  ],
  "id": "CVE-2014-6502",
  "lastModified": "2025-04-12T10:46:40.837",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "LOW",
        "cvssData": {
          "accessComplexity": "HIGH",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 2.6,
          "confidentialityImpact": "NONE",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:H/Au:N/C:N/I:P/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 4.9,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2014-10-15T22:55:06.343",
  "references": [
    {
      "source": "secalert_us@oracle.com",
      "url": "http://linux.oracle.com/errata/ELSA-2014-1633.html"
    },
    {
      "source": "secalert_us@oracle.com",
      "url": "http://linux.oracle.com/errata/ELSA-2014-1634.html"
    },
    {
      "source": "secalert_us@oracle.com",
      "url": "http://linux.oracle.com/errata/ELSA-2014-1636"
    },
    {
      "source": "secalert_us@oracle.com",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2014-11/msg00013.html"
    },
    {
      "source": "secalert_us@oracle.com",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2014-11/msg00021.html"
    },
    {
      "source": "secalert_us@oracle.com",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2014-12/msg00002.html"
    },
    {
      "source": "secalert_us@oracle.com",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00026.html"
    },
    {
      "source": "secalert_us@oracle.com",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00027.html"
    },
    {
      "source": "secalert_us@oracle.com",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00033.html"
    },
    {
      "source": "secalert_us@oracle.com",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00036.html"
    },
    {
      "source": "secalert_us@oracle.com",
      "url": "http://marc.info/?l=bugtraq\u0026m=141775382904016\u0026w=2"
    },
    {
      "source": "secalert_us@oracle.com",
      "url": "http://rhn.redhat.com/errata/RHSA-2014-1620.html"
    },
    {
      "source": "secalert_us@oracle.com",
      "url": "http://rhn.redhat.com/errata/RHSA-2014-1633.html"
    },
    {
      "source": "secalert_us@oracle.com",
      "url": "http://rhn.redhat.com/errata/RHSA-2014-1634.html"
    },
    {
      "source": "secalert_us@oracle.com",
      "url": "http://rhn.redhat.com/errata/RHSA-2014-1636.html"
    },
    {
      "source": "secalert_us@oracle.com",
      "url": "http://rhn.redhat.com/errata/RHSA-2014-1657.html"
    },
    {
      "source": "secalert_us@oracle.com",
      "url": "http://rhn.redhat.com/errata/RHSA-2014-1658.html"
    },
    {
      "source": "secalert_us@oracle.com",
      "url": "http://rhn.redhat.com/errata/RHSA-2014-1876.html"
    },
    {
      "source": "secalert_us@oracle.com",
      "url": "http://rhn.redhat.com/errata/RHSA-2014-1877.html"
    },
    {
      "source": "secalert_us@oracle.com",
      "url": "http://rhn.redhat.com/errata/RHSA-2014-1880.html"
    },
    {
      "source": "secalert_us@oracle.com",
      "url": "http://rhn.redhat.com/errata/RHSA-2014-1881.html"
    },
    {
      "source": "secalert_us@oracle.com",
      "url": "http://rhn.redhat.com/errata/RHSA-2014-1882.html"
    },
    {
      "source": "secalert_us@oracle.com",
      "url": "http://rhn.redhat.com/errata/RHSA-2015-0264.html"
    },
    {
      "source": "secalert_us@oracle.com",
      "url": "http://secunia.com/advisories/60414"
    },
    {
      "source": "secalert_us@oracle.com",
      "url": "http://secunia.com/advisories/60416"
    },
    {
      "source": "secalert_us@oracle.com",
      "url": "http://secunia.com/advisories/60417"
    },
    {
      "source": "secalert_us@oracle.com",
      "url": "http://secunia.com/advisories/61018"
    },
    {
      "source": "secalert_us@oracle.com",
      "url": "http://secunia.com/advisories/61020"
    },
    {
      "source": "secalert_us@oracle.com",
      "url": "http://secunia.com/advisories/61143"
    },
    {
      "source": "secalert_us@oracle.com",
      "url": "http://secunia.com/advisories/61163"
    },
    {
      "source": "secalert_us@oracle.com",
      "url": "http://secunia.com/advisories/61164"
    },
    {
      "source": "secalert_us@oracle.com",
      "url": "http://secunia.com/advisories/61346"
    },
    {
      "source": "secalert_us@oracle.com",
      "url": "http://secunia.com/advisories/61609"
    },
    {
      "source": "secalert_us@oracle.com",
      "url": "http://secunia.com/advisories/61629"
    },
    {
      "source": "secalert_us@oracle.com",
      "url": "http://secunia.com/advisories/61928"
    },
    {
      "source": "secalert_us@oracle.com",
      "url": "http://security.gentoo.org/glsa/glsa-201502-12.xml"
    },
    {
      "source": "secalert_us@oracle.com",
      "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21688283"
    },
    {
      "source": "secalert_us@oracle.com",
      "url": "http://www.debian.org/security/2014/dsa-3077"
    },
    {
      "source": "secalert_us@oracle.com",
      "url": "http://www.debian.org/security/2014/dsa-3080"
    },
    {
      "source": "secalert_us@oracle.com",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html"
    },
    {
      "source": "secalert_us@oracle.com",
      "url": "http://www.securityfocus.com/bid/70533"
    },
    {
      "source": "secalert_us@oracle.com",
      "url": "http://www.ubuntu.com/usn/USN-2386-1"
    },
    {
      "source": "secalert_us@oracle.com",
      "url": "http://www.ubuntu.com/usn/USN-2388-1"
    },
    {
      "source": "secalert_us@oracle.com",
      "url": "http://www.ubuntu.com/usn/USN-2388-2"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://linux.oracle.com/errata/ELSA-2014-1633.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://linux.oracle.com/errata/ELSA-2014-1634.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://linux.oracle.com/errata/ELSA-2014-1636"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2014-11/msg00013.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2014-11/msg00021.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2014-12/msg00002.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00026.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00027.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00033.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00036.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://marc.info/?l=bugtraq\u0026m=141775382904016\u0026w=2"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://rhn.redhat.com/errata/RHSA-2014-1620.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://rhn.redhat.com/errata/RHSA-2014-1633.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://rhn.redhat.com/errata/RHSA-2014-1634.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://rhn.redhat.com/errata/RHSA-2014-1636.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://rhn.redhat.com/errata/RHSA-2014-1657.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://rhn.redhat.com/errata/RHSA-2014-1658.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://rhn.redhat.com/errata/RHSA-2014-1876.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://rhn.redhat.com/errata/RHSA-2014-1877.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://rhn.redhat.com/errata/RHSA-2014-1880.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://rhn.redhat.com/errata/RHSA-2014-1881.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://rhn.redhat.com/errata/RHSA-2014-1882.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://rhn.redhat.com/errata/RHSA-2015-0264.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/60414"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/60416"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/60417"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/61018"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/61020"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/61143"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/61163"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/61164"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/61346"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/61609"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/61629"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/61928"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://security.gentoo.org/glsa/glsa-201502-12.xml"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21688283"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.debian.org/security/2014/dsa-3077"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.debian.org/security/2014/dsa-3080"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/70533"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.ubuntu.com/usn/USN-2386-1"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.ubuntu.com/usn/USN-2388-1"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.ubuntu.com/usn/USN-2388-2"
    }
  ],
  "sourceIdentifier": "secalert_us@oracle.com",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-noinfo"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…