ID

VAR-201501-0493


CVE

CVE-2015-0400


TITLE

Oracle Java SE In Libraries Vulnerability

Trust: 0.8

sources: JVNDB: JVNDB-2015-001088

DESCRIPTION

Unspecified vulnerability in Oracle Java SE 6u85, 7u72, and 8u25 allows remote attackers to affect confidentiality via unknown vectors related to Libraries. Oracle Java SE is prone to a remote vulnerability in Java SE. The vulnerability can be exploited over multiple protocols. This issue affects the 'Libraries' sub-component. This vulnerability affects the following supported versions: Java SE 6u85, Java SE 7u72, Java SE 8u25. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Gentoo Linux Security Advisory GLSA 201603-14 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - https://security.gentoo.org/ - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Severity: Normal Title: IcedTea: Multiple vulnerabilities Date: March 12, 2016 Bugs: #537940, #559532, #565842, #567850, #572716 ID: 201603-14 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Synopsis ======== Multiple vulnerabilities have been found in IcedTea allowing remote attackers to affect confidentiality, integrity, and availability through various vectors. Background ========== IcedTea's aim is to provide OpenJDK in a form suitable for easy configuration, compilation and distribution with the primary goal of allowing inclusion in GNU/Linux distributions. This includes the possibility of remote execution of arbitrary code, information disclosure, or Denial of Service. Workaround ========== There is no known work around at this time. Resolution ========== IcedTea 7.x users should upgrade to the latest version: # emerge --sync # emerge --ask --oneshot --verbose ">=dev-java/icedtea-7.2.6.4" IcedTea bin 7.x users should upgrade to the latest version: # emerge --sync # emerge --ask --oneshot --verbose ">=dev-java/icedtea-bin-7.2.6.4" IcedTea 6.x users should upgrade to the latest version: # emerge --sync # emerge --ask --oneshot --verbose ">=dev-java/icedtea-6.1.13.9" IcedTea bin 6.x users should upgrade to the latest version: # emerge --sync # emerge --ask --oneshot --verbose ">=dev-java/icedtea-bin-6.1.13.9" References ========== [ 1 ] CVE-2014-6585 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-6585 [ 2 ] CVE-2014-6587 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-6587 [ 3 ] CVE-2014-6591 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-6591 [ 4 ] CVE-2014-6593 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-6593 [ 5 ] CVE-2014-6601 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-6601 [ 6 ] CVE-2015-0383 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0383 [ 7 ] CVE-2015-0395 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0395 [ 8 ] CVE-2015-0400 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0400 [ 9 ] CVE-2015-0407 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0407 [ 10 ] CVE-2015-0408 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0408 [ 11 ] CVE-2015-0412 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0412 [ 12 ] CVE-2015-2590 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2590 [ 13 ] CVE-2015-2601 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2601 [ 14 ] CVE-2015-2613 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2613 [ 15 ] CVE-2015-2621 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2621 [ 16 ] CVE-2015-2625 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2625 [ 17 ] CVE-2015-2628 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2628 [ 18 ] CVE-2015-2632 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2632 [ 19 ] CVE-2015-4731 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4731 [ 20 ] CVE-2015-4732 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4732 [ 21 ] CVE-2015-4733 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4733 [ 22 ] CVE-2015-4734 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4734 [ 23 ] CVE-2015-4748 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4748 [ 24 ] CVE-2015-4749 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4749 [ 25 ] CVE-2015-4760 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4760 [ 26 ] CVE-2015-4803 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4803 [ 27 ] CVE-2015-4805 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4805 [ 28 ] CVE-2015-4806 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4806 [ 29 ] CVE-2015-4835 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4835 [ 30 ] CVE-2015-4840 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4840 [ 31 ] CVE-2015-4842 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4842 [ 32 ] CVE-2015-4843 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4843 [ 33 ] CVE-2015-4844 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4844 [ 34 ] CVE-2015-4860 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4860 [ 35 ] CVE-2015-4871 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4871 [ 36 ] CVE-2015-4872 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4872 [ 37 ] CVE-2015-4881 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4881 [ 38 ] CVE-2015-4882 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4882 [ 39 ] CVE-2015-4883 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4883 [ 40 ] CVE-2015-4893 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4893 [ 41 ] CVE-2015-4903 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4903 [ 42 ] CVE-2015-4911 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4911 [ 43 ] CVE-2016-0402 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-0402 [ 44 ] CVE-2016-0448 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-0448 [ 45 ] CVE-2016-0466 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-0466 [ 46 ] CVE-2016-0483 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-0483 [ 47 ] CVE-2016-0494 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-0494 Availability ============ This GLSA and any updates to it are available for viewing at the Gentoo Security Website: https://security.gentoo.org/glsa/201603-14 Concerns? ========= Security is a primary focus of Gentoo Linux and ensuring the confidentiality and security of our users' machines is of utmost importance to us. Any security concerns should be addressed to security@gentoo.org or alternatively, you may file a bug at https://bugs.gentoo.org. License ======= Copyright 2016 Gentoo Foundation, Inc; referenced text belongs to its owner(s). The contents of this document are licensed under the Creative Commons - Attribution / Share Alike license. http://creativecommons.org/licenses/by-sa/2.5 . Impact ====== An context-dependent attacker may be able to influence the confidentiality, integrity, and availability of Java applications/runtime. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Note: the current version of the following document is available here: https://h20564.www2.hp.com/portal/site/hpsc/public/kb/ docDisplay?docId=emr_na-c04580241 SUPPORT COMMUNICATION - SECURITY BULLETIN Document ID: c04580241 Version: 1 HPSBUX03273 SSRT101951 rev.1 - HP-UX running Java6, Remote Unauthorized Access, Disclosure of Information, and Other Vulnerabilities NOTICE: The information in this Security Bulletin should be acted upon as soon as possible. Release Date: 2015-02-25 Last Updated: 2015-02-25 Potential Security Impact: Remote unauthorized access, disclosure of information, and other vulnerabilities Source: Hewlett-Packard Company, HP Software Security Response Team VULNERABILITY SUMMARY Potential security vulnerabilities have been identified in the Java Runtime Environment (JRE) and the Java Developer Kit (JDK) running on HP-UX. These vulnerabilities could allow remote unauthorized access, disclosure of information, and other vulnerabilities. References: CVE-2014-3566 CVE-2014-6585 CVE-2014-6587 CVE-2014-6591 CVE-2014-6593 CVE-2014-6601 CVE-2015-0383 CVE-2015-0395 CVE-2015-0400 CVE-2015-0403 CVE-2015-0406 CVE-2015-0407 CVE-2015-0408 CVE-2015-0410 CVE-2015-0412 SSRT101951 SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed. HP-UX B.11.11, B.11.23, and B.11.31 running HP JDK and JRE v6.0.24 and earlier. BACKGROUND CVSS 2.0 Base Metrics =========================================================== Reference Base Vector Base Score CVE-2014-3566 (AV:N/AC:M/Au:N/C:P/I:N/A:N) 4.3 CVE-2014-6585 (AV:N/AC:H/Au:N/C:P/I:N/A:N) 2.6 CVE-2014-6587 (AV:L/AC:L/Au:S/C:P/I:P/A:P) 4.3 CVE-2014-6591 (AV:N/AC:H/Au:N/C:P/I:N/A:N) 2.6 CVE-2014-6593 (AV:N/AC:H/Au:N/C:P/I:P/A:N) 4.0 CVE-2014-6601 (AV:N/AC:L/Au:N/C:C/I:C/A:C) 10.0 CVE-2015-0383 (AV:L/AC:M/Au:N/C:N/I:P/A:C) 5.4 CVE-2015-0395 (AV:N/AC:M/Au:N/C:C/I:C/A:C) 9.3 CVE-2015-0400 (AV:N/AC:L/Au:N/C:P/I:N/A:N) 5.0 CVE-2015-0403 (AV:L/AC:M/Au:N/C:C/I:C/A:C) 6.9 CVE-2015-0406 (AV:N/AC:M/Au:N/C:P/I:N/A:P) 5.8 CVE-2015-0407 (AV:N/AC:L/Au:N/C:P/I:N/A:N) 5.0 CVE-2015-0408 (AV:N/AC:L/Au:N/C:C/I:C/A:C) 10.0 CVE-2015-0410 (AV:N/AC:L/Au:N/C:N/I:N/A:P) 5.0 CVE-2015-0412 (AV:L/AC:L/Au:N/C:C/I:C/A:C) 7.2 =========================================================== Information on CVSS is documented in HP Customer Notice: HPSN-2008-002 RESOLUTION HP has provided the following Java version upgrade to resolve these vulnerabilities. The upgrade is available from the following location: http://www.hp.com/java OS Version Release Version HP-UX B.11.11, B.11.23, B.11.31 JDK and JRE v6.0.25 or subsequent MANUAL ACTIONS: Yes - Update For Java v6.0, update to Java v6.0.25 or subsequent PRODUCT SPECIFIC INFORMATION HP-UX Software Assistant: HP-UX Software Assistant is an enhanced application that replaces HP-UX Security Patch Check. It analyzes all Security Bulletins issued by HP and lists recommended actions that may apply to a specific HP-UX system. It can also download patches and create a depot automatically. For more information see https://www.hp.com/go/swa The following text is for use by the HP-UX Software Assistant. AFFECTED VERSIONS HP-UX B.11.11 HP-UX B.11.23 HP-UX B.11.31 =========== Jdk60.JDK60 Jdk60.JDK60-COM Jdk60.JDK60-IPF32 Jdk60.JDK60-IPF64 Jdk60.JDK60-PNV2 Jdk60.JDK60-PWV2 Jdk60.JDK60-PA20 Jdk60.JDK60-PA20W Jre60.JRE60-PNV2 Jre60.JRE60-PNV2-H Jre60.JRE60-PWV2 Jre60.JRE60-PWV2-H Jre60.JRE60-COM Jre60.JRE60-COM-DOC Jre60.JRE60-PA20 Jre60.JRE60-PA20-HS Jre60.JRE60-PA20W Jre60.JRE60-PA20W-HS Jre60.JRE60-IPF32 Jre60.JRE60-IPF32-HS Jre60.JRE60-IPF64 Jre60.JRE60-IPF64-HS