var-201508-0177
Vulnerability from variot

Apache Flex BlazeDS, as used in flex-messaging-core.jar in Adobe LiveCycle Data Services (LCDS) 3.0.x before 3.0.0.354170, 4.5 before 4.5.1.354169, 4.6.2 before 4.6.2.354169, and 4.7 before 4.7.0.354169 and other products, allows remote attackers to read arbitrary files via an AMF message containing an XML external entity declaration in conjunction with an entity reference, related to an XML External Entity (XXE) issue. This vulnerability allows remote attackers to disclose sensitive information on affected installations of Cisco Nexus Dashboard Fabric Controller. Authentication is not required to exploit this vulnerability.The specific flaw exists within the handling of the AMF protocol. Due to the improper restriction of XML External Entity (XXE) references, a crafted document specifying a URI causes the XML parser to access the URI and embed the contents back into the XML document for further processing. An attacker can leverage this vulnerability to disclose information in the context of the fmserver user. Attackers can exploit this issue to obtain sensitive information that may lead to further attacks. However this expanded information is not automatically transferred back to the client, but could be made available by the application. ------------------------------------------------------------------------ VMware Security Advisory

Advisory ID: VMSA-2015-0008 Synopsis: VMware product updates address information disclosure issue

Issue date: 2015-11-18 Updated on: 2015-11-18 CVE number: CVE-2015-3269


  1. Summary

VMware product updates address information disclosure issue.

  1. Relevant Releases

VMware vCenter Server 5.5 prior to version 5.5 update 3 VMware vCenter Server 5.1 prior to version 5.1 update u3b VMware vCenter Server 5.0 prior to version 5.0 update u3e

vCloud Director 5.6 prior to version 5.6.4 vCloud Director 5.5 prior to version 5.5.3

VMware Horizon View 6.0 prior to version 6.1 VMware Horizon View 5.0 prior to version 5.3.4

  1. Problem Description

a. vCenter Server, vCloud Director, Horizon View information disclosure issue. A specially crafted XML request sent to the server could lead to unintended information be disclosed.

VMware would like to thank Matthias Kaiser of Code White GmbH for
reporting this issue to us.

The Common Vulnerabilities and Exposures project (cve.mitre.org)
has assigned the identifier CVE-2015-3269  to this issue.

Column 4 of the following table lists the action required to
remediate the vulnerability in each release, if a solution is
available.

   VMware          Product    Running   Replace with/
   Product         Version    on        Apply Patch
   =============    =======   =======   =================
   vCenter Server    6.0      any      not affected
   vCenter Server    5.5      any      5.5 update 3
   vCenter Server    5.1      any      5.1 update u3b
   vCenter Server    5.0      any      5.5 update u3e

   vCloud Director   5.6      any      5.6.4
   vCloud Director   5.5      any      5.5.3

   Horizon View      6.0      any      6.1
   Horizon View      5.3      any      5.3.4
  1. Solution

Please review the patch/release notes for your product and version and verify the checksum of your downloaded file.

vCenter Server


Downloads and Documentation: https://www.vmware.com/go/download-vsphere

vCloud Director For Service Providers


Downloads and Documentation: https://www.vmware.com/support/pubs/vcd_pubs.html

Horizon View 6.1, 5.3.4:


Downloads: https://my.vmware.com/web/vmware/details?downloadGroup=VIEW-610-GA&productId=492 https://my.vmware.com/web/vmware/details?downloadGroup=VIEW-534-PREMIER&productId=396

  1. References

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3269


  1. Change log

2015-11-18 VMSA-2015-0008 Initial security advisory


  1. Contact

E-mail list for product security notifications and announcements: http://lists.vmware.com/cgi-bin/mailman/listinfo/security-announce

This Security Advisory is posted to the following lists:

security-announce at lists.vmware.com bugtraq at securityfocus.com fulldisclosure at seclists.org

E-mail: security at vmware.com PGP key at: http://kb.vmware.com/kb/1055

VMware Security Advisories http://www.vmware.com/security/advisories

Consolidated list of VMware Security Advisories http://kb.vmware.com/kb/2078735

VMware Security Response Policy https://www.vmware.com/support/policies/security_response.html

VMware Lifecycle Support Phases https://www.vmware.com/support/policies/lifecycle.html

Twitter https://twitter.com/VMwareSRC

Copyright 2015 VMware Inc. All rights reserved. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1

Note: the current version of the following document is available here: https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_n a-c05026202

SUPPORT COMMUNICATION - SECURITY BULLETIN

Document ID: c05026202 Version: 2

HPSBGN03550 rev.2 - HP Operations Manager i and BSM using Apache Flex BlazeDS, Remote Disclosure of Information

NOTICE: The information in this Security Bulletin should be acted upon as soon as possible.

Release Date: 2016-03-03 Last Updated: 2016-03-03

Potential Security Impact: Remote Disclosure of Information

Source: Hewlett Packard Enterprise, Product Security Response Team

VULNERABILITY SUMMARY A security vulnerability in Apache Flex BlazeDS was addressed by HP Operations Manager i (OMi) and Business Service Manager (BSM).

Note : OMi v10.10 is NOT affected by this vulnerability.

References:

CVE-2015-3269 SSRT102232

SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed.

