René Helmke 7791f18b51 bootstrap
2023-05-16 16:09:41 +02:00

225 lines
7.4 KiB
JSON

{
"id": "CVE-2015-4732",
"sourceIdentifier": "secalert_us@oracle.com",
"published": "2015-07-16T11:00:28.650",
"lastModified": "2022-05-13T14:38:25.920",
"vulnStatus": "Modified",
"evaluatorComment": "Per Advisory: <a href=\"http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html\">Applies to client deployment of Java only. This vulnerability can be exploited only through sandboxed Java Web Start applications and sandboxed Java applets.</a>",
"descriptions": [
{
"lang": "en",
"value": "Unspecified vulnerability in Oracle Java SE 6u95, 7u80, and 8u45, and Java SE Embedded 7u75 and 8u33 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Libraries, a different vulnerability than CVE-2015-2590."
},
{
"lang": "es",
"value": "Vulnerabilidad no especificada en Oracle Java SE 6u95, 7u80 y 8u45, y Java SE Embedded 7u75 y 8u33, permite a atacantes remotos afectar la confidencialidad, integridad y disponibilidad a trav\u00e9s de vectores desconocidos relacionados con librer\u00edas, una vulnerabilidad diferente a CVE-2015-2590."
}
],
"metrics": {
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"availabilityImpact": "COMPLETE",
"baseScore": 10.0
},
"baseSeverity": "HIGH",
"exploitabilityScore": 10.0,
"impactScore": 10.0,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:oracle:jdk:1.6.0:update95:*:*:*:*:*:*",
"matchCriteriaId": "2755C397-75DF-4110-8C8A-05EFDFFF9BC1"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:oracle:jdk:1.7.0:update75:*:*:*:*:*:*",
"matchCriteriaId": "D084DBE9-BF2F-4A9B-8FDE-A9A608E6B40F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:oracle:jdk:1.7.0:update80:*:*:*:*:*:*",
"matchCriteriaId": "18FB6138-2B3D-4C4B-8647-3D1646165641"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:oracle:jdk:1.8.0:update_33:*:*:*:*:*:*",
"matchCriteriaId": "49B3533A-57B1-4EDA-9434-D75AE837F2C7"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:oracle:jdk:1.8.0:update45:*:*:*:*:*:*",
"matchCriteriaId": "914D54AC-EAAE-4A01-BA88-7F245BDA47C5"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:oracle:jre:1.6.0:update_95:*:*:*:*:*:*",
"matchCriteriaId": "33DD9C2A-9C6E-407B-8110-2EC7906DE036"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:oracle:jre:1.7.0:update_75:*:*:*:*:*:*",
"matchCriteriaId": "88FA3ACA-B2FC-4D9C-B67E-35272514FB84"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:oracle:jre:1.7.0:update_80:*:*:*:*:*:*",
"matchCriteriaId": "17B87292-EDBB-4D5A-8874-7405F040FAA6"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:oracle:jre:1.8.0:update_33:*:*:*:*:*:*",
"matchCriteriaId": "366E2702-633C-4D4C-ACF8-4CBEC66719F1"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:oracle:jre:1.8.0:update_45:*:*:*:*:*:*",
"matchCriteriaId": "8CFE55B4-9A07-4E88-98AC-8345243AEF79"
}
]
}
]
}
],
"references": [
{
"url": "http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00039.html",
"source": "secalert_us@oracle.com"
},
{
"url": "http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00040.html",
"source": "secalert_us@oracle.com"
},
{
"url": "http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00046.html",
"source": "secalert_us@oracle.com"
},
{
"url": "http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00047.html",
"source": "secalert_us@oracle.com"
},
{
"url": "http://rhn.redhat.com/errata/RHSA-2015-1228.html",
"source": "secalert_us@oracle.com"
},
{
"url": "http://rhn.redhat.com/errata/RHSA-2015-1229.html",
"source": "secalert_us@oracle.com"
},
{
"url": "http://rhn.redhat.com/errata/RHSA-2015-1230.html",
"source": "secalert_us@oracle.com"
},
{
"url": "http://rhn.redhat.com/errata/RHSA-2015-1241.html",
"source": "secalert_us@oracle.com"
},
{
"url": "http://rhn.redhat.com/errata/RHSA-2015-1242.html",
"source": "secalert_us@oracle.com"
},
{
"url": "http://rhn.redhat.com/errata/RHSA-2015-1243.html",
"source": "secalert_us@oracle.com"
},
{
"url": "http://rhn.redhat.com/errata/RHSA-2015-1485.html",
"source": "secalert_us@oracle.com"
},
{
"url": "http://rhn.redhat.com/errata/RHSA-2015-1486.html",
"source": "secalert_us@oracle.com"
},
{
"url": "http://rhn.redhat.com/errata/RHSA-2015-1488.html",
"source": "secalert_us@oracle.com"
},
{
"url": "http://rhn.redhat.com/errata/RHSA-2015-1526.html",
"source": "secalert_us@oracle.com"
},
{
"url": "http://rhn.redhat.com/errata/RHSA-2015-1544.html",
"source": "secalert_us@oracle.com"
},
{
"url": "http://rhn.redhat.com/errata/RHSA-2015-1604.html",
"source": "secalert_us@oracle.com"
},
{
"url": "http://www.debian.org/security/2015/dsa-3316",
"source": "secalert_us@oracle.com"
},
{
"url": "http://www.debian.org/security/2015/dsa-3339",
"source": "secalert_us@oracle.com"
},
{
"url": "http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html",
"source": "secalert_us@oracle.com",
"tags": [
"Patch",
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/75823",
"source": "secalert_us@oracle.com"
},
{
"url": "http://www.securitytracker.com/id/1032910",
"source": "secalert_us@oracle.com"
},
{
"url": "http://www.ubuntu.com/usn/USN-2696-1",
"source": "secalert_us@oracle.com"
},
{
"url": "http://www.ubuntu.com/usn/USN-2706-1",
"source": "secalert_us@oracle.com"
},
{
"url": "https://security.gentoo.org/glsa/201603-11",
"source": "secalert_us@oracle.com"
},
{
"url": "https://security.gentoo.org/glsa/201603-14",
"source": "secalert_us@oracle.com"
}
]
}