action: install revision 1.6.0.25.00 or subsequent END AFFECTED VERSIONS HISTORY Version:1 (rev.1) - 25 February 2015 Initial release Third Party Security Patches: Third party security patches that are to be installed on systems running HP software products should be applied in accordance with the customer's patch management policy. Support: For issues about implementing the recommendations of this Security Bulletin, contact normal HP Services support channel. For other issues about the content of this Security Bulletin, send e-mail to security-alert@hp.com. Report: To report a potential security vulnerability with any HP supported product, send Email to: security-alert@hp.com Subscribe: To initiate a subscription to receive future HP Security Bulletin alerts via Email: http://h41183.www4.hp.com/signup_alerts.php?jumpid=hpsc_secbulletins Security Bulletin Archive: A list of recently released Security Bulletins is available here: https://h20564.www2.hp.com/portal/site/hpsc/public/kb/secBullArchive/ Software Product Category: The Software Product Category is represented in the title by the two characters following HPSB. 3C = 3COM 3P = 3rd Party Software GN = HP General Software HF = HP Hardware and Firmware MP = MPE/iX MU = Multi-Platform Software NS = NonStop Servers OV = OpenVMS PI = Printing and Imaging PV = ProCurve ST = Storage Software TU = Tru64 UNIX UX = HP-UX Copyright 2015 Hewlett-Packard Development Company, L.P. Hewlett-Packard Company shall not be liable for technical or editorial errors or omissions contained herein. The information provided is provided "as is" without warranty of any kind. To the extent permitted by law, neither HP or its affiliates, subcontractors or suppliers will be liable for incidental,special or consequential damages including downtime cost; lost profits; damages relating to the procurement of substitute products or services; or damages for loss of data, or software restoration. The information in this document is subject to change without notice. Hewlett-Packard Company and the names of Hewlett-Packard products referenced herein are trademarks of Hewlett-Packard Company in the United States and other countries. Other product and company names mentioned herein may be trademarks of their respective owners. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.13 (GNU/Linux) iEYEARECAAYFAlTukRcACgkQ4B86/C0qfVnUtwCfRdO1K/zAa/AAg4hCTnSMN8pC K+AAoJzTGDsnjXe/ikKO5pVsr5TZe5aG =NcPf -----END PGP SIGNATURE----- . ============================================================================ Ubuntu Security Notice USN-2487-1 January 28, 2015 openjdk-7 vulnerabilities ============================================================================ A security issue affects these releases of Ubuntu and its derivatives: - Ubuntu 14.10 - Ubuntu 14.04 LTS Summary: Several security issues were fixed in OpenJDK 7. An attacker could exploit these to cause a denial of service or expose sensitive data over the network. An attacker could exploit these to expose sensitive data over the network. (CVE-2014-6585, CVE-2014-6591, CVE-2015-0400, CVE-2015-0407) A vulnerability was discovered in the OpenJDK JRE related to information disclosure and integrity. An attacker could exploit this to expose sensitive data over the network. (CVE-2014-6593) A vulnerability was discovered in the OpenJDK JRE related to integrity and availability. An attacker could exploit this to cause a denial of service. (CVE-2015-0383) A vulnerability was discovered in the OpenJDK JRE related to availability. An attacker could this exploit to cause a denial of service. (CVE-2015-0410) A vulnerability was discovered in the OpenJDK JRE related to data integrity. (CVE-2015-0413) Update instructions: The problem can be corrected by updating your system to the following package versions: Ubuntu 14.10: icedtea-7-jre-jamvm 7u75-2.5.4-1~utopic1 openjdk-7-jre 7u75-2.5.4-1~utopic1 openjdk-7-jre-headless 7u75-2.5.4-1~utopic1 openjdk-7-jre-lib 7u75-2.5.4-1~utopic1 openjdk-7-jre-zero 7u75-2.5.4-1~utopic1 openjdk-7-source 7u75-2.5.4-1~utopic1 Ubuntu 14.04 LTS: icedtea-7-jre-jamvm 7u75-2.5.4-1~trusty1 openjdk-7-jre 7u75-2.5.4-1~trusty1 openjdk-7-jre-headless 7u75-2.5.4-1~trusty1 openjdk-7-jre-lib 7u75-2.5.4-1~trusty1 openjdk-7-jre-zero 7u75-2.5.4-1~trusty1 openjdk-7-source 7u75-2.5.4-1~trusty1 This update uses a new upstream release, which includes additional bug fixes. After a standard system update you need to restart any Java applications or applets to make all the necessary changes. This update contains a known regression in the Zero alternative Java Virtual Machine on PowerPC and a future update will correct this issue. See https://launchpad.net/bugs/1415282 for details. We apologize for the inconvenience. References: http://www.ubuntu.com/usn/usn-2487-1 CVE-2014-3566, CVE-2014-6585, CVE-2014-6587, CVE-2014-6591, CVE-2014-6593, CVE-2014-6601, CVE-2015-0383, CVE-2015-0395, CVE-2015-0400, CVE-2015-0407, CVE-2015-0408, CVE-2015-0410, CVE-2015-0412, CVE-2015-0413 Package Information: https://launchpad.net/ubuntu/+source/openjdk-7/7u75-2.5.4-1~utopic1 https://launchpad.net/ubuntu/+source/openjdk-7/7u75-2.5.4-1~trusty1