Operations Manager i v10.0, v10.01 Business Service Manager v9.x to v9.26

BACKGROUND

CVSS 2.0 Base Metrics

Reference Base Vector Base Score CVE-2015-3269 (AV:N/AC:L/Au:N/C:P/I:N/A:N) 5.0 =========================================================== Information on CVSS is documented in HP Customer Notice: HPSN-2008-002

The Hewlett Packard Enterprise Company thanks Nicholas Miles from Tenable Network Security for reporting this issue to security-alert@hpe.com

RESOLUTION

HPE has made the following mitigation information available to resolve the vulnerability for the impacted versions of Operations Manager i and Business Service Manager:

For OMi 10.0 update to OMi 10.0 IP3 or above. The OMi 10.0 IP3 patches can be found here:

For Windows: https://softwaresupport.hp.com/group/softwaresupport/search-resu lt/-/facetsearch/document/LID/OMI_00122?lang=en&cc=us&hpappid=202392_OSP_PRO_ HPE

For Linux: https://softwaresupport.hp.com/group/softwaresupport/search-result /-/facetsearch/document/LID/OMI_00123?lang=en&cc=us&hpappid=202392_OSP_PRO_HP E

For OMi 10.01 update to OMi 10.01 IP2 or above. The OMi 10.01 IP2 patches can be found here:

For Windows: https://softwaresupport.hp.com/group/softwaresupport/search-resu lt/-/facetsearch/document/LID/OMI_00120

For Linux: https://softwaresupport.hp.com/group/softwaresupport/search-result /-/facetsearch/document/LID/OMI_00121

OMi 10.10 is NOT affected by this vulnerability.

For BSM 9.x to 9.25, update to BSM 9.25 IP2 or above.

For Windows: https://softwaresupport.hp.com/group/softwaresupport/search-resu lt/-/facetsearch/document/LID/BAC_00899

For Linux: https://softwaresupport.hp.com/group/softwaresupport/search-result /-/facetsearch/document/LID/BAC_00896

For BSM 9.26 please contact HPE Technical Support.

HISTORY Version:1 (rev.1) - 3 March 2016 Initial release Version:2 (rev.2) - 3 March 2016 Added acknowledgment section

Third Party Security Patches: Third party security patches that are to be installed on systems running Hewlett Packard Enterprise (HPE) software products should be applied in accordance with the customer's patch management policy.

Support: For issues about implementing the recommendations of this Security Bulletin, contact normal HPE Services support channel. For other issues about the content of this Security Bulletin, send e-mail to security-alert@hpe.com.

Report: To report a potential security vulnerability with any HPE supported product, send Email to: security-alert@hpe.com

Subscribe: To initiate a subscription to receive future HPE Security Bulletin alerts via Email: http://www.hpe.com/support/Subscriber_Choice

Security Bulletin Archive: A list of recently released Security Bulletins is available here: http://www.hpe.com/support/Security_Bulletin_Archive

Software Product Category: The Software Product Category is represented in the title by the two characters following HPSB.

3C = 3COM 3P = 3rd Party Software GN = HPE General Software HF = HPE Hardware and Firmware MU = Multi-Platform Software NS = NonStop Servers OV = OpenVMS PV = ProCurve ST = Storage Software UX = HP-UX

Copyright 2016 Hewlett Packard Enterprise

Hewlett Packard Enterprise shall not be liable for technical or editorial errors or omissions contained herein. The information provided is provided "as is" without warranty of any kind. To the extent permitted by law, neither HP or its affiliates, subcontractors or suppliers will be liable for incidental,special or consequential damages including downtime cost; lost profits; damages relating to the procurement of substitute products or services; or damages for loss of data, or software restoration. The information in this document is subject to change without notice. Hewlett Packard Enterprise and the names of Hewlett Packard Enterprise products referenced herein are trademarks of Hewlett Packard Enterprise in the United States and other countries. Other product and company names mentioned herein may be trademarks of their respective owners.

-----BEGIN PGP SIGNATURE----- Version: GnuPG v1

iQEcBAEBAgAGBQJW2GZoAAoJEGIGBBYqRO9/g7wIAIuGN+IoM69sf1dzu0wROFfj fDKMymKIsUz975nC1VoPm+70FiBRNKwuL73uqA7Gkrhnv1ldxeBjsX058FR3q5ZE mhlhfp86BMKJMtuWI3nTVo25gQM4PVaB6GuS52PrROhwcNRKnGy6K1OlYPEtFXiy OC6YNBwBBbvookB6bPkziPzvdc85zTU8Pc7YDZQoO14vw/k1PDBaFSHs7QnLlrAw 2cZADbYL9QIDWjIO/QVHo8iwYkjpxRmBzK6qXg/Ys1vij6/RYLqMtk5fxxMRlkfS 0oiFiUS8zVf+QASHRAuj4KXeCOCi66UEAgewkDa15GyByubl8WQRg7ovw1fHGUA= =4Dvo -----END PGP SIGNATURE-----

