{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-18T18:03:17.926","vulnerabilities":[{"cve":{"id":"CVE-2014-2412","sourceIdentifier":"secalert_us@oracle.com","published":"2014-04-16T02:55:15.037","lastModified":"2025-04-12T10:46:40.837","vulnStatus":"Deferred","cveTags":[],"descriptions":[{"lang":"en","value":"Unspecified vulnerability in Oracle Java SE 5.0u61, 6u71, SE 7u51, and 8, and Java SE Embedded 7u51, allows remote attackers to affect confidentiality, integrity, and availability via vectors related to AWT, a different vulnerability than CVE-2014-0451."},{"lang":"es","value":"Vulnerabilidad no especificada en Oracle Java SE 5.0u61, 6u71, SE 7u51, y 8, y Java SE Embedded 7u51, permite a atacantes remotos afectar la confidencialidad, integridad y disponibilidad a través de vectores relacionados con AWT, una vulnerabilidad diferente a CVE-2014-0451."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P","baseScore":7.5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-noinfo"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*","matchCriteriaId":"01EDA41C-6B2E-49AF-B503-EB3882265C11"},{"vulnerable":true,"criteria":"cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*","matchCriteriaId":"CB66DB75-2B16-4EBF-9B93-CE49D8086E41"},{"vulnerable":true,"criteria":"cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*","matchCriteriaId":"E2076871-2E80-4605-A470-A41C1A8EC7EE"},{"vulnerable":true,"criteria":"cpe:2.3:o:canonical:ubuntu_linux:13.10:*:*:*:*:*:*:*","matchCriteriaId":"7F61F047-129C-41A6-8A27-FFCBB8563E91"},{"vulnerable":true,"criteria":"cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*","matchCriteriaId":"815D70A8-47D3-459C-A32C-9FEACA0659D1"}]}]},{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:jdk:1.5.0:update61:*:*:*:*:*:*","matchCriteriaId":"086781C9-08D6-4268-AEB4-F60365F51562"},{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:jdk:1.6.0:update71:*:*:*:*:*:*","matchCriteriaId":"DDD27C84-32AD-47CC-B47B-7FBA1321E717"},{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:jdk:1.7.0:update51:*:*:*:*:*:*","matchCriteriaId":"3343969B-2926-4C55-8787-792ABF6429D7"},{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:jdk:1.8.0:-:*:*:*:*:*:*","matchCriteriaId":"F906BFD6-7654-46C5-8240-3A50949CAE85"},{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:jre:1.5.0:update61:*:*:*:*:*:*","matchCriteriaId":"E80738D2-3CE2-4EB6-AE4C-F90C2C93BFE3"},{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:jre:1.6.0:update71:*:*:*:*:*:*","matchCriteriaId":"78BC97BC-F745-45E0-8749-41535F7C374E"},{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:jre:1.7.0:update51:*:*:*:*:*:*","matchCriteriaId":"4DA64EFB-8416-4A0B-91B5-F02CC1A79D40"},{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:jre:1.8.0:-:*:*:*:*:*:*","matchCriteriaId":"CA226495-4733-485A-9D53-85874434815D"}]}]},{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:debian:debian_linux:6.0:*:*:*:*:*:*:*","matchCriteriaId":"036E8A89-7A16-411F-9D31-676313BB7244"},{"vulnerable":true,"criteria":"cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*","matchCriteriaId":"16F59A04-14CF-49E2-9973-645477EA09DA"},{"vulnerable":true,"criteria":"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","matchCriteriaId":"C11E6FB0-C8C0-4527-9AA0-CB9B316F8F43"}]}]}],"references":[{"url":"http://marc.info/?l=bugtraq&m=140852886808946&w=2","source":"secalert_us@oracle.com","tags":["Issue Tracking","Mailing List","Third Party Advisory"]},{"url":"http://marc.info/?l=bugtraq&m=140852974709252&w=2","source":"secalert_us@oracle.com","tags":["Issue Tracking","Mailing List","Third Party Advisory"]},{"url":"http://rhn.redhat.com/errata/RHSA-2014-0675.html","source":"secalert_us@oracle.com","tags":["Third Party Advisory"]},{"url":"http://rhn.redhat.com/errata/RHSA-2014-0685.html","source":"secalert_us@oracle.com","tags":["Third Party Advisory"]},{"url":"http://secunia.com/advisories/58415","source":"secalert_us@oracle.com","tags":["Third Party Advisory"]},{"url":"http://security.gentoo.org/glsa/glsa-201406-32.xml","source":"secalert_us@oracle.com","tags":["Third Party Advisory"]},{"url":"http://security.gentoo.org/glsa/glsa-201502-12.xml","source":"secalert_us@oracle.com","tags":["Third Party Advisory"]},{"url":"http://www-01.ibm.com/support/docview.wss?uid=swg21672080","source":"secalert_us@oracle.com","tags":["Third Party Advisory"]},{"url":"http://www.debian.org/security/2014/dsa-2912","source":"secalert_us@oracle.com","tags":["Third Party Advisory"]},{"url":"http://www.oracle.com/technetwork/topics/security/cpuapr2014-1972952.html","source":"secalert_us@oracle.com","tags":["Vendor Advisory"]},{"url":"http://www.securityfocus.com/bid/66873","source":"secalert_us@oracle.com","tags":["Third Party Advisory","VDB Entry"]},{"url":"http://www.ubuntu.com/usn/USN-2187-1","source":"secalert_us@oracle.com","tags":["Third Party Advisory"]},{"url":"http://www.ubuntu.com/usn/USN-2191-1","source":"secalert_us@oracle.com","tags":["Third Party Advisory"]},{"url":"https://access.redhat.com/errata/RHSA-2014:0413","source":"secalert_us@oracle.com","tags":["Third Party Advisory"]},{"url":"https://access.redhat.com/errata/RHSA-2014:0414","source":"secalert_us@oracle.com","tags":["Third Party Advisory"]},{"url":"http://marc.info/?l=bugtraq&m=140852886808946&w=2","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Issue Tracking","Mailing List","Third Party Advisory"]},{"url":"http://marc.info/?l=bugtraq&m=140852974709252&w=2","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Issue Tracking","Mailing List","Third Party Advisory"]},{"url":"http://rhn.redhat.com/errata/RHSA-2014-0675.html","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory"]},{"url":"http://rhn.redhat.com/errata/RHSA-2014-0685.html","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory"]},{"url":"http://secunia.com/advisories/58415","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory"]},{"url":"http://security.gentoo.org/glsa/glsa-201406-32.xml","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory"]},{"url":"http://security.gentoo.org/glsa/glsa-201502-12.xml","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory"]},{"url":"http://www-01.ibm.com/support/docview.wss?uid=swg21672080","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory"]},{"url":"http://www.debian.org/security/2014/dsa-2912","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory"]},{"url":"http://www.oracle.com/technetwork/topics/security/cpuapr2014-1972952.html","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]},{"url":"http://www.securityfocus.com/bid/66873","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory","VDB Entry"]},{"url":"http://www.ubuntu.com/usn/USN-2187-1","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory"]},{"url":"http://www.ubuntu.com/usn/USN-2191-1","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory"]},{"url":"https://access.redhat.com/errata/RHSA-2014:0413","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory"]},{"url":"https://access.redhat.com/errata/RHSA-2014:0414","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory"]}]}}]}