{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-30T13:07:06.128","vulnerabilities":[{"cve":{"id":"CVE-2014-6506","sourceIdentifier":"secalert_us@oracle.com","published":"2014-10-15T22:55:06.513","lastModified":"2025-04-12T10:46:40.837","vulnStatus":"Deferred","cveTags":[],"descriptions":[{"lang":"en","value":"Unspecified vulnerability in Oracle Java SE 5.0u71, 6u81, 7u67, and 8u20, and Java SE Embedded 7u60, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Libraries."},{"lang":"es","value":"Vulnerabilidad sin especificar en Oracle Java SE 5.0u71, 6u81, 7u67, and 8u20, y Java SE Embedded 7u60, permite a atacantes remotos afectar la confidencialidad, la integridad y la disponibilidad a través de vectores relacionados con las librerías."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:M/Au:N/C:P/I:P/A:P","baseScore":6.8,"accessVector":"NETWORK","accessComplexity":"MEDIUM","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":8.6,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-noinfo"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:jdk:1.5.0:update_71:*:*:*:*:*:*","matchCriteriaId":"ABFFC778-4647-464C-8D4B-C5FFF9A8B881"},{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:jdk:1.6.0:update81:*:*:*:*:*:*","matchCriteriaId":"A96B7B6D-890C-4CAF-A273-01E17D3FDBBA"},{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:jdk:1.7.0:update60:*:*:*:*:*:*","matchCriteriaId":"B3D836B0-936A-445F-A08F-C962FC8B91EF"},{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:jre:1.5.0:update_71:*:*:*:*:*:*","matchCriteriaId":"2537DFD3-4ACE-4448-964A-18CE2B8C71BC"},{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:jre:1.6.0:update_81:*:*:*:*:*:*","matchCriteriaId":"6D7DEDD2-FEF2-4FEC-B9BF-C1C3FA247A02"},{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:jre:1.7.0:update_67:*:*:*:*:*:*","matchCriteriaId":"CE789D26-302F-44CF-AF63-EA0BA73E49E9"},{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:jre:1.7.0:update60:*:*:*:*:*:*","matchCriteriaId":"A85E8DD9-9B00-4C7E-802D-6E6A1BD3B9C0"},{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:jre:1.8.0:update_20:*:*:*:*:*:*","matchCriteriaId":"D776872E-A50A-498D-A68B-84DD910ED429"}]}]}],"references":[{"url":"http://linux.oracle.com/errata/ELSA-2014-1633.html","source":"secalert_us@oracle.com"},{"url":"http://linux.oracle.com/errata/ELSA-2014-1634.html","source":"secalert_us@oracle.com"},{"url":"http://linux.oracle.com/errata/ELSA-2014-1636","source":"secalert_us@oracle.com"},{"url":"http://lists.opensuse.org/opensuse-security-announce/2014-11/msg00013.html","source":"secalert_us@oracle.com"},{"url":"http://lists.opensuse.org/opensuse-security-announce/2014-11/msg00021.html","source":"secalert_us@oracle.com"},{"url":"http://lists.opensuse.org/opensuse-security-announce/2014-12/msg00002.html","source":"secalert_us@oracle.com"},{"url":"http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00026.html","source":"secalert_us@oracle.com"},{"url":"http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00027.html","source":"secalert_us@oracle.com"},{"url":"http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00033.html","source":"secalert_us@oracle.com"},{"url":"http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00036.html","source":"secalert_us@oracle.com"},{"url":"http://marc.info/?l=bugtraq&m=141775382904016&w=2","source":"secalert_us@oracle.com"},{"url":"http://rhn.redhat.com/errata/RHSA-2014-1620.html","source":"secalert_us@oracle.com"},{"url":"http://rhn.redhat.com/errata/RHSA-2014-1633.html","source":"secalert_us@oracle.com"},{"url":"http://rhn.redhat.com/errata/RHSA-2014-1634.html","source":"secalert_us@oracle.com"},{"url":"http://rhn.redhat.com/errata/RHSA-2014-1636.html","source":"secalert_us@oracle.com"},{"url":"http://rhn.redhat.com/errata/RHSA-2014-1657.html","source":"secalert_us@oracle.com"},{"url":"http://rhn.redhat.com/errata/RHSA-2014-1658.html","source":"secalert_us@oracle.com"},{"url":"http://rhn.redhat.com/errata/RHSA-2014-1876.html","source":"secalert_us@oracle.com"},{"url":"http://rhn.redhat.com/errata/RHSA-2014-1877.html","source":"secalert_us@oracle.com"},{"url":"http://rhn.redhat.com/errata/RHSA-2014-1880.html","source":"secalert_us@oracle.com"},{"url":"http://rhn.redhat.com/errata/RHSA-2014-1881.html","source":"secalert_us@oracle.com"},{"url":"http://rhn.redhat.com/errata/RHSA-2014-1882.html","source":"secalert_us@oracle.com"},{"url":"http://rhn.redhat.com/errata/RHSA-2015-0264.html","source":"secalert_us@oracle.com"},{"url":"http://secunia.com/advisories/60414","source":"secalert_us@oracle.com"},{"url":"http://secunia.com/advisories/60416","source":"secalert_us@oracle.com"},{"url":"http://secunia.com/advisories/60417","source":"secalert_us@oracle.com"},{"url":"http://secunia.com/advisories/61018","source":"secalert_us@oracle.com"},{"url":"http://secunia.com/advisories/61020","source":"secalert_us@oracle.com"},{"url":"http://secunia.com/advisories/61143","source