Changed |
CPE Configuration |
OR
*cpe:2.3:a:juniper:junos_space:*:*:*:*:*:*:*:* versions up to (including) 15.1
|
OR
*cpe:2.3:a:juniper:junos_space:*:*:*:*:*:*:*:* versions up to (excluding) 15.1
|
Changed |
CPE Configuration |
OR
*cpe:2.3:a:oracle:jdk:1.5.0:update_61:*:*:*:*:*:*
*cpe:2.3:a:oracle:jdk:1.6.0:update_71:*:*:*:*:*:*
*cpe:2.3:a:oracle:jdk:1.7.0:update51:*:*:*:*:*:*
*cpe:2.3:a:oracle:jdk:1.8.0:*:*:*:*:*:*:*
*cpe:2.3:a:oracle:jre:1.5.0:update_61:*:*:*:*:*:*
*cpe:2.3:a:oracle:jre:1.6.0:update_71:*:*:*:*:*:*
*cpe:2.3:a:oracle:jre:1.7.0:update_51:*:*:*:*:*:*
*cpe:2.3:a:oracle:jre:1.8.0:*:*:*:*:*:*:*
|
OR
*cpe:2.3:a:oracle:jdk:1.5.0:update_61:*:*:*:*:*:*
*cpe:2.3:a:oracle:jdk:1.6.0:update_71:*:*:*:*:*:*
*cpe:2.3:a:oracle:jdk:1.7.0:update51:*:*:*:*:*:*
*cpe:2.3:a:oracle:jdk:1.8.0:-:*:*:*:*:*:*
*cpe:2.3:a:oracle:jre:1.5.0:update_61:*:*:*:*:*:*
*cpe:2.3:a:oracle:jre:1.6.0:update_71:*:*:*:*:*:*
*cpe:2.3:a:oracle:jre:1.7.0:update_51:*:*:*:*:*:*
*cpe:2.3:a:oracle:jre:1.8.0:-:*:*:*:*:*:*
|
Changed |
CPE Configuration |
OR
*cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:lts:*:*:*
*cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
*cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*
*cpe:2.3:o:canonical:ubuntu_linux:13.10:*:*:*:*:*:*:*
*cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
*cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
*cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
|
OR
*cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*
*cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*
*cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*
*cpe:2.3:o:canonical:ubuntu_linux:13.10:*:*:*:*:*:*:*
*cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
|
Added |
CPE Configuration |
|
AND
OR
*cpe:2.3:a:ibm:forms_viewer:*:*:*:*:*:*:*:* versions from (including) 4.0.0 up to (excluding) 4.0.0.3
*cpe:2.3:a:ibm:forms_viewer:*:*:*:*:*:*:*:* versions from (including) 8.0.0 up to (excluding) 8.0.1.1
OR
cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*
|
Added |
CPE Configuration |
|
OR
*cpe:2.3:o:debian:debian_linux:6.0:*:*:*:*:*:*:*
*cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
*cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
|
Changed |
Reference Type |
http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10698 No Types Assigned
|
http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10698 Third Party Advisory
|
Changed |
Reference Type |
http://marc.info/?l=bugtraq&m=140852974709252&w=2 No Types Assigned
|
http://marc.info/?l=bugtraq&m=140852974709252&w=2 Issue Tracking, Mailing List, Third Party Advisory
|
Changed |
Reference Type |
http://rhn.redhat.com/errata/RHSA-2014-0675.html No Types Assigned
|
http://rhn.redhat.com/errata/RHSA-2014-0675.html Third Party Advisory
|
Changed |
Reference Type |
http://rhn.redhat.com/errata/RHSA-2014-0685.html No Types Assigned
|
http://rhn.redhat.com/errata/RHSA-2014-0685.html Third Party Advisory
|
Changed |
Reference Type |
http://secunia.com/advisories/58415 No Types Assigned
|
http://secunia.com/advisories/58415 Third Party Advisory
|
Changed |
Reference Type |
http://secunia.com/advisories/58974 No Types Assigned
|
http://secunia.com/advisories/58974 Third Party Advisory
|
Changed |
Reference Type |
http://secunia.com/advisories/59058 No Types Assigned
|
http://secunia.com/advisories/59058 Broken Link
|
Changed |
Reference Type |
http://security.gentoo.org/glsa/glsa-201406-32.xml No Types Assigned
|
http://security.gentoo.org/glsa/glsa-201406-32.xml Third Party Advisory
|
Changed |
Reference Type |
http://security.gentoo.org/glsa/glsa-201502-12.xml No Types Assigned
|
http://security.gentoo.org/glsa/glsa-201502-12.xml Third Party Advisory
|
Changed |
Reference Type |
http://www-01.ibm.com/support/docview.wss?uid=swg21672080 No Types Assigned
|
http://www-01.ibm.com/support/docview.wss?uid=swg21672080 Third Party Advisory
|
Changed |
Reference Type |
http://www-01.ibm.com/support/docview.wss?uid=swg21676746 No Types Assigned
|
http://www-01.ibm.com/support/docview.wss?uid=swg21676746 Broken Link
|
Changed |
Reference Type |
http://www.debian.org/security/2014/dsa-2912 No Types Assigned
|
http://www.debian.org/security/2014/dsa-2912 Third Party Advisory
|
Changed |
Reference Type |
http://www.securityfocus.com/bid/66856 No Types Assigned
|
http://www.securityfocus.com/bid/66856 Third Party Advisory, VDB Entry
|
Changed |
Reference Type |
http://www.ubuntu.com/usn/USN-2187-1 No Types Assigned
|
http://www.ubuntu.com/usn/USN-2187-1 Third Party Advisory
|
Changed |
Reference Type |
http://www.ubuntu.com/usn/USN-2191-1 No Types Assigned
|
http://www.ubuntu.com/usn/USN-2191-1 Third Party Advisory
|
Changed |
Reference Type |
https://access.redhat.com/errata/RHSA-2014:0413 No Types Assigned
|
https://access.redhat.com/errata/RHSA-2014:0413 Third Party Advisory
|
Changed |
Reference Type |
https://access.redhat.com/errata/RHSA-2014:0414 No Types Assigned
|
https://access.redhat.com/errata/RHSA-2014:0414 Third Party Advisory
|
Changed |
Reference Type |
https://www.ibm.com/support/docview.wss?uid=swg21675973 No Types Assigned
|
https://www.ibm.com/support/docview.wss?uid=swg21675973 Third Party Advisory
|
Removed |
Evaluator Description |
Per: http://www.oracle.com/technetwork/topics/security/cpuapr2014-1972952.html
"Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service."
|
|