Trust: 2.52

sources: NVD: CVE-2015-0400 // JVNDB: JVNDB-2015-001088 // BID: 72159 // VULMON: CVE-2015-0400 // PACKETSTORM: 136185 // PACKETSTORM: 130759 // PACKETSTORM: 132641 // PACKETSTORM: 130549 // PACKETSTORM: 130125 // PACKETSTORM: 130141

AFFECTED PRODUCTS

vendor:oraclemodel:jrescope:eqversion:1.6.0

Trust: 1.6

vendor:oraclemodel:jdkscope:eqversion:1.6.0

Trust: 1.6

vendor:canonicalmodel:ubuntu linuxscope:eqversion:14.10

Trust: 1.6

vendor:oraclemodel:jdkscope:eqversion:1.7.0

Trust: 1.6

vendor:oraclemodel:jrescope:eqversion:1.7.0

Trust: 1.6

vendor:oraclemodel:jrescope:eqversion:1.8.0

Trust: 1.0

vendor:oraclemodel:jdkscope:eqversion:1.8.0

Trust: 1.0

vendor:opensusemodel:opensusescope:eqversion:13.2

Trust: 1.0

vendor:canonicalmodel:ubuntu linuxscope:eqversion:12.04

Trust: 1.0

vendor:canonicalmodel:ubuntu linuxscope:eqversion:14.04

Trust: 1.0

vendor:canonicalmodel:ubuntu linuxscope:eqversion:10.04

Trust: 1.0

vendor:novellmodel:suse linux enterprise serverscope:eqversion:12.0

Trust: 1.0

vendor:novellmodel:suse linux enterprise desktopscope:eqversion:12.0

Trust: 1.0

vendor:sunmodel:jre 17scope:eqversion:1.6

Trust: 0.9

vendor:sunmodel:jre 13scope:eqversion:1.6

Trust: 0.9

vendor:sunmodel:jre 12scope:eqversion:1.6

Trust: 0.9

vendor:sunmodel:jre 10scope:eqversion:1.6

Trust: 0.9

vendor:sunmodel:jre 07scope:eqversion:1.6

Trust: 0.9

vendor:sunmodel:jre 06scope:eqversion:1.6

Trust: 0.9

vendor:sunmodel:jre 05scope:eqversion:1.6

Trust: 0.9

vendor:sunmodel:jre 04scope:eqversion:1.6

Trust: 0.9

vendor:sunmodel:jrescope:eqversion:1.6

Trust: 0.9

vendor:sunmodel:jre 1.7.0 4scope: - version: -

Trust: 0.9

vendor:sunmodel:jre 1.7.0 2scope: - version: -

Trust: 0.9

vendor:sunmodel:jrescope:eqversion:1.7

Trust: 0.9

vendor:sunmodel:jre 1.6.0 32scope: - version: -

Trust: 0.9

vendor:sunmodel:jre 1.6.0 30scope: - version: -

Trust: 0.9

vendor:sunmodel:jre 1.6.0 28scope: - version: -

Trust: 0.9

vendor:sunmodel:jre 1.6.0 27scope: - version: -

Trust: 0.9

vendor:sunmodel:jre 1.6.0 26scope: - version: -

Trust: 0.9

vendor:sunmodel:jre 1.6.0 25scope: - version: -

Trust: 0.9

vendor:sunmodel:jre 1.6.0 24scope: - version: -

Trust: 0.9

vendor:sunmodel:jre 1.6.0 23scope: - version: -

Trust: 0.9

vendor:sunmodel:jre 1.6.0 22scope: - version: -

Trust: 0.9

vendor:sunmodel:jre 1.6.0 21scope: - version: -

Trust: 0.9

vendor:sunmodel:jre 1.6.0 19scope: - version: -

Trust: 0.9

vendor:sunmodel:jre 1.6.0 18scope: - version: -

Trust: 0.9

vendor:sunmodel:jre 1.6.0 15scope: - version: -

Trust: 0.9

vendor:sunmodel:jre 1.6.0 14scope: - version: -

Trust: 0.9

vendor:sunmodel:jre 1.6.0 11scope: - version: -

Trust: 0.9

vendor:sunmodel:jre 1.6.0 03scope: - version: -

Trust: 0.9

vendor:sunmodel:jre 1.6.0 02scope: - version: -

Trust: 0.9

vendor:sunmodel:jre 1.6.0 01scope: - version: -

Trust: 0.9

vendor:sunmodel:jdkscope:eqversion:1.7

Trust: 0.9

vendor:sunmodel:jdk 17scope:eqversion:1.6

Trust: 0.9

vendor:sunmodel:jdk 14scope:eqversion:1.6

Trust: 0.9

vendor:sunmodel:jdk 13scope:eqversion:1.6

Trust: 0.9

vendor:sunmodel:jdk 11scope:eqversion:1.6

Trust: 0.9

vendor:sunmodel:jdk 10scope:eqversion:1.6

Trust: 0.9

vendor:sunmodel:jdk 07scope:eqversion:1.6

Trust: 0.9

vendor:sunmodel:jdk 06scope:eqversion:1.6

Trust: 0.9

vendor:sunmodel:jdk 05scope:eqversion:1.6

Trust: 0.9

vendor:sunmodel:jdk 04scope:eqversion:1.6

Trust: 0.9

vendor:sunmodel:jdkscope:eqversion:1.6

Trust: 0.9

vendor:sunmodel:jdk 1.7.0 4scope: - version: -

Trust: 0.9

vendor:sunmodel:jdk 1.7.0 2scope: - version: -

Trust: 0.9

vendor:sunmodel:jdk 1.6.0 32scope: - version: -

Trust: 0.9

vendor:sunmodel:jdk 1.6.0 30scope: - version: -

Trust: 0.9

vendor:sunmodel:jdk 1.6.0 28scope: - version: -

Trust: 0.9

vendor:sunmodel:jdk 1.6.0 27scope: - version: -

Trust: 0.9

vendor:sunmodel:jdk 1.6.0 26scope: - version: -

Trust: 0.9

vendor:sunmodel:jdk 1.6.0 25scope: - version: -

Trust: 0.9

vendor:sunmodel:jdk 1.6.0 24scope: - version: -

Trust: 0.9

vendor:sunmodel:jdk 1.6.0 23scope: - version: -

Trust: 0.9

vendor:sunmodel:jdk 1.6.0 22scope: - version: -

Trust: 0.9

vendor:sunmodel:jdk 1.6.0 21scope: - version: -

Trust: 0.9

vendor:sunmodel:jdk 1.6.0 20scope: - version: -

Trust: 0.9

vendor:sunmodel:jdk 1.6.0 19scope: - version: -

Trust: 0.9

vendor:sunmodel:jdk 1.6.0 18scope: - version: -

Trust: 0.9

vendor:sunmodel:jdk 1.6.0 15scope: - version: -

Trust: 0.9

vendor:sunmodel:jdk 1.6.0 03scope: - version: -

Trust: 0.9

vendor:sunmodel:jdk 1.6.0 02scope: - version: -

Trust: 0.9

vendor:oraclemodel:jdkscope:lteversion:6 update 85

Trust: 0.8

vendor:oraclemodel:jdkscope:lteversion:7 update 72

Trust: 0.8

vendor:oraclemodel:jdkscope:lteversion:8 update 25

Trust: 0.8

vendor:oraclemodel:jrescope:lteversion:6 update 85

Trust: 0.8

vendor:oraclemodel:jrescope:lteversion:7 update 72

Trust: 0.8

vendor:oraclemodel:jrescope:lteversion:8 update 25

Trust: 0.8

vendor:sun microsystemsmodel:jdkscope:lteversion:6 update 21

Trust: 0.8

vendor:sun microsystemsmodel:jrescope:lteversion:6 update 21

Trust: 0.8

vendor:hitachimodel:cosminexus application server enterprisescope:eqversion:version 6

