Unspecified vulnerability in Oracle Java SE 6u95, 7u80, and 8u45, and Java SE Embedded 7u75 and 8u33 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Libraries, a different vulnerability than CVE-2015-4732.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Configuration 4 (hide)
|
Configuration 5 (hide)
|
History
21 Nov 2024, 02:27
Type | Values Removed | Values Added |
---|---|---|
References | () http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00039.html - Mailing List, Third Party Advisory | |
References | () http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00040.html - Mailing List, Third Party Advisory | |
References | () http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00046.html - Mailing List, Third Party Advisory | |
References | () http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00047.html - Mailing List, Third Party Advisory | |
References | () http://rhn.redhat.com/errata/RHSA-2015-1228.html - Third Party Advisory | |
References | () http://rhn.redhat.com/errata/RHSA-2015-1229.html - Third Party Advisory | |
References | () http://rhn.redhat.com/errata/RHSA-2015-1230.html - Third Party Advisory | |
References | () http://rhn.redhat.com/errata/RHSA-2015-1241.html - Third Party Advisory | |
References | () http://rhn.redhat.com/errata/RHSA-2015-1242.html - Third Party Advisory | |
References | () http://rhn.redhat.com/errata/RHSA-2015-1243.html - Third Party Advisory | |
References | () http://rhn.redhat.com/errata/RHSA-2015-1485.html - Third Party Advisory | |
References | () http://rhn.redhat.com/errata/RHSA-2015-1486.html - Third Party Advisory | |
References | () http://rhn.redhat.com/errata/RHSA-2015-1488.html - Third Party Advisory | |
References | () http://rhn.redhat.com/errata/RHSA-2015-1526.html - Third Party Advisory | |
References | () http://rhn.redhat.com/errata/RHSA-2015-1544.html - Third Party Advisory | |
References | () http://rhn.redhat.com/errata/RHSA-2015-1604.html - Third Party Advisory | |
References | () http://www.debian.org/security/2015/dsa-3316 - Mailing List, Third Party Advisory | |
References | () http://www.debian.org/security/2015/dsa-3339 - Mailing List, Third Party Advisory | |
References | () http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html - Patch, Vendor Advisory | |
References | () http://www.securityfocus.com/bid/75818 - Broken Link, Third Party Advisory, VDB Entry | |
References | () http://www.securitytracker.com/id/1032910 - Broken Link, Third Party Advisory, VDB Entry | |
References | () http://www.ubuntu.com/usn/USN-2696-1 - Third Party Advisory | |
References | () http://www.ubuntu.com/usn/USN-2706-1 - Third Party Advisory | |
References | () https://security.gentoo.org/glsa/201603-11 - Third Party Advisory | |
References | () https://security.gentoo.org/glsa/201603-14 - Third Party Advisory |
16 Jul 2024, 17:43
Type | Values Removed | Values Added |
---|---|---|
First Time |
Redhat
Redhat satellite Redhat enterprise Linux For Power Little Endian Eus Redhat enterprise Linux Workstation Suse linux Enterprise Server Redhat enterprise Linux For Ibm Z Systems Eus Redhat enterprise Linux Server Debian Opensuse opensuse Canonical ubuntu Linux Redhat enterprise Linux For Ibm Z Systems Redhat enterprise Linux Server Aus Redhat enterprise Linux For Power Big Endian Eus Opensuse Redhat enterprise Linux Eus Debian debian Linux Redhat enterprise Linux For Power Little Endian Redhat enterprise Linux Desktop Redhat enterprise Linux Server Tus Redhat enterprise Linux For Power Big Endian Suse Suse linux Enterprise Debuginfo Suse linux Enterprise Desktop Canonical |
|
References | () http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00039.html - Mailing List, Third Party Advisory | |
References | () http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00040.html - Mailing List, Third Party Advisory | |
References | () http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00046.html - Mailing List, Third Party Advisory | |
References | () http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00047.html - Mailing List, Third Party Advisory | |
References | () http://rhn.redhat.com/errata/RHSA-2015-1228.html - Third Party Advisory | |
References | () http://rhn.redhat.com/errata/RHSA-2015-1229.html - Third Party Advisory | |
References | () http://rhn.redhat.com/errata/RHSA-2015-1230.html - Third Party Advisory | |
References | () http://rhn.redhat.com/errata/RHSA-2015-1241.html - Third Party Advisory | |
References | () http://rhn.redhat.com/errata/RHSA-2015-1242.html - Third Party Advisory | |
References | () http://rhn.redhat.com/errata/RHSA-2015-1243.html - Third Party Advisory | |
References | () http://rhn.redhat.com/errata/RHSA-2015-1485.html - Third Party Advisory | |