Show details on source website


{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-201508-0177",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "livecycle data services",
        "scope": "eq",
        "trust": 1.9,
        "vendor": "adobe",
        "version": "3.0"
      },
      {
        "model": "livecycle data services",
        "scope": "eq",
        "trust": 1.9,
        "vendor": "adobe",
        "version": "4.7"
      },
      {
        "model": "livecycle data services",
        "scope": "eq",
        "trust": 1.9,
        "vendor": "adobe",
        "version": "4.5"
      },
      {
        "model": "livecycle data services",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "adobe",
        "version": "4.6"
      },
      {
        "model": "business service management",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "hp",
        "version": "9.26"
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "adobe",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "apache",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "atlassian",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "vmware",
        "version": null
      },
      {
        "model": "livecycle data services",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "adobe",
        "version": "3.0.0.354170"
      },
      {
        "model": "livecycle data services",
        "scope": "lt",
        "trust": 0.8,
        "vendor": "adobe",
        "version": "4.6.2"
      },
      {
        "model": "jp1/it desktop management - manager",
        "scope": null,
        "trust": 0.8,
        "vendor": "hitachi",
        "version": null
      },
      {
        "model": "jp1/automatic operation",
        "scope": null,
        "trust": 0.8,
        "vendor": "hitachi",
        "version": null
      },
      {
        "model": "job management partner 1/it desktop management",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "hitachi",
        "version": "2 - manager"
      },
      {
        "model": "livecycle data services",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "adobe",
        "version": "4.5.1.354169"
      },
      {
        "model": "it operations director",
        "scope": null,
        "trust": 0.8,
        "vendor": "hitachi",
        "version": null
      },
      {
        "model": "compute systems manager",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "hitachi",
        "version": "software ( domestic version )"
      },
      {
        "model": "jp1/it desktop management",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "hitachi",
        "version": "2 - manager"
      },
      {
        "model": "job management partner 1/it desktop management - manager",
        "scope": null,
        "trust": 0.8,
        "vendor": "hitachi",
        "version": null
      },
      {
        "model": "livecycle data services",
        "scope": "lt",
        "trust": 0.8,
        "vendor": "adobe",
        "version": "3.0.x"
      },
      {
        "model": "compute systems manager",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "hitachi",
        "version": "software ( overseas edition )"
      },
      {
        "model": "livecycle data services",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "adobe",
        "version": "4.7.0.354169"
      },
      {
        "model": "livecycle data services",
        "scope": "lt",
        "trust": 0.8,
        "vendor": "adobe",
        "version": "4.7"
      },
      {
        "model": "automation director",
        "scope": null,
        "trust": 0.8,
        "vendor": "hitachi",
        "version": null
      },
      {
        "model": "job management partner",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "hitachi",
        "version": "1/automatic operation"
      },
      {
        "model": "device manager",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "hitachi",
        "version": "software"
      },
      {
        "model": "livecycle data services",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "adobe",
        "version": "4.6.2.354169"
      },
      {
        "model": "livecycle data services",
        "scope": "lt",
        "trust": 0.8,
        "vendor": "adobe",
        "version": "4.5"
      },
      {
        "model": "nexus dashboard fabric controller",
        "scope": null,
        "trust": 0.7,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "vcloud director",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "vmware",
        "version": "5.5"
      },
      {
        "model": "vcloud director",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "vmware",
        "version": "5.6"
      },
      {
        "model": "vcenter server update1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "vmware",
        "version": "5.5"
      },
      {
        "model": "vcenter server update",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "vmware",
        "version": "5.52"
      },
      {
        "model": "vcenter server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "vmware",
        "version": "5.5"
      },
      {
        "model": "vcenter server update",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "vmware",
        "version": "5.13"
      },
      {
        "model": "vcenter server update",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "vmware",
        "version": "5.11"
      },
      {
        "model": "vcenter server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "vmware",
        "version": "5.1"
      },
      {
        "model": "vcenter server update2",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "vmware",
        "version": "5.0"
      },
      {
        "model": "vcenter server update u3b",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "vmware",
        "version": "5.0"
      },
      {
        "model": "vcenter server update 3c",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "vmware",
        "version": "5.0"
      },
      {
        "model": "vcenter server update",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "vmware",
        "version": "5.01"
      },
      {
        "model": "vcenter server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "vmware",
        "version": "5.0"
      },
      {
        "model": "horizon view",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "vmware",
        "version": "5.3.1"
      },
      {
        "model": "horizon view",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "vmware",
        "version": "6.0"
      },
      {
        "model": "horizon view",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "vmware",
        "version": "5.3"
      },
      {
        "model": "operations manager i",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "hp",
        "version": "10.01"
      },
      {
        "model": "operations manager i",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "hp",
        "version": "10.00"
      },
      {
        "model": "business service manager",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "hp",
        "version": "9.26"
      },
      {
        "model": "business service manager",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "hp",
        "version": "9.20"
      },
      {
        "model": "business service manager",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "hp",
        "version": "9.10"