Trust: 0.8

vendor:hitachimodel:cosminexus application server standardscope:eqversion:version 6

Trust: 0.8

vendor:hitachimodel:cosminexus application server version 5scope: - version: -

Trust: 0.8

vendor:hitachimodel:cosminexus clientscope:eqversion:version 6

Trust: 0.8

vendor:hitachimodel:cosminexus developer light version 6scope: - version: -

Trust: 0.8

vendor:hitachimodel:cosminexus developer professional version 6scope: - version: -

Trust: 0.8

vendor:hitachimodel:cosminexus developer standard version 6scope: - version: -

Trust: 0.8

vendor:hitachimodel:cosminexus developer version 5scope: - version: -

Trust: 0.8

vendor:hitachimodel:cosminexus developer's kit for javascope: - version: -

Trust: 0.8

vendor:hitachimodel:cosminexus primary serverscope:eqversion:base

Trust: 0.8

vendor:hitachimodel:cosminexus studioscope:eqversion:version 5

Trust: 0.8

vendor:hitachimodel:application serverscope: - version: -

Trust: 0.8

vendor:hitachimodel:application server for developersscope: - version: -

Trust: 0.8

vendor:hitachimodel:developer's kit for javascope: - version: -

Trust: 0.8

vendor:hitachimodel:ucosminexus application serverscope:eqversion:-r

Trust: 0.8

vendor:hitachimodel:ucosminexus application serverscope:eqversion:express

Trust: 0.8

vendor:hitachimodel:ucosminexus application serverscope:eqversion:light

Trust: 0.8

vendor:hitachimodel:ucosminexus application serverscope:eqversion:standard-r

Trust: 0.8

vendor:hitachimodel:ucosminexus application server enterprisescope: - version: -

Trust: 0.8

vendor:hitachimodel:ucosminexus application server smart editionscope: - version: -

Trust: 0.8

vendor:hitachimodel:ucosminexus application server standardscope: - version: -

Trust: 0.8

vendor:hitachimodel:ucosminexus clientscope:eqversion:none

Trust: 0.8

vendor:hitachimodel:ucosminexus clientscope:eqversion:for plug-in

Trust: 0.8

vendor:hitachimodel:ucosminexus developerscope:eqversion:01

Trust: 0.8

vendor:hitachimodel:ucosminexus developerscope:eqversion:professional

Trust: 0.8

vendor:hitachimodel:ucosminexus developerscope:eqversion:professional for plug-in