References | () http://rhn.redhat.com/errata/RHSA-2015-1486.html - Third Party Advisory | |
References | () http://rhn.redhat.com/errata/RHSA-2015-1488.html - Third Party Advisory | |
References | () http://rhn.redhat.com/errata/RHSA-2015-1526.html - Third Party Advisory | |
References | () http://rhn.redhat.com/errata/RHSA-2015-1544.html - Third Party Advisory | |
References | () http://rhn.redhat.com/errata/RHSA-2015-1604.html - Third Party Advisory | |
References | () http://www.debian.org/security/2015/dsa-3316 - Mailing List, Third Party Advisory | |
References | () http://www.debian.org/security/2015/dsa-3339 - Mailing List, Third Party Advisory | |
References | () http://www.securityfocus.com/bid/75818 - Broken Link, Third Party Advisory, VDB Entry | |
References | () http://www.securitytracker.com/id/1032910 - Broken Link, Third Party Advisory, VDB Entry | |
References | () http://www.ubuntu.com/usn/USN-2696-1 - Third Party Advisory | |
References | () http://www.ubuntu.com/usn/USN-2706-1 - Third Party Advisory | |
References | () https://security.gentoo.org/glsa/201603-11 - Third Party Advisory | |
References | () https://security.gentoo.org/glsa/201603-14 - Third Party Advisory | |
CVSS |
v2 : v3 : |
v2 : 10.0
v3 : 9.8 |
CPE | cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian_eus:7.1_ppc64:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:7.3_s390x:*:*:*:*:*:*:* cpe:2.3:a:suse:linux_enterprise_debuginfo:11:sp4:*:*:*:*:*:* cpe:2.3:a:suse:linux_enterprise_debuginfo:11:sp3:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:6.7_s390x:*:*:*:*:*:*:* cpe:2.3:o:suse:linux_enterprise_desktop:11:sp4:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_eus:7.2:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems:6.0_s390x:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_eus:7.3:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:7.4_ppc64le:*:*:*:*:*:*:* cpe:2.3:o:suse:linux_enterprise_desktop:12:-:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_eus:6.7:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian_eus:6.7_ppc64:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian:7.0_ppc64le:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:* cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:7.3_ppc64le:*:*:*:*:*:*:* cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_eus:6.6:*:*:*:*:*:*:* cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:* cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:* cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_server_aus:6.6:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian_eus:7.4_ppc64:*:*:*:*:*:*:* cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian_eus:7.3_ppc64:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:* cpe:2.3:o:suse:linux_enterprise_server:12:-:*:*:*:*:*:* cpe:2.3:a:redhat:satellite:5.6:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:7.4_s390x:*:*:*:*:*:*:* cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:* cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:7.1_s390x:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian:7.0_ppc64:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:7.2_s390x:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian:6.0_ppc64:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:* cpe:2.3:a:redhat:satellite:5.7:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:7.5_s390x:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:* cpe:2.3:o:suse:linux_enterprise_desktop:11:sp3:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian_eus:7.5_ppc64:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:7.2_ppc64le:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian_eus:7.2_ppc64:*:*:*:*:*:*:* cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_server_tus:6.6:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:7.5_ppc64le:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_eus:7.1:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:7.1_ppc64le:*:*:*:*:*:*:* |
Information
Published : 2015-07-16 10:59
Updated : 2025-04-12 10:46
NVD link : CVE-2015-2590
Mitre link : CVE-2015-2590
CVE.ORG link : CVE-2015-2590
JSON object : View
Products Affected
redhat
- enterprise_linux_workstation
- enterprise_linux_desktop
- enterprise_linux_server_aus
- enterprise_linux_for_ibm_z_systems_eus
- enterprise_linux_for_power_big_endian_eus
- enterprise_linux_server_tus
- enterprise_linux_server
- enterprise_linux_for_ibm_z_systems
- enterprise_linux_eus
- enterprise_linux_for_power_big_endian
- enterprise_linux_for_power_little_endian
- satellite
- enterprise_linux_for_power_little_endian_eus
debian
- debian_linux
suse
- linux_enterprise_desktop
- linux_enterprise_debuginfo
- linux_enterprise_server
opensuse
- opensuse
oracle
- jdk
- jre
canonical
- ubuntu_linux
CWE