      },
      {
        "model": "jp1/automatic operation",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "hitachi",
        "version": "10-02"
      },
      {
        "model": "jp1/automatic operation",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "hitachi",
        "version": "10-01"
      },
      {
        "model": "jp1/automatic operation",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "hitachi",
        "version": "10-00-02"
      },
      {
        "model": "jp1/automatic operation",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "hitachi",
        "version": "10-00"
      },
      {
        "model": "job management partner 1/automatic operation",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "hitachi",
        "version": "10-50"
      },
      {
        "model": "job management partner 1/automatic operation",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "hitachi",
        "version": "10-10-01"
      },
      {
        "model": "job management partner 1/automatic operation",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "hitachi",
        "version": "10-00-03"
      },
      {
        "model": "job management partner 1/automatic operation",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "hitachi",
        "version": "10-00-02"
      },
      {
        "model": "flex blazeds",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apache",
        "version": "4.7"
      },
      {
        "model": "flex blazeds",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apache",
        "version": "4.6.0.23207"
      },
      {
        "model": "livecycle data services",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "adobe",
        "version": "4.6.2"
      },
      {
        "model": "coldfusion update",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "adobe",
        "version": "115"
      },
      {
        "model": "coldfusion update",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "adobe",
        "version": "114"
      },
      {
        "model": "coldfusion update",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "adobe",
        "version": "113"
      },
      {
        "model": "coldfusion update",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "adobe",
        "version": "112"
      },
      {
        "model": "coldfusion update",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "adobe",
        "version": "111"
      },
      {
        "model": "coldfusion update",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "adobe",
        "version": "10.08"
      },
      {
        "model": "coldfusion update",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "adobe",
        "version": "10.04"
      },
      {
        "model": "coldfusion update",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "adobe",
        "version": "10.03"
      },
      {
        "model": "coldfusion update",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "adobe",
        "version": "10.02"
      },
      {
        "model": "coldfusion update",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "adobe",
        "version": "10.01"
      },
      {
        "model": "coldfusion update",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "adobe",
        "version": "109"
      },
      {
        "model": "coldfusion update",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "adobe",
        "version": "106"
      },
      {
        "model": "coldfusion update",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "adobe",
        "version": "105"
      },
      {
        "model": "coldfusion update",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "adobe",
        "version": "1016"
      },
      {
        "model": "coldfusion update",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "adobe",
        "version": "1015"
      },
      {
        "model": "coldfusion update",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "adobe",
        "version": "1014"
      },
      {
        "model": "coldfusion update",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "adobe",
        "version": "1013"
      },
      {
        "model": "coldfusion update",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "adobe",
        "version": "1012"
      },
      {
        "model": "coldfusion update",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "adobe",
        "version": "1011"
      },
      {
        "model": "coldfusion update",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "adobe",
        "version": "1010"
      },
      {
        "model": "coldfusion update",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "adobe",
        "version": "101"
      },
      {
        "model": "coldfusion",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "adobe",
        "version": "10"
      },
      {
        "model": "vcloud director",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "vmware",
        "version": "5.6.4"
      },
      {
        "model": "vcloud director",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "vmware",
        "version": "5.5.3"
      },
      {
        "model": "vcenter server update",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "vmware",
        "version": "5.53"
      },
      {
        "model": "vcenter server update u3b",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "vmware",
        "version": "5.1"
      },
      {
        "model": "vcenter server update u3e",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "vmware",
        "version": "5.0"
      },
      {
        "model": "horizon view",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "vmware",
        "version": "5.3.4"
      },
      {
        "model": "horizon view",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "vmware",
        "version": "6.1"
      },
      {
        "model": "jp1/automatic operation",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "hitachi",
        "version": "11-00-01"
      },
      {
        "model": "flex blazeds",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "apache",
        "version": "4.7.1"
      },
      {
        "model": "livecycle data services",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "adobe",
        "version": "6.2.354169"
      },
      {
        "model": "livecycle data services",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "adobe",
        "version": "4.7.0.3541694"
      },
      {
        "model": "livecycle data services",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "adobe",
        "version": "4.5.1.354169"
      },
      {
        "model": "livecycle data services",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "adobe",
        "version": "3.0.0.354170"
      },
      {
        "model": "coldfusion update",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "adobe",
        "version": "116"
      },
      {
        "model": "coldfusion update",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "adobe",
        "version": "1017"
      }
    ],
    "sources": [
      {
        "db": "CERT/CC",
        "id": "VU#307983"
      },
      {
        "db": "ZDI",
        "id": "ZDI-22-508"
      },
      {
        "db": "BID",
        "id": "76394"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2015-004431"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201508-438"
