{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-03T01:08:06.437","vulnerabilities":[{"cve":{"id":"CVE-2014-3065","sourceIdentifier":"psirt@us.ibm.com","published":"2014-12-02T01:59:01.467","lastModified":"2025-04-12T10:46:40.837","vulnStatus":"Deferred","cveTags":[],"descriptions":[{"lang":"en","value":"Unspecified vulnerability in IBM Java Runtime Environment (JRE) 7 R1 before SR2 (7.1.2.0), 7 before SR8 (7.0.8.0), 6 R1 before SR8 FP2 (6.1.8.2), 6 before SR16 FP2 (6.0.16.2), and before SR16 FP8 (5.0.16.8) allows local users to execute arbitrary code via vectors related to the shared classes cache."},{"lang":"es","value":"Vulnerabilidad no especificada en IBM Java Runtime Environment (JRE) 7 R1 anterior a SR2 (7.1.2.0), 7 anterior a SR8 (7.0.8.0), 6 R1 anterior a SR8 FP2 (6.1.8.2), 6 anterior a SR16 FP2 (6.0.16.2), y anterior a SR16 FP8 (5.0.16.8) permite a usuarios locales ejecutar código arbitrario a través de vectores relacionados con el caché de clases compartidas."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:M/Au:N/C:C/I:C/A:C","baseScore":6.9,"accessVector":"LOCAL","accessComplexity":"MEDIUM","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"MEDIUM","exploitabilityScore":3.4,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-94"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:ibm:java:5.0.0.0:*:*:*:*:*:*:*","matchCriteriaId":"03D3F84F-3F6E-4DF1-B162-152293D951EA"},{"vulnerable":true,"criteria":"cpe:2.3:a:ibm:java:5.0.11.0:*:*:*:*:*:*:*","matchCriteriaId":"A18121C3-F3F1-4EC7-A64E-3F6A0C9788C8"},{"vulnerable":true,"criteria":"cpe:2.3:a:ibm:java:5.0.11.1:*:*:*:*:*:*:*","matchCriteriaId":"BAD59912-7325-4AE1-ACCF-D4F804AF3947"},{"vulnerable":true,"criteria":"cpe:2.3:a:ibm:java:5.0.11.2:*:*:*:*:*:*:*","matchCriteriaId":"62783157-E3B6-4A23-8D2F-1FBD0762E9A0"},{"vulnerable":true,"criteria":"cpe:2.3:a:ibm:java:5.0.12.0:*:*:*:*:*:*:*","matchCriteriaId":"14CC0D53-8AB8-4D44-82BB-0E6A974C36AB"},{"vulnerable":true,"criteria":"cpe:2.3:a:ibm:java:5.0.12.1:*:*:*:*:*:*:*","matchCriteriaId":"91A3129F-17A6-4F32-BD5D-34E4A1D1A840"},{"vulnerable":true,"criteria":"cpe:2.3:a:ibm:java:5.0.12.2:*:*:*:*:*:*:*","matchCriteriaId":"E2845FF4-2620-4B8D-96CF-CC26B3DEA3C4"},{"vulnerable":true,"criteria":"cpe:2.3:a:ibm:java:5.0.12.3:*:*:*:*:*:*:*","matchCriteriaId":"CC7CD279-54B6-4F6B-AE14-299FB319C690"},{"vulnerable":true,"criteria":"cpe:2.3:a:ibm:java:5.0.12.4:*:*:*:*:*:*:*","matchCriteriaId":"0EA269CA-4676-4008-89EF-20FAB89886A1"},{"vulnerable":true,"criteria":"cpe:2.3:a:ibm:java:5.0.12.5:*:*:*:*:*:*:*","matchCriteriaId":"D22105B6-1378-4E1C-B28A-FCAE00A2D5CF"},{"vulnerable":true,"criteria":"cpe:2.3:a:ibm:java:5.0.13.0:*:*:*:*:*:*:*","matchCriteriaId":"601762D3-1188-4945-931D-EB8DAC2847A1"},{"vulnerable":true,"criteria":"cpe:2.3:a:ibm:java:5.0.14.0:*:*:*:*:*:*:*","matchCriteriaId":"FA4A30A6-498C-46B8-8EFC-45EB13354EAF"},{"vulnerable":true,"criteria":"cpe:2.3:a:ibm:java:5.0.15.0:*:*:*:*:*:*:*","matchCriteriaId":"414CC00A-C797-4C34-8709-75DC061DCDE1"},{"vulnerable":true,"criteria":"cpe:2.3:a:ibm:java:5.0.16.0:*:*:*:*:*:*:*","matchCriteriaId":"4401B967-0550-44F1-8753-9632120D2A44"},{"vulnerable":true,"criteria":"cpe:2.3:a:ibm:java:5.0.16.1:*:*:*:*:*:*:*","matchCriteriaId":"4961693D-F56C-46CD-B721-6A15E2837C17"},{"vulnerable":true,"criteria":"cpe:2.3:a:ibm:java:5.0.16.2:*:*:*:*:*:*:*","matchCriteriaId":"AA4FBB66-CF6A-42D2-B122-1861F4139E75"},{"vulnerable":true,"criteria":"cpe:2.3:a:ibm:java:5.0.16.3:*:*:*:*:*:*:*","matchCriteriaId":"0E4B1DD6-3056-4FA8-8203-CCD8036FBD4C"},{"vulnerable":true,"criteria":"cpe:2.3:a:ibm:java:6.0.0.0:*:*:*:*:*:*:*","matchCriteriaId":"14AD4A87-382A-41F0-96D8-0F0A9B738773"},{"vulnerable":true,"criteria":"cpe:2.3:a:ibm:java:6.0.1.0:*:*:*:*:*:*:*","matchCriteriaId":"33701DDF-6882-41D3-A11B-A1F4585A77A7"},{"vulnerable":true,"criteria":"cpe:2.3:a:ibm:java:6.0.2.0:*:*:*:*:*:*:*","matchCriteriaId":"25C58BBA-06AC-40CD-A906-FD1B3B0AAB69"},{"vulnerable":true,"criteria":"cpe:2.3:a:ibm:java:6.0.3.0:*:*:*:*:*:*:*","matchCriteriaId":"76C5B430-EE11-4674-B4B0-895D66E3B32F"},{"vulnerable":true,"criteria":"cpe:2.3:a:ibm:java:6.0.4.0:*:*:*:*:*:*:*","matchCriteriaId":"B1837D84-6B4F-40D8-9A3F-71C328F659BA"},{"vulnerable":true,"criteria":"cpe:2.3:a:ibm:java:6.0.5.0:*:*:*:*:*:*:*","matchCriteriaId":"D20A369B-2168-4883-A84C-BB48A71AFB33"},{"vulnerable":true,"criteria":"cpe:2.3:a:ibm:java:6.0.6.0:*:*:*:*:*:*:*","matchCriteriaId":"3628AAB4-E524-46E5-AAF4-1980256F13CE"},{"vulnerable":true,"criteria":"cpe:2.3:a:ibm:java:6.0.7.0:*:*:*:*:*:*:*","matchCriteriaId":"30DC9FE3-CDE9-4F83-989B-4E431BA18B56"},{"vulnerable":true,"criteria":"cpe:2.3:a:ibm:java:6.0.8.0:*:*:*:*:*:*:*","matchCriteriaId":"C17B1C6B-04CE-49FB-B9BD-98ECD626B26F"},{"vulnerable":true,"criteria":"cpe:2.3:a:ibm:java:6.0.8.1:*:*:*:*:*:*:*","matchCriteriaId":"81F529EB-2BCA-4E3E-93E4-2A9880CDA367"},{"vulnerable":true,"criteria":"cpe:2.3:a:ibm:java:6.0.9.0:*:*:*:*:*:*:*","matchCriteriaId":"8DEAC3D6-F9F8-4F82-9BF1-FF0EC07A3274"},{"vulnerable":true,"criteria":"cpe:2.3:a:ibm:java:6.0.9.1:*:*:*:*:*:*:*","matchCriteriaId":"7694638C-CDAC-44DF-B9F9-F7237CD98017"},{"vulnerable":true,"criteria":"cpe:2.3:a:ibm:java:6.0.9.2:*:*:*:*:*:*:*","matchCriteriaId":"23903A3C-1760-4836-BAE6-BDD32CBB4CBD"},{"vulnerable":true,"criteria":"cpe:2.3:a:ibm:java:6.0.10.0:*:*:*:*:*:*:*","matchCriteriaId":"2477E033-D26B-4D71-839B-5FE4B0927559"},{"vulnerable":true,"criteria":"cpe:2.3:a:ibm:java:6.0.10.1:*:*:*:*:*:*:*","matchCriteriaId":"B1CAB7BF-265E-411D-A584-E78DE171F065"},{"vulnerable":true,"criteria":"cpe:2.3:a:ibm:java:6.0.11.0:*:*:*:*:*:*:*","matchCriteriaId":"4E45F670-232F-4CE5-8926-6463E5619506"},{"vulnerable":true,"criteria":"cpe:2.3:a:ibm:java:6.0.12.0:*:*:*:*:*:*:*","matchCriteriaId":"5B70E6E3-15B3-4D48-AE49-B9184A58EECE"},{"vulnerable":true,"criteria":"cpe:2.3:a:ibm:java:6.0.13.0:*:*:*:*:*:*:*","matchCriteriaId":"D5BCE3FD-B89B-4141-8103-9DB941AD60D0"},{"vulnerable":true,"criteria":"cpe:2.3:a:ibm:java:6.0.13.1:*:*:*:*:*:*:*","matchCriteriaId":"8EADFB3B-738F-4919-B165-9ECEED46EA6C"},{"vulnerable":true,"criteria":"cpe:2.3:a:ibm:java:6.0.13.2:*:*:*:*:*:*:*","matchCriteriaId":"B23A5431-E599-4848-AB83-B299898F5EF0"},{"vulnerable":true,"criteria":"cpe:2.3:a:ibm:java:6.0.14.0:*:*:*:*:*:*:*","matchCriteriaId":"5FAE5E9B-3CF5-40E5-A551-1AFD6BD07A2C"},{"vulnerable":true,"criteria":"cpe:2.3:a:ibm:java:7.0.0.0:*:*:*:*:*:*:*","matchCriteriaId":"9A8BF650-B8F5-467E-8DBF-81788B55F345"},{"vulnerable":true,"criteria":"cpe:2.3:a:ibm:java:7.0.1.0:*:*:*:*:*:*:*","matchCriteriaId":"1752A831-916F-4A7D-8AAE-1CEFACC51F91"},{"vulnerable":true,"criteria":"cpe:2.3:a:ibm:java:7.0.2.0:*:*:*:*:*:*:*","matchCriteriaId":"0C9744C4-76BE-428B-AFF2-5BCE00A58322"},{"vulnerable":true,"criteria":"cpe:2.3:a:ibm:java:7.0.3.0:*:*:*:*:*:*:*","matchCriteriaId":"48B1DE45-90F9-416B-9087-8AEF5B0A3C46"},{"vulnerable":true,"criteria":"cpe:2.3:a:ibm:java:7.0.4.0:*:*:*:*:*:*:*","matchCriteriaId":"9EF6A045-0DF6-463B-A0DB-6C31D8C2984C"},{"vulnerable":true,"criteria":"cpe:2.3:a:ibm:java:7.0.4.1:*:*:*:*:*:*:*","matchCriteriaId":"A731493C-9B46-4105-9902-B15BA0E0FB11"},{"vulnerable":true,"criteria":"cpe:2.3:a:ibm:java:7.0.4.2:*:*:*:*:*:*:*","matchCriteriaId":"49454369-A494-4EAA-88D5-181570DEBB4A"},{"vulnerable":true,"criteria":"cpe:2.3:a:ibm:java:7.0.5.0:*:*:*:*:*:*:*","matchCriteriaId":"C76B9DFD-7259-423A-8CFC-A898E74897AE"}]}]}],"references":[{"url":"http://lists.opensuse.org/opensuse-security-announce/2014-11/msg00021.html","source":"psirt@us.ibm.com"},{"url":"http://lists.opensuse.org/opensuse-security-announce/2014-12/msg00002.html","source":"psirt@us.ibm.com"},{"url":"http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00026.html","source":"psirt@us.ibm.com"},{"url":"http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00027.html","source":"psirt@us.ibm.com"},{"url":"http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00033.html","source":"psirt@us.ibm.com"},{"url":"http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00036.html","source":"psirt@us.ibm.com"},{"url":"http://rhn.redhat.com/errata/RHSA-2014-1876.html","source":"psirt@us.ibm.com"},{"url":"http://rhn.redhat.com/errata/RHSA-2014-1877.html","source":"psirt@us.ibm.com"},{"url":"http://rhn.redhat.com/errata/RHSA-2014-1880.html","source":"psirt@us.ibm.com"},{"url":"http://rhn.redhat.com/errata/RHSA-2014-1881.html","source":"psirt@us.ibm.com"},{"url":"http://rhn.redhat.com/errata/RHSA-2014-1882.html","source":"psirt@us.ibm.com"},{"url":"http://rhn.redhat.com/errata/RHSA-2015-0264.html","source":"psirt@us.ibm.com"},{"url":"http://www-01.ibm.com/support/docview.wss?uid=swg1IV66044","source":"psirt@us.ibm.com","tags":["Vendor Advisory"]},{"url":"http://www-01.ibm.com/support/docview.wss?uid=swg1IV66045","source":"psirt@us.ibm.com","tags":["Vendor Advisory"]},{"url":"http://www-01.ibm.com/support/docview.wss?uid=swg21688283","source":"psirt@us.ibm.com","tags":["Vendor Advisory"]},{"url":"http://www.securityfocus.com/bid/71147","source":"psirt@us.ibm.com"},{"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1162554","source":"psirt@us.ibm.com"},{"url":"http://lists.opensuse.org/opensuse-security-announce/2014-11/msg00021.html","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://lists.opensuse.org/opensuse-security-announce/2014-12/msg00002.html","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00026.html","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00027.html","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00033.html","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00036.html","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://rhn.redhat.com/errata/RHSA-2014-1876.html","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://rhn.redhat.com/errata/RHSA-2014-1877.html","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://rhn.redhat.com/errata/RHSA-2014-1880.html","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://rhn.redhat.com/errata/RHSA-2014-1881.html","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://rhn.redhat.com/errata/RHSA-2014-1882.html","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://rhn.redhat.com/errata/RHSA-2015-0264.html","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www-01.ibm.com/support/docview.wss?uid=swg1IV66044","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]},{"url":"http://www-01.ibm.com/support/docview.wss?uid=swg1IV66045","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]},{"url":"http://www-01.ibm.com/support/docview.wss?uid=swg21688283","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]},{"url":"http://www.securityfocus.com/bid/71147","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1162554","source":"af854a3a-2127-422b-91ae-364da2661108"}]}}]}