Trust: 0.8

vendor:hitachimodel:ucosminexus developer lightscope: - version: -

Trust: 0.8

vendor:hitachimodel:ucosminexus developer standardscope: - version: -

Trust: 0.8

vendor:hitachimodel:ucosminexus operatorscope: - version: -

Trust: 0.8

vendor:hitachimodel:ucosminexus primary serverscope:eqversion:base

Trust: 0.8

vendor:hitachimodel:ucosminexus serverscope:eqversion:standard-r

Trust: 0.8

vendor:hitachimodel:ucosminexus service architectscope: - version: -

Trust: 0.8

vendor:hitachimodel:ucosminexus service platformscope:eqversion:none

Trust: 0.8

vendor:hitachimodel:ucosminexus service platformscope:eqversion:- messaging

Trust: 0.8

vendor:sunmodel:jre 1.6.0 20scope: - version: -

Trust: 0.6

vendor:sunmodel:jre 1.6.0 2scope: - version: -

Trust: 0.6

vendor:sunmodel:jdk 1.6.0 01scope: - version: -

Trust: 0.6

vendor:sunmodel:jdk 01-b06scope:eqversion:1.6

Trust: 0.6

vendor:xeroxmodel:phaser 3635mfpscope:eqversion:0

Trust: 0.3

vendor:sunmodel:jdk 1.6.0 01-b06scope: - version: -

Trust: 0.3

vendor:sunmodel:jdk 01scope:eqversion:1.6

Trust: 0.3

vendor:ibmmodel:tivoli monitoring fixpackscope:eqversion:6.2.24

Trust: 0.3

vendor:ibmmodel:rational application developerscope:eqversion:7.0

Trust: 0.3

vendor:ibmmodel:cics transaction gatewayscope:eqversion:8.0

Trust: 0.3

vendor:ibmmodel:cics transaction gatewayscope:eqversion:7.2

Trust: 0.3

vendor:ibmmodel:aixscope:eqversion:7.1

Trust: 0.3

vendor:ibmmodel:aixscope:eqversion:6.1

Trust: 0.3

vendor:ibmmodel:aixscope:eqversion:5.3

Trust: 0.3

vendor:hpmodel:hp-ux b.11.31scope: - version: -

Trust: 0.3

vendor:hpmodel:hp-ux b.11.23scope: - version: -

Trust: 0.3

vendor:hpmodel:hp-ux b.11.11scope: - version: -

Trust: 0.3

vendor:gentoomodel:linuxscope: - version: -

Trust: 0.3

vendor:avayamodel:proactive contactscope:eqversion:5.0

Trust: 0.3

vendor:avayamodel:meeting exchangescope:eqversion:6.0

Trust: 0.3

vendor:avayamodel:meeting exchangescope:eqversion:5.2

Trust: 0.3

vendor:avayamodel:iqscope:eqversion:5

Trust: 0.3

vendor:avayamodel:communication server 1000m signaling serverscope:eqversion:7.0

Trust: 0.3

vendor:avayamodel:communication server 1000mscope:eqversion:7.0

Trust: 0.3

vendor:avayamodel:communication server 1000e signaling serverscope:eqversion:7.0

Trust: 0.3

vendor:avayamodel:communication server 1000escope:eqversion:7.0

Trust: 0.3

vendor:avayamodel:aura system managerscope:eqversion:6.0

Trust: 0.3

vendor:avayamodel:aura session managerscope:eqversion:6.0

Trust: 0.3

vendor:avayamodel:aura presence servicesscope:eqversion:6.0

Trust: 0.3

vendor:avayamodel:aura messagingscope:eqversion:6.0

Trust: 0.3

vendor:avayamodel:aura experience portalscope:eqversion:6.0

Trust: 0.3

vendor:avayamodel:aura application server sip corescope:eqversion:53002.0

Trust: 0.3

sources: BID: 72159 // JVNDB: JVNDB-2015-001088 // CNNVD: CNNVD-201501-521 // NVD: CVE-2015-0400

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2015-0400
value: MEDIUM

Trust: 1.0

NVD: CVE-2015-0400
value: MEDIUM

Trust: 0.8

CNNVD: CNNVD-201501-521
value: MEDIUM

Trust: 0.6

VULMON: CVE-2015-0400
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2015-0400
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:P/I:N/A:N
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.9

sources: VULMON: CVE-2015-0400 // JVNDB: JVNDB-2015-001088 // CNNVD: CNNVD-201501-521 // NVD: CVE-2015-0400

PROBLEMTYPE DATA

problemtype:NVD-CWE-noinfo

Trust: 1.0

sources: NVD: CVE-2015-0400

THREAT TYPE

remote

Trust: 0.9

sources: PACKETSTORM: 136185 // PACKETSTORM: 130759 // PACKETSTORM: 130549 // CNNVD: CNNVD-201501-521

TYPE

Unknown

Trust: 0.3

sources: BID: 72159

CONFIGURATIONS

sources: JVNDB: JVNDB-2015-001088

PATCH

title:HS15-003url:http://www.hitachi.co.jp/Prod/comp/soft1/global/security/info/vuls/HS15-003/index.html

Trust: 0.8

title:HPSBUX03273 SSRT101951url:http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en&cc=us&objectID=c04580241

Trust: 0.8

title:HPSBUX03281 SSRT101968url:http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en&cc=us&objectID=c04583581

Trust: 0.8

title:1695474url:https://www-304.ibm.com/support/docview.wss?uid=swg21695474

Trust: 0.8

title:1698222url:http://www-01.ibm.com/support/docview.wss?uid=swg21698222

Trust: 0.8

title:1698782url:http://www-01.ibm.com/support/docview.wss?uid=swg21698782

Trust: 0.8

title:Oracle Critical Patch Update Advisory - January 2015url:http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html

Trust: 0.8

title:Text Form of Oracle Critical Patch Update - January 2015 Risk Matricesurl:http://www.oracle.com/technetwork/topics/security/cpujan2015verbose-1972976.html

Trust: 0.8

title:January 2015 Critical Patch Update Releasedurl:https://blogs.oracle.com/security/entry/january_2015_critical_patch_update

Trust: 0.8

title:HS15-003url:http://www.hitachi.co.jp/Prod/comp/soft1/security/info/vuls/HS15-003/index.html

Trust: 0.8

title:Oracle Corporation Javaプラグインの脆弱性に関するお知らせurl:http://www.fmworld.net/biz/common/oracle/20150122.html

Trust: 0.8

title:Red Hat: CVE-2015-0400url:https://vulmon.com/vendoradvisory?qidtp=red_hat_cve_database&qid=CVE-2015-0400

Trust: 0.1

title:Ubuntu Security Notice: openjdk-7 vulnerabilitiesurl:https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice&qid=USN-2487-1

Trust: 0.1

title:Ubuntu Security Notice: openjdk-6 vulnerabilitiesurl:https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice&qid=USN-2486-1

Trust: 0.1

title:Oracle: Oracle Critical Patch Update Advisory - January 2015url:https://vulmon.com/vendoradvisory?qidtp=oracle_advisories&qid=4a692d6d60aa31507cb101702b494c51

Trust: 0.1

title:non-controlflow-hijacking-datasetsurl:https://github.com/camel-clarkson/non-controlflow-hijacking-datasets

Trust: 0.1

sources: VULMON: CVE-2015-0400 // JVNDB: JVNDB-2015-001088

EXTERNAL IDS

db:NVDid:CVE-2015-0400

Trust: 3.4

db:BIDid:72159

Trust: 1.4

db:SECTRACKid:1031580

Trust: 1.1

db:JVNDBid:JVNDB-2015-001088

Trust: 0.8

db:CNNVDid:CNNVD-201501-521

Trust: 0.6

db:VULMONid:CVE-2015-0400

Trust: 0.1

db:PACKETSTORMid:136185

Trust: 0.1

db:PACKETSTORMid:130759

Trust: 0.1

db:PACKETSTORMid:132641

Trust: 0.1

db:PACKETSTORMid:130549

Trust: 0.1

db:PACKETSTORMid:130125

Trust: 0.1

db:PACKETSTORMid:130141

Trust: 0.1

sources: VULMON: CVE-2015-0400 // BID: 72159 // JVNDB: JVNDB-2015-001088 // PACKETSTORM: 136185 // PACKETSTORM: 130759 // PACKETSTORM: 132641 // PACKETSTORM: 130549 // PACKETSTORM: 130125 // PACKETSTORM: 130141 // CNNVD: CNNVD-201501-521 // NVD: CVE-2015-0400