      },
      {
        "db": "NVD",
        "id": "CVE-2015-3269"
      }
    ]
  },
  "configurations": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/configurations#",
      "children": {
        "@container": "@list"
      },
      "cpe_match": {
        "@container": "@list"
      },
      "data": {
        "@container": "@list"
      },
      "nodes": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "children": [],
            "cpe_match": [
              {
                "cpe23Uri": "cpe:2.3:a:hp:business_service_management:*:*:*:*:*:*:*:*",
                "cpe_name": [],
                "versionEndIncluding": "9.26",
                "vulnerable": true
              }
            ],
            "operator": "OR"
          },
          {
            "children": [],
            "cpe_match": [
              {
                "cpe23Uri": "cpe:2.3:a:adobe:livecycle_data_services:3.0:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:adobe:livecycle_data_services:4.5:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:adobe:livecycle_data_services:4.6:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:adobe:livecycle_data_services:4.7:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              }
            ],
            "operator": "OR"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2015-3269"
      }
    ]
  },
  "credits": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/credits#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "kpc",
    "sources": [
      {
        "db": "ZDI",
        "id": "ZDI-22-508"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201508-438"
      }
    ],
    "trust": 1.3
  },
  "cve": "CVE-2015-3269",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "acInsufInfo": false,
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "NVD",
            "availabilityImpact": "NONE",
            "baseScore": 5.0,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 10.0,
            "impactScore": 2.9,
            "integrityImpact": "NONE",
            "obtainAllPrivilege": false,
            "obtainOtherPrivilege": false,
            "obtainUserPrivilege": false,
            "severity": "MEDIUM",
            "trust": 1.0,
            "userInteractionRequired": false,
            "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
            "version": "2.0"
          },
          {
            "acInsufInfo": null,
            "accessComplexity": "Low",
            "accessVector": "Network",
            "authentication": "None",
            "author": "NVD",
            "availabilityImpact": "None",
            "baseScore": 5.0,
            "confidentialityImpact": "Partial",
            "exploitabilityScore": null,
            "id": "CVE-2015-3269",
            "impactScore": null,
            "integrityImpact": "None",
            "obtainAllPrivilege": null,
            "obtainOtherPrivilege": null,
            "obtainUserPrivilege": null,
            "severity": "Medium",
            "trust": 0.8,
            "userInteractionRequired": null,
            "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
            "version": "2.0"
          }
        ],
        "cvssV3": [
          {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "author": "ZDI",
            "availabilityImpact": "NONE",
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "exploitabilityScore": 3.9,
            "id": "CVE-2015-3269",
            "impactScore": 3.6,
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "trust": 0.7,
            "userInteraction": "NONE",
            "vectorString": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
            "version": "3.0"
          }
        ],
        "severity": [
          {
            "author": "NVD",
            "id": "CVE-2015-3269",
            "trust": 1.8,
            "value": "MEDIUM"
          },
          {
            "author": "ZDI",
            "id": "CVE-2015-3269",
            "trust": 0.7,
            "value": "HIGH"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-201508-438",
            "trust": 0.6,
            "value": "HIGH"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "ZDI",
        "id": "ZDI-22-508"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2015-004431"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201508-438"
      },
      {
        "db": "NVD",
        "id": "CVE-2015-3269"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Apache Flex BlazeDS, as used in flex-messaging-core.jar in Adobe LiveCycle Data Services (LCDS) 3.0.x before 3.0.0.354170, 4.5 before 4.5.1.354169, 4.6.2 before 4.6.2.354169, and 4.7 before 4.7.0.354169 and other products, allows remote attackers to read arbitrary files via an AMF message containing an XML external entity declaration in conjunction with an entity reference, related to an XML External Entity (XXE) issue. This vulnerability allows remote attackers to disclose sensitive information on affected installations of Cisco Nexus Dashboard Fabric Controller. Authentication is not required to exploit this vulnerability.The specific flaw exists within the handling of the AMF protocol. Due to the improper restriction of XML External Entity (XXE) references, a crafted document specifying a URI causes the XML parser to access the URI and embed the contents back into the XML document for further processing. An attacker can leverage this vulnerability to disclose information in the context of the fmserver user. \nAttackers can exploit this issue to obtain sensitive information that may lead to further attacks. \nHowever this expanded information is not automatically transferred back to\nthe client, but could be made available by the application. ------------------------------------------------------------------------\n                  VMware Security Advisory\n\nAdvisory ID: VMSA-2015-0008\nSynopsis:    VMware product updates address information disclosure\n            issue\n\nIssue date:  2015-11-18\nUpdated on:  2015-11-18\nCVE number:  CVE-2015-3269\n------------------------------------------------------------------------\n\n1. Summary\n\n VMware product updates address information disclosure issue. \n\n\n2. Relevant Releases\n\n VMware vCenter Server 5.5 prior to version 5.5 update 3\n VMware vCenter Server 5.1 prior to version 5.1 update u3b\n VMware vCenter Server 5.0 prior to version 5.0 update u3e\n\n vCloud Director 5.6 prior to version 5.6.4\n vCloud Director 5.5 prior to version 5.5.3\n\n VMware Horizon View 6.0 prior to version 6.1\n VMware Horizon View 5.0 prior to version 5.3.4\n\n\n\n3. Problem Description\n\n  a. vCenter Server, vCloud Director, Horizon View information\n     disclosure issue. A specially\n    crafted XML request sent to the server could lead to unintended\n    information be disclosed. \n\n    VMware would like to thank Matthias Kaiser of Code White GmbH for\n    reporting this issue to us. \n\n    The Common Vulnerabilities and Exposures project (cve.mitre.org)\n    has assigned the identifier CVE-2015-3269  to this issue. \n\n    Column 4 of the following table lists the action required to\n    remediate the vulnerability in each release, if a solution is\n    available. \n\n       VMware          Product\t  Running   Replace with/\n       Product         Version\t  on        Apply Patch\n       =============\t=======\t  =======   =================\n       vCenter Server    6.0      any      not affected\n       vCenter Server    5.5      any      5.5 update 3\n       vCenter Server    5.1      any      5.1 update u3b\n       vCenter Server    5.0      any      5.5 update u3e\n\n       vCloud Director   5.6      any      5.6.4\n       vCloud Director   5.5      any      5.5.3\n\n       Horizon View      6.0      any      6.1\n       Horizon View      5.3      any      5.3.4\n\n\n4. Solution\n\n  Please review the patch/release notes for your product and version\n  and verify the checksum of your downloaded file. \n\n\n  vCenter Server\n  --------------------------------\n  Downloads and Documentation:\n  https://www.vmware.com/go/download-vsphere\n\n  vCloud Director For Service Providers\n  --------------------------------\n  Downloads and Documentation:\n  https://www.vmware.com/support/pubs/vcd_pubs.html\n\n  Horizon View 6.1, 5.3.4:\n  --------------------------------\n  Downloads:\n  https://my.vmware.com/web/vmware/details?downloadGroup=VIEW-610-GA\u0026productId=492\n  https://my.vmware.com/web/vmware/details?downloadGroup=VIEW-534-PREMIER\u0026productId=396\n\n\n5. References\n\n  http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3269\n\n------------------------------------------------------------------------\n\n6. Change log\n\n  2015-11-18 VMSA-2015-0008\n  Initial security advisory\n\n------------------------------------------------------------------------\n\n7. Contact\n\n  E-mail list for product security notifications and announcements:\n  http://lists.vmware.com/cgi-bin/mailman/listinfo/security-announce\n\n  This Security Advisory is posted to the following lists:\n\n   security-announce at lists.vmware.com\n   bugtraq at securityfocus.com\n   fulldisclosure at seclists.org\n\n  E-mail: security at vmware.com\n  PGP key at: http://kb.vmware.com/kb/1055\n\n  VMware Security Advisories\n  http://www.vmware.com/security/advisories\n\n  Consolidated list of VMware Security Advisories\n  http://kb.vmware.com/kb/2078735\n\n  VMware Security Response Policy\n  https://www.vmware.com/support/policies/security_response.html\n\n  VMware Lifecycle Support Phases\n  https://www.vmware.com/support/policies/lifecycle.html\n\n  Twitter\n  https://twitter.com/VMwareSRC\n\n  Copyright 2015 VMware Inc.  All rights reserved. -----BEGIN PGP SIGNED MESSAGE-----\nHash: SHA1\n\nNote: the current version of the following document is available here:\nhttps://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_n\na-c05026202\n\nSUPPORT COMMUNICATION - SECURITY BULLETIN\n\nDocument ID: c05026202\nVersion: 2\n\nHPSBGN03550 rev.2 - HP Operations Manager i and BSM using Apache Flex\nBlazeDS, Remote Disclosure of Information\n\nNOTICE: The information in this Security Bulletin should be acted upon as\nsoon as possible. \n\nRelease Date: 2016-03-03\nLast Updated: 2016-03-03\n\nPotential Security Impact: Remote Disclosure of Information\n\nSource: Hewlett Packard Enterprise, Product Security Response Team\n\nVULNERABILITY SUMMARY\nA security vulnerability in Apache Flex BlazeDS was addressed by HP\nOperations Manager i (OMi) and Business Service Manager (BSM). \n\nNote : OMi v10.10 is NOT affected by this vulnerability. \n\nReferences:\n\nCVE-2015-3269\nSSRT102232\n\nSUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed. \n\nOperations Manager i v10.0, v10.01\nBusiness Service Manager v9.x to v9.26\n\nBACKGROUND\n\nCVSS 2.0 Base Metrics\n===========================================================\n  Reference              Base Vector             Base Score\nCVE-2015-3269    (AV:N/AC:L/Au:N/C:P/I:N/A:N)       5.0\n===========================================================\n             Information on CVSS is documented\n            in HP Customer Notice: HPSN-2008-002\n\nThe Hewlett Packard Enterprise Company thanks Nicholas Miles from Tenable\nNetwork Security for reporting this issue to security-alert@hpe.com\n\nRESOLUTION\n\nHPE has made the following mitigation information available to resolve the\nvulnerability for the impacted versions of Operations Manager i and Business\nService Manager:\n\nFor OMi 10.0  update to OMi 10.0 IP3 or above. \nThe OMi 10.0 IP3 patches can be found here:\n\nFor Windows: https://softwaresupport.hp.com/group/softwaresupport/search-resu\nlt/-/facetsearch/document/LID/OMI_00122?lang=en\u0026cc=us\u0026hpappid=202392_OSP_PRO_\nHPE\n\nFor Linux: https://softwaresupport.hp.com/group/softwaresupport/search-result\n/-/facetsearch/document/LID/OMI_00123?lang=en\u0026cc=us\u0026hpappid=202392_OSP_PRO_HP\nE\n\nFor OMi 10.01  update to OMi 10.01 IP2 or above. \nThe OMi 10.01 IP2 patches can be found here:\n\nFor Windows: https://softwaresupport.hp.com/group/softwaresupport/search-resu\nlt/-/facetsearch/document/LID/OMI_00120\n\nFor Linux: https://softwaresupport.hp.com/group/softwaresupport/search-result\n/-/facetsearch/document/LID/OMI_00121\n\nOMi 10.10 is NOT affected by this vulnerability. \n\nFor BSM 9.x to 9.25, update to BSM 9.25 IP2 or above. \n\nFor Windows: https://softwaresupport.hp.com/group/softwaresupport/search-resu\nlt/-/facetsearch/document/LID/BAC_00899\n\nFor Linux: https://softwaresupport.hp.com/group/softwaresupport/search-result\n/-/facetsearch/document/LID/BAC_00896\n\nFor BSM 9.26 please contact HPE Technical Support. \n\nHISTORY\nVersion:1 (rev.1) - 3 March 2016 Initial release\nVersion:2 (rev.2) - 3 March 2016 Added acknowledgment section\n\nThird Party Security Patches: Third party security patches that are to be\ninstalled on systems running Hewlett Packard Enterprise (HPE) software\nproducts should be applied in accordance with the customer\u0027s patch management\npolicy. \n\nSupport: For issues about implementing the recommendations of this Security\nBulletin, contact normal HPE Services support channel. For other issues about\nthe content of this Security Bulletin, send e-mail to security-alert@hpe.com. \n\nReport: To report a potential security vulnerability with any HPE supported\nproduct, send Email to: security-alert@hpe.com\n\nSubscribe: To initiate a subscription to receive future HPE Security Bulletin\nalerts via Email: http://www.hpe.com/support/Subscriber_Choice\n\nSecurity Bulletin Archive: A list of recently released Security Bulletins is\navailable here: http://www.hpe.com/support/Security_Bulletin_Archive\n\nSoftware Product Category: The Software Product Category is represented in\nthe title by the two characters following HPSB. \n\n3C = 3COM\n3P = 3rd Party Software\nGN = HPE General Software\nHF = HPE Hardware and Firmware\nMU = Multi-Platform Software\nNS = NonStop Servers\nOV = OpenVMS\nPV = ProCurve\nST = Storage Software\nUX = HP-UX\n\nCopyright 2016 Hewlett Packard Enterprise\n\nHewlett Packard Enterprise shall not be liable for technical or editorial\nerrors or omissions contained herein. The information provided is provided\n\"as is\" without warranty of any kind. To the extent permitted by law, neither\nHP or its affiliates, subcontractors or suppliers will be liable for\nincidental,special or consequential damages including downtime cost; lost\nprofits; damages relating to the procurement of substitute products or\nservices; or damages for loss of data, or software restoration. The\ninformation in this document is subject to change without notice. Hewlett\nPackard Enterprise and the names of Hewlett Packard Enterprise products\nreferenced herein are trademarks of Hewlett Packard Enterprise in the United\nStates and other countries. Other product and company names mentioned herein\nmay be trademarks of their respective owners. \n\n-----BEGIN PGP SIGNATURE-----\nVersion: GnuPG v1\n\niQEcBAEBAgAGBQJW2GZoAAoJEGIGBBYqRO9/g7wIAIuGN+IoM69sf1dzu0wROFfj\nfDKMymKIsUz975nC1VoPm+70FiBRNKwuL73uqA7Gkrhnv1ldxeBjsX058FR3q5ZE\nmhlhfp86BMKJMtuWI3nTVo25gQM4PVaB6GuS52PrROhwcNRKnGy6K1OlYPEtFXiy\nOC6YNBwBBbvookB6bPkziPzvdc85zTU8Pc7YDZQoO14vw/k1PDBaFSHs7QnLlrAw\n2cZADbYL9QIDWjIO/QVHo8iwYkjpxRmBzK6qXg/Ys1vij6/RYLqMtk5fxxMRlkfS\n0oiFiUS8zVf+QASHRAuj4KXeCOCi66UEAgewkDa15GyByubl8WQRg7ovw1fHGUA=\n=4Dvo\n-----END PGP SIGNATURE-----\n",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2015-3269"
