Show plain JSON{"id": "CVE-2014-8891", "cveTags": [], "metrics": {"cvssMetricV2": [{"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"version": "2.0", "baseScore": 10.0, "accessVector": "NETWORK", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "authentication": "NONE", "integrityImpact": "COMPLETE", "accessComplexity": "LOW", "availabilityImpact": "COMPLETE", "confidentialityImpact": "COMPLETE"}, "acInsufInfo": true, "impactScore": 10.0, "baseSeverity": "HIGH", "obtainAllPrivilege": false, "exploitabilityScore": 10.0, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false}]}, "published": "2015-03-06T23:59:00.077", "references": [{"url": "http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00021.html", "tags": ["Mailing List", "Third Party Advisory"], "source": "psirt@us.ibm.com"}, {"url": "http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00022.html", "tags": ["Mailing List", "Third Party Advisory"], "source": "psirt@us.ibm.com"}, {"url": "http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00025.html", "tags": ["Mailing List", "Third Party Advisory"], "source": "psirt@us.ibm.com"}, {"url": "http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00026.html", "tags": ["Mailing List", "Third Party Advisory"], "source": "psirt@us.ibm.com"}, {"url": "http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00027.html", "tags": ["Mailing List", "Third Party Advisory"], "source": "psirt@us.ibm.com"}, {"url": "http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00033.html", "tags": ["Mailing List", "Third Party Advisory"], "source": "psirt@us.ibm.com"}, {"url": "http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00036.html", "tags": ["Mailing List", "Third Party Advisory"], "source": "psirt@us.ibm.com"}, {"url": "http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00013.html", "tags": ["Mailing List", "Third Party Advisory"], "source": "psirt@us.ibm.com"}, {"url": "http://rhn.redhat.com/errata/RHSA-2015-0136.html", "tags": ["Third Party Advisory"], "source": "psirt@us.ibm.com"}, {"url": "http://rhn.redhat.com/errata/RHSA-2015-0264.html", "tags": ["Third Party Advisory"], "source": "psirt@us.ibm.com"}, {"url": "http://www.ibm.com/developerworks/java/jdk/alerts/#IBM_Security_Update_February_2015", "tags": ["Vendor Advisory"], "source": "psirt@us.ibm.com"}, {"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1189142", "tags": ["Issue Tracking", "Third Party Advisory"], "source": "psirt@us.ibm.com"}, {"url": "https://www-304.ibm.com/support/docview.wss?uid=swg21695474", "tags": ["Vendor Advisory"], "source": "psirt@us.ibm.com"}], "vulnStatus": "Analyzed", "weaknesses": [{"type": "Primary", "source": "nvd@nist.gov", "description": [{"lang": "en", "value": "NVD-CWE-noinfo"}]}], "descriptions": [{"lang": "en", "value": "Unspecified vulnerability in the Java Virtual Machine (JVM) in IBM SDK, Java Technology Edition 5.0 before SR16-FP9, 6 before SR16-FP3, 6R1 before SR8-FP3, 7 before SR8-FP10, and 7R1 before SR2-FP10 allows remote attackers to escape the Java sandbox and execute arbitrary code via unspecified vectors related to the security manager."}, {"lang": "es", "value": "Vulnerabilidad no especificada en Java Virtual Machine (JVM) en IBM SDK, Java Technology Edition 5.0 anterior a SR16-FP9, 6 anterior a SR16-FP3, 6R1 anterior a SR8-FP3, 7 anterior a SR8-FP10, y 7R1 anterior a SR2-FP10 permite a atacantes remotos escapar del sandbox de Java y ejecutar c\u00f3digo arbitrario a trav\u00e9s de vectores no especificados relacionados con el gestor de seguridad."}], "lastModified": "2019-07-16T12:23:10.690", "configurations": [{"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:a:ibm:java_sdk:*:*:*:*:technology:*:*:*", "vulnerable": true, "matchCriteriaId": "CBDFEC5A-BDA0-4F29-AB77-C2F2C642ACEE", "versionEndIncluding": "5.0.16.8", "versionStartIncluding": "5.0.0.0"}, {"criteria": "cpe:2.3:a:ibm:java_sdk:*:*:*:*:technology:*:*:*", "vulnerable": true, "matchCriteriaId": "55912299-38CB-448D-B7FB-8FBF303CC4B1", "versionEndExcluding": "6.0.16.3", "versionStartIncluding": "6.0.0.0"}, {"criteria": "cpe:2.3:a:ibm:java_sdk:*:*:*:*:technology:*:*:*", "vulnerable": true, "matchCriteriaId": "1EF2693C-B165-4733-BD05-8F68BE11310D", "versionEndIncluding": "6.1.8.2", "versionStartIncluding": "6.1.0.0"}, {"criteria": "cpe:2.3:a:ibm:java_sdk:*:*:*:*:technology:*:*:*", "vulnerable": true, "matchCriteriaId": "EB0D97C8-511C-460A-ABC1-E098668975B7", "versionEndExcluding": "7.0.8.10", "versionStartIncluding": "7.0.0.0"}, {"criteria": "cpe:2.3:a:ibm:java_sdk:*:*:*:*:technology:*:*:*", "vulnerable": true, "matchCriteriaId": "4821D89B-B23B-4A49-BCC8-BE3A82DDC43B", "versionEndExcluding": "7.1.2.10", "versionStartIncluding": "7.1.0.0"}], "operator": "OR"}]}], "sourceIdentifier": "psirt@us.ibm.com"}