REFERENCES

url:http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html

Trust: 2.0

url:https://www-304.ibm.com/support/docview.wss?uid=swg21695474

Trust: 1.4

url:http://www.ubuntu.com/usn/usn-2486-1

Trust: 1.2

url:http://www.ubuntu.com/usn/usn-2487-1

Trust: 1.2

url:https://security.gentoo.org/glsa/201507-14

Trust: 1.2

url:https://security.gentoo.org/glsa/201603-14

Trust: 1.2

url:http://h20564.www2.hp.com/hpsc/doc/public/display?docid=emr_na-c04583581

Trust: 1.1

url:http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00001.html

Trust: 1.1

url:http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00024.html

Trust: 1.1

url:http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00018.html

Trust: 1.1

url:http://marc.info/?l=bugtraq&m=142496355704097&w=2

Trust: 1.1

url:http://marc.info/?l=bugtraq&m=142607790919348&w=2

Trust: 1.1

url:http://www.securityfocus.com/bid/72159

Trust: 1.1

url:http://www.securitytracker.com/id/1031580

Trust: 1.1

url:http://www.vmware.com/security/advisories/vmsa-2015-0003.html

Trust: 1.1

url:https://exchange.xforce.ibmcloud.com/vulnerabilities/100149

Trust: 1.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-0400

Trust: 0.8

url:http://www.ipa.go.jp/security/ciadr/vul/20150121-jre.html

Trust: 0.8

url:http://www.jpcert.or.jp/at/2015/at150003.html

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2015-0400

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2014-6591

Trust: 0.6

url:https://nvd.nist.gov/vuln/detail/cve-2015-0408

Trust: 0.6

url:https://nvd.nist.gov/vuln/detail/cve-2015-0400

Trust: 0.6

url:https://nvd.nist.gov/vuln/detail/cve-2014-6601

Trust: 0.6

url:https://nvd.nist.gov/vuln/detail/cve-2015-0395

Trust: 0.6

url:https://nvd.nist.gov/vuln/detail/cve-2015-0407

Trust: 0.6

url:https://nvd.nist.gov/vuln/detail/cve-2014-6593

Trust: 0.6

url:https://nvd.nist.gov/vuln/detail/cve-2014-6585

Trust: 0.6

url:https://nvd.nist.gov/vuln/detail/cve-2015-0383

Trust: 0.6

url:https://nvd.nist.gov/vuln/detail/cve-2014-6587

Trust: 0.6

url:https://nvd.nist.gov/vuln/detail/cve-2015-0412

Trust: 0.6

url:https://nvd.nist.gov/vuln/detail/cve-2015-0410

Trust: 0.5

url:https://nvd.nist.gov/vuln/detail/cve-2014-3566

Trust: 0.5

url:http://www.oracle.com/technetwork/java/index.html

Trust: 0.3

url:http://seclists.org/bugtraq/2015/feb/161

Trust: 0.3

url:https://downloads.avaya.com/css/p8/documents/101009168

Trust: 0.3

url:https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c04583581

Trust: 0.3

url:https://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=migr-5097462

Trust: 0.3

url:http://www-01.ibm.com/support/docview.wss?uid=swg21719390

Trust: 0.3

url:http://aix.software.ibm.com/aix/efixes/security/java_feb2015_advisory.asc

Trust: 0.3

url:http://www.ibm.com/developerworks/java/jdk/alerts/#oracle_january_20_2015_cpu

Trust: 0.3

url:https://www.xerox.com/download/security/security-bulletin/1ddcb-5255ff0558bfd/cert_security_mini-_bulletin_xrx15aw_for_ph3635mfp_v1-0.pdf

