{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-25T15:19:19.530","vulnerabilities":[{"cve":{"id":"CVE-2014-0418","sourceIdentifier":"secalert_us@oracle.com","published":"2014-01-15T16:08:10.157","lastModified":"2025-04-11T00:51:21.963","vulnStatus":"Deferred","cveTags":[],"descriptions":[{"lang":"en","value":"Unspecified vulnerability in Oracle Java SE 6u65 and 7u45 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Deployment, a different vulnerability than CVE-2013-5889, CVE-2013-5902, CVE-2014-0410, CVE-2014-0415, and CVE-2014-0424."},{"lang":"es","value":"Vulnerabilidad no especificada en Oracle Java SE 6u65 y 7u45 que permite a atacantes remotos afectar la confidencialidad, integridad y disponibilidad a través de vectores desconocidos relacionados con el despliegue, una vulnerabilidad diferente a CVE-2013-5889, CVE-2013-5902, CVE-2014-0410, CVE-2014-0415, y CVE-2014-0424."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:H/Au:N/C:P/I:P/A:P","baseScore":5.1,"accessVector":"NETWORK","accessComplexity":"HIGH","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":4.9,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-noinfo"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:redhat:enterprise_linux_desktop_supplementary:5.0:*:*:*:*:*:*:*","matchCriteriaId":"CC2EDDE6-49F2-41D3-BCB2-F49886A2A170"},{"vulnerable":true,"criteria":"cpe:2.3:o:redhat:enterprise_linux_desktop_supplementary:6.0:*:*:*:*:*:*:*","matchCriteriaId":"B8C6E104-EDBC-481E-85B8-D39ED2058D39"},{"vulnerable":true,"criteria":"cpe:2.3:o:redhat:enterprise_linux_hpc_node_supplementary:6.0:*:*:*:*:*:*:*","matchCriteriaId":"585614D3-1DAA-4256-83DE-AFE901154808"},{"vulnerable":true,"criteria":"cpe:2.3:o:redhat:enterprise_linux_server_supplementary:5.0:*:*:*:*:*:*:*","matchCriteriaId":"FB3FB071-FCCC-4425-AFBF-77287C1B8F7B"},{"vulnerable":true,"criteria":"cpe:2.3:o:redhat:enterprise_linux_server_supplementary:6.0:*:*:*:*:*:*:*","matchCriteriaId":"4B74C62D-4A6D-4A4F-ADF6-A508322CD447"},{"vulnerable":true,"criteria":"cpe:2.3:o:redhat:enterprise_linux_server_supplementary_aus:6.5:*:*:*:*:*:*:*","matchCriteriaId":"E7B7DCBB-9F6A-4581-B228-ABD724B3DE3B"},{"vulnerable":true,"criteria":"cpe:2.3:o:redhat:enterprise_linux_server_supplementary_eus:6.5.z:*:*:*:*:*:*:*","matchCriteriaId":"4ACFB991-B187-45B7-A12E-76C308AD00F8"},{"vulnerable":true,"criteria":"cpe:2.3:o:redhat:enterprise_linux_workstation_supplementary:6.0:*:*:*:*:*:*:*","matchCriteriaId":"6E89B38A-3697-46DD-BB3F-E8D2373588BE"}]}]},{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:jdk:1.6.0:update65:*:*:*:*:*:*","matchCriteriaId":"105B15BC-6764-41C3-847D-BA1396CC034F"},{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:jre:1.6.0:update65:*:*:*:*:*:*","matchCriteriaId":"BBCFEADF-7282-4C56-813B-A5DEAD9BF17B"}]}]},{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:jre:1.7.0:update45:*:*:*:*:*:*","matchCriteriaId":"A5226952-1972-4572-9F8C-C90D89040FD3"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:hp:jdk:*:*:*:*:*:*:*:*","versionEndIncluding":"7.0.08","matchCriteriaId":"4B371EE1-8C00-4D83-859C-36693CB563E2"},{"vulnerable":true,"criteria":"cpe:2.3:a:hp:jre:*:*:*:*:*:*:*:*","versionEndIncluding":"7.0.08","matchCriteriaId":"69A83E31-2339-4631-9106-DF9BF5D109E6"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:o:hp:hp-ux:b.11.23:*:*:*:*:*:*:*","matchCriteriaId":"12C73959-3E02-4847-8962-651D652800EE"},{"vulnerable":false,"criteria":"cpe:2.3:o:hp:hp-ux:b.11.31:*:*:*:*:*:*:*","matchCriteriaId":"B64BBA96-FB3C-46AC-9A29-50EE02714FE9"}]}]}],"references":[{"url":"http://marc.info/?l=bugtraq&m=139402697611681&w=2","source":"secalert_us@oracle.com","tags":["Third Party Advisory"]},{"url":"http://marc.info/?l=bugtraq&m=139402749111889&w=2","source":"secalert_us@oracle.com","tags":["Third Party Advisory"]},{"url":"http://osvdb.org/102012","source":"secalert_us@oracle.com","tags":["Broken Link"]},{"url":"http://rhn.redhat.com/errata/RHSA-2014-0030.html","source":"secalert_us@oracle.com","tags":["Third Party Advisory"]},{"url":"http://secunia.com/advisories/56485","source":"secalert_us@oracle.com","tags":["Permissions Required"]},{"url":"http://secunia.com/advisories/56535","source":"secalert_us@oracle.com","tags":["Permissions Required"]},{"url":"http://www.oracle.com/technetwork/topics/security/cpujan2014-1972949.html","source":"secalert_us@oracle.com","tags":["Vendor Advisory"]},{"url":"http://www.securityfocus.com/bid/64758","source":"secalert_us@oracle.com","tags":["Third Party Advisory","VDB Entry"]},{"url":"http://www.securityfocus.com/bid/64917","source":"secalert_us@oracle.com","tags":["Third Party Advisory","VDB Entry"]},{"url":"http://www.securitytracker.com/id/1029608","source":"secalert_us@oracle.com","tags":["Third Party Advisory","VDB Entry"]},{"url":"https://access.redhat.com/errata/RHSA-2014:0414","source":"secalert_us@oracle.com"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/90344","source":"secalert_us@oracle.com"},{"url":"https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04166777","source":"secalert_us@oracle.com","tags":["Third Party Advisory"]},{"url":"http://marc.info/?l=bugtraq&m=139402697611681&w=2","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory"]},{"url":"http://marc.info/?l=bugtraq&m=139402749111889&w=2","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory"]},{"url":"http://osvdb.org/102012","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Broken Link"]},{"url":"http://rhn.redhat.com/errata/RHSA-2014-0030.html","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory"]},{"url":"http://secunia.com/advisories/56485","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Permissions Required"]},{"url":"http://secunia.com/advisories/56535","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Permissions Required"]},{"url":"http://www.oracle.com/technetwork/topics/security/cpujan2014-1972949.html","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]},{"url":"http://www.securityfocus.com/bid/64758","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory","VDB Entry"]},{"url":"http://www.securityfocus.com/bid/64917","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory","VDB Entry"]},{"url":"http://www.securitytracker.com/id/1029608","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory","VDB Entry"]},{"url":"https://access.redhat.com/errata/RHSA-2014:0414","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/90344","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04166777","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory"]}]}}]}