      },
      {
        "db": "CERT/CC",
        "id": "VU#307983"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2015-004431"
      },
      {
        "db": "ZDI",
        "id": "ZDI-22-508"
      },
      {
        "db": "BID",
        "id": "76394"
      },
      {
        "db": "PACKETSTORM",
        "id": "133250"
      },
      {
        "db": "PACKETSTORM",
        "id": "134439"
      },
      {
        "db": "PACKETSTORM",
        "id": "136084"
      }
    ],
    "trust": 3.51
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "NVD",
        "id": "CVE-2015-3269",
        "trust": 3.7
      },
      {
        "db": "ZDI",
        "id": "ZDI-22-508",
        "trust": 2.3
      },
      {
        "db": "BID",
        "id": "76394",
        "trust": 1.9
      },
      {
        "db": "SECTRACK",
        "id": "1033337",
        "trust": 1.6
      },
      {
        "db": "CERT/CC",
        "id": "VU#307983",
        "trust": 1.1
      },
      {
        "db": "CERT/CC",
        "id": "VU#279472",
        "trust": 0.8
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2015-004431",
        "trust": 0.8
      },
      {
        "db": "ZDI_CAN",
        "id": "ZDI-CAN-15192",
        "trust": 0.7
      },
      {
        "db": "NSFOCUS",
        "id": "46622",
        "trust": 0.6
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201508-438",
        "trust": 0.6
      },
      {
        "db": "HITACHI",
        "id": "HS16-005",
        "trust": 0.3
      },
      {
        "db": "PACKETSTORM",
        "id": "133250",
        "trust": 0.1
      },
      {
        "db": "PACKETSTORM",
        "id": "134439",
        "trust": 0.1
      },
      {
        "db": "PACKETSTORM",
        "id": "136084",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "CERT/CC",
        "id": "VU#307983"
      },
      {
        "db": "ZDI",
        "id": "ZDI-22-508"
      },
      {
        "db": "BID",
        "id": "76394"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2015-004431"
      },
      {
        "db": "PACKETSTORM",
        "id": "133250"
      },
      {
        "db": "PACKETSTORM",
        "id": "134439"
      },
      {
        "db": "PACKETSTORM",
        "id": "136084"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201508-438"
      },
      {
        "db": "NVD",
        "id": "CVE-2015-3269"
      }
    ]
  },
  "id": "VAR-201508-0177",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "VARIoT devices database",
        "id": null
      }
    ],
    "trust": 0.18666667
  },
  "last_update_date": "2024-04-19T22:40:08.722000Z",
  "patch": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/patch#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "title": "APSB15-20",
        "trust": 0.8,
        "url": "https://helpx.adobe.com/security/products/livecycleds/apsb15-20.html"
      },
      {
        "title": "APSB15-20",
        "trust": 0.8,
        "url": "https://helpx.adobe.com/jp/security/products/livecycleds/apsb15-20.html"
      },
      {
        "title": "HS16-009",
        "trust": 0.8,
        "url": "http://www.hitachi.co.jp/prod/comp/soft1/global/security/info/vuls/hs16-009/index.html"
      },
      {
        "title": "HS16-005",
        "trust": 0.8,
        "url": "http://www.hitachi.co.jp/prod/comp/soft1/global/security/info/vuls/hs16-005/index.html"
      },
      {
        "title": "HS15-028",
        "trust": 0.8,
        "url": "http://www.hitachi.co.jp/prod/comp/soft1/global/security/info/vuls/hs15-028/index.html"
      },
      {
        "title": "HS16-009",
        "trust": 0.8,
        "url": "http://www.hitachi.co.jp/prod/comp/soft1/security/info/vuls/hs16-009/index.html"
      },
      {
        "title": "HS16-005",
        "trust": 0.8,
        "url": "http://www.hitachi.co.jp/prod/comp/soft1/security/info/vuls/hs16-005/index.html"
      },
      {
        "title": "HS15-028",
        "trust": 0.8,
        "url": "http://www.hitachi.co.jp/prod/comp/soft1/security/info/vuls/hs15-028/index.html"
      },
      {
        "title": "LCDS_4.6.2",
        "trust": 0.6,
        "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=57450"
      },
      {
        "title": "LCDS_4.5.1",
        "trust": 0.6,
        "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=57449"
      },
      {
        "title": "LCDS_3.1.0",
        "trust": 0.6,
        "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=57448"
      },
      {
        "title": "LCDS_3.0.0",
        "trust": 0.6,
        "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=57447"
      },
      {
        "title": "LCDS_4.7.0",
        "trust": 0.6,
        "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=57451"
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2015-004431"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201508-438"
      }
    ]
  },
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "CWE-200",
        "trust": 1.8
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2015-004431"
      },
      {
        "db": "NVD",
        "id": "CVE-2015-3269"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 2.2,
        "url": "https://www.zerodayinitiative.com/advisories/zdi-22-508/"
      },
      {
        "trust": 1.9,
        "url": "https://helpx.adobe.com/security/products/livecycleds/apsb15-20.html"
      },
      {
        "trust": 1.6,
        "url": "http://www.securitytracker.com/id/1033337"
      },
      {
        "trust": 1.6,
        "url": "http://www.securityfocus.com/archive/1/536266/100/0/threaded"
      },
      {
        "trust": 1.6,
        "url": "http://www.vmware.com/security/advisories/vmsa-2015-0008.html"
      },
      {
        "trust": 1.6,
        "url": "http://marc.info/?l=bugtraq\u0026m=145706712500978\u0026w=2"
      },
      {
        "trust": 1.6,
        "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c05026202"
      },
      {
        "trust": 1.6,
        "url": "http://www.securityfocus.com/bid/76394"
      },
      {
        "trust": 1.6,
        "url": "https://helpx.adobe.com/content/help/en/security/products/coldfusion/apsb15-21.html"
      },
      {
        "trust": 0.9,
        "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-3269"
      },
      {
        "trust": 0.8,
        "url": "http://codewhitesec.blogspot.com/2017/04/amf.html"
      },
      {
        "trust": 0.8,
        "url": "http://openjdk.java.net/jeps/290"
      },
      {
        "trust": 0.8,
        "url": "http://www.kb.cert.org/vuls/id/279472"
      },
      {
        "trust": 0.8,
        "url": "http://www.adobe.com/go/amfspec"
      },
      {
        "trust": 0.8,
        "url": "https://cwe.mitre.org/data/definitions/502.html"
      },
      {
        "trust": 0.8,
        "url": "https://cwe.mitre.org/data/definitions/913.html"
      },
      {
        "trust": 0.8,
        "url": "https://cwe.mitre.org/data/definitions/611.html"
      },
      {
        "trust": 0.8,
        "url": "https://flex.apache.org/download-blazeds.html"
      },
      {
        "trust": 0.8,
        "url": "https://www.vmware.com/security/advisories/vmsa-2017-0007.html"
      },
      {
        "trust": 0.8,
        "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2015-3269"
      },
      {
        "trust": 0.8,
        "url": "http://www.securityfocus.com/archive/1/archive/1/536266/100/0/threaded"
      },
      {
        "trust": 0.6,
        "url": "http://www.nsfocus.net/vulndb/46622"
      },
      {
        "trust": 0.3,
        "url": "http://www.adobe.com"
      },
      {
        "trust": 0.3,
        "url": "http://www.adobe.com/devnet/livecycle/dataservices.html"
      },
      {
        "trust": 0.3,
        "url": "http://seclists.org/oss-sec/2015/q3/394"
      },
      {
        "trust": 0.3,
        "url": "https://helpx.adobe.com/security/products/coldfusion/apsb15-21.html"
      },
      {
        "trust": 0.3,
        "url": "https://h20564.www2.hpe.com/hpsc/doc/public/display?docid=emr_na-c05026202"
      },
      {
        "trust": 0.3,
        "url": "http://www.hitachi.co.jp/prod/comp/soft1/global/security/info/vuls/hs16-005/index.html"
      },
      {
        "trust": 0.3,
        "url": "http://www.vmware.com/security/advisories/vmsa-2015-0008"
      },
      {
        "trust": 0.3,
        "url": "http://www.kb.cert.org/vuls/id/307983"
      },
      {
        "trust": 0.3,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2015-3269"
      },
      {
        "trust": 0.1,
        "url": "https://www.owasp.org/index.php/xml_external_entity_(xxe)_processing"
      },
      {
        "trust": 0.1,
        "url": "https://twitter.com/vmwaresrc"
      },
      {
        "trust": 0.1,
        "url": "https://my.vmware.com/web/vmware/details?downloadgroup=view-534-premier\u0026productid=396"
      },
      {
        "trust": 0.1,
        "url": "https://www.vmware.com/support/policies/lifecycle.html"
      },
      {
        "trust": 0.1,
        "url": "http://kb.vmware.com/kb/1055"
      },
      {
        "trust": 0.1,
        "url": "http://www.vmware.com/security/advisories"
      },
      {
        "trust": 0.1,
        "url": "https://www.vmware.com/go/download-vsphere"
      },
      {
        "trust": 0.1,
        "url": "http://kb.vmware.com/kb/2078735"
      },
      {
        "trust": 0.1,
        "url": "http://lists.vmware.com/cgi-bin/mailman/listinfo/security-announce"
      },
      {
        "trust": 0.1,
        "url": "https://www.vmware.com/support/policies/security_response.html"
      },
      {
        "trust": 0.1,
        "url": "https://www.vmware.com/support/pubs/vcd_pubs.html"
      },
      {
        "trust": 0.1,
        "url": "https://my.vmware.com/web/vmware/details?downloadgroup=view-610-ga\u0026productid=492"
      },
      {
        "trust": 0.1,
        "url": "https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_n"
      },
      {
        "trust": 0.1,
        "url": "https://softwaresupport.hp.com/group/softwaresupport/search-resu"
      },
      {
        "trust": 0.1,
        "url": "http://www.hpe.com/support/security_bulletin_archive"
      },
      {
        "trust": 0.1,
        "url": "http://www.hpe.com/support/subscriber_choice"
      },
      {
        "trust": 0.1,
        "url": "https://softwaresupport.hp.com/group/softwaresupport/search-result"
      }
    ],
    "sources": [
      {
        "db": "CERT/CC",
        "id": "VU#307983"
      },
      {
        "db": "BID",
        "id": "76394"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2015-004431"
      },
      {
        "db": "PACKETSTORM",
        "id": "133250"
      },
      {
        "db": "PACKETSTORM",
        "id": "134439"
      },
      {
        "db": "PACKETSTORM",
        "id": "136084"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201508-438"
      },
      {
        "db": "NVD",
        "id": "CVE-2015-3269"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "CERT/CC",
        "id": "VU#307983"
      },
      {
        "db": "ZDI",
        "id": "ZDI-22-508"
      },
      {
        "db": "BID",
        "id": "76394"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2015-004431"
      },
      {
        "db": "PACKETSTORM",
        "id": "133250"
      },
      {
        "db": "PACKETSTORM",
        "id": "134439"
      },
      {
        "db": "PACKETSTORM",
        "id": "136084"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201508-438"
      },
      {
        "db": "NVD",
        "id": "CVE-2015-3269"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2017-04-04T00:00:00",
        "db": "CERT/CC",
        "id": "VU#307983"
      },
      {
        "date": "2022-03-11T00:00:00",
        "db": "ZDI",
        "id": "ZDI-22-508"
      },
      {
        "date": "2015-08-18T00:00:00",
        "db": "BID",
        "id": "76394"
      },
      {
        "date": "2015-08-27T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2015-004431"
      },
      {
        "date": "2015-08-22T13:33:33",
        "db": "PACKETSTORM",
        "id": "133250"
      },
      {
        "date": "2015-11-19T14:15:30",
        "db": "PACKETSTORM",
        "id": "134439"
      },
      {
        "date": "2016-03-04T16:03:09",
        "db": "PACKETSTORM",
        "id": "136084"
      },
      {
        "date": "2015-08-20T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201508-438"
      },
      {
        "date": "2015-08-25T01:59:00.087000",
        "db": "NVD",
        "id": "CVE-2015-3269"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2017-04-14T00:00:00",
        "db": "CERT/CC",
        "id": "VU#307983"
      },
      {
        "date": "2022-03-11T00:00:00",
        "db": "ZDI",
        "id": "ZDI-22-508"
      },
      {
        "date": "2017-04-11T01:03:00",
        "db": "BID",
        "id": "76394"
      },
      {
        "date": "2016-03-24T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2015-004431"
      },
      {
        "date": "2022-03-14T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201508-438"
      },
      {
        "date": "2022-03-11T17:15:08.207000",
        "db": "NVD",
        "id": "CVE-2015-3269"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "remote",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201508-438"
      }
    ],
    "trust": 0.6
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Action Message Format (AMF3) Java implementations are vulnerable to insecure deserialization and XML external entities references",
    "sources": [
      {
        "db": "CERT/CC",
        "id": "VU#307983"
      }
    ],
    "trust": 0.8
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "information disclosure",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201508-438"
      }
    ],
    "trust": 0.6
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading...

Loading...

Loading...
  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.