Trust: 0.3

url:http://www-01.ibm.com/support/docview.wss?uid=swg21697480

Trust: 0.3

url:http://www-01.ibm.com/support/docview.wss?uid=swg21692294

Trust: 0.3

url:http://www-01.ibm.com/support/docview.wss?uid=swg21704479

Trust: 0.3

url:http://www-01.ibm.com/support/docview.wss?uid=nas8n1020751

Trust: 0.3

url:http://www-01.ibm.com/support/docview.wss?uid=swg21697889

Trust: 0.3

url:http://www-01.ibm.com/support/docview.wss?uid=swg21902448

Trust: 0.3

url:http://www-01.ibm.com/support/docview.wss?uid=swg21700230

Trust: 0.3

url:http://www-01.ibm.com/support/docview.wss?uid=swg21700879

Trust: 0.3

url:https://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=migr-5098599

Trust: 0.3

url:http://www-01.ibm.com/support/docview.wss?uid=swg21964027

Trust: 0.3

url:http://www-01.ibm.com/support/docview.wss?uid=swg21699907

Trust: 0.3

url:http://www-01.ibm.com/support/docview.wss?uid=swg21700137

Trust: 0.3

url:http://www-01.ibm.com/support/docview.wss?uid=swg21701319

Trust: 0.3

url:http://www-01.ibm.com/support/docview.wss?uid=swg21697984

Trust: 0.3

url:http://www-01.ibm.com/support/docview.wss?uid=swg21701485

Trust: 0.3

url:http://www-01.ibm.com/support/docview.wss?uid=swg21701945

Trust: 0.3

url:http://www-01.ibm.com/support/docview.wss?uid=swg21701926

Trust: 0.3

url:http://www-01.ibm.com/support/docview.wss?uid=swg21960065

Trust: 0.3

url:http://www-01.ibm.com/support/docview.wss?uid=swg21698305

Trust: 0.3

url:http://www-01.ibm.com/support/docview.wss?uid=swg21698837

Trust: 0.3

url:http://www-01.ibm.com/support/docview.wss?uid=swg21698222

Trust: 0.3

url:http://www-01.ibm.com/support/docview.wss?uid=swg21700706

Trust: 0.3

url:http://www-01.ibm.com/support/docview.wss?uid=swg21700625

Trust: 0.3

url:http://www-01.ibm.com/support/docview.wss?uid=swg21961009

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2015-0403

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2015-0406

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2015-0413

Trust: 0.3

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-0412

Trust: 0.2

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-0395

Trust: 0.2

url:https://security.gentoo.org/

Trust: 0.2

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2014-6593

Trust: 0.2

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2014-6587

Trust: 0.2

url:http://creativecommons.org/licenses/by-sa/2.5

Trust: 0.2

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-0400

Trust: 0.2

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2014-6591

Trust: 0.2

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-0408

Trust: 0.2

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-0383

Trust: 0.2

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2014-6585

Trust: 0.2

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-0407

Trust: 0.2

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2014-6601

Trust: 0.2

url:https://bugs.gentoo.org.

Trust: 0.2

url:http://www.hp.com/java

Trust: 0.2

url:http://h41183.www4.hp.com/signup_alerts.php?jumpid=hpsc_secbulletins

Trust: 0.2

url:https://www.hp.com/go/swa

Trust: 0.2

url:https://h20564.www2.hp.com/portal/site/hpsc/public/kb/

Trust: 0.2

url:https://h20564.www2.hp.com/portal/site/hpsc/public/kb/secbullarchive/

Trust: 0.2

url:https://cwe.mitre.org/data/definitions/.html

Trust: 0.1

url:https://www.rapid7.com/db/vulnerabilities/hpux-cve-2015-0400

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

url:https://github.com/camel-clarkson/non-controlflow-hijacking-datasets

Trust: 0.1

url:https://usn.ubuntu.com/2487-1/

Trust: 0.1

url:https://www.rapid7.com/db/vulnerabilities/aix-5.3-java_feb2015_advisory_cve-2015-0400

Trust: 0.1

url:http://tools.cisco.com/security/center/viewalert.x?alertid=37148

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-2621

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-4734

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-4806

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2016-0448

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-4911

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-4732

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-4882

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2016-0466

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-4835

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-4903

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-4844

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-4842

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-4760

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-2601

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-4893

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-4805

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-2590

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-2613

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-2601

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-2628

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-4749

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-4871

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-4749

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-2628

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-2632

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-4733

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-4805

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-2621

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-4748

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2016-0483

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-2590

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-4734

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2016-0494

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-4733

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-4732

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-4881

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-4806

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-2625

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-4760

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-4803

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-4840

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-4872

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-4843

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-4860

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-2625

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-2632

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-2613

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-4803

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2016-0402

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-4731

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-4731

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-4748

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-4883

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-4010

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2014-6549

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-6549

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-0413

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-0421

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-0406

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2014-3566

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-0403

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-0410

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-0421

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/openjdk-6/6b34-1.13.6-1ubuntu0.10.04.1

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/openjdk-6/6b34-1.13.6-1ubuntu0.12.04.1

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/openjdk-7/7u75-2.5.4-1~trusty1

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/openjdk-7/7u75-2.5.4-1~utopic1

Trust: 0.1

url:https://launchpad.net/bugs/1415282

Trust: 0.1

sources: VULMON: CVE-2015-0400 // BID: 72159 // JVNDB: JVNDB-2015-001088 // PACKETSTORM: 136185 // PACKETSTORM: 130759 // PACKETSTORM: 132641 // PACKETSTORM: 130549 // PACKETSTORM: 130125 // PACKETSTORM: 130141 // CNNVD: CNNVD-201501-521 // NVD: CVE-2015-0400

CREDITS

Oracle

Trust: 0.3

sources: BID: 72159

SOURCES

db:VULMONid:CVE-2015-0400
db:BIDid:72159
db:JVNDBid:JVNDB-2015-001088
db:PACKETSTORMid:136185
db:PACKETSTORMid:130759
db:PACKETSTORMid:132641
db:PACKETSTORMid:130549
db:PACKETSTORMid:130125
db:PACKETSTORMid:130141
db:CNNVDid:CNNVD-201501-521
db:NVDid:CVE-2015-0400

LAST UPDATE DATE

2024-08-14T12:47:58.365000+00:00


SOURCES UPDATE DATE

db:VULMONid:CVE-2015-0400date:2020-09-08T00:00:00
db:BIDid:72159date:2016-07-05T21:49:00
db:JVNDBid:JVNDB-2015-001088date:2015-03-26T00:00:00
db:CNNVDid:CNNVD-201501-521date:2015-01-22T00:00:00
db:NVDid:CVE-2015-0400date:2022-05-13T14:57:20.910

SOURCES RELEASE DATE

db:VULMONid:CVE-2015-0400date:2015-01-21T00:00:00
db:BIDid:72159date:2015-01-20T00:00:00
db:JVNDBid:JVNDB-2015-001088date:2015-01-21T00:00:00
db:PACKETSTORMid:136185date:2016-03-14T14:44:35
db:PACKETSTORMid:130759date:2015-03-11T16:04:36
db:PACKETSTORMid:132641date:2015-07-10T15:43:42
db:PACKETSTORMid:130549date:2015-02-26T17:13:55
db:PACKETSTORMid:130125date:2015-01-28T00:26:54
db:PACKETSTORMid:130141date:2015-01-29T06:07:43
db:CNNVDid:CNNVD-201501-521date:2015-01-22T00:00:00
db:NVDid:CVE-2015-0400date:2015-01-21T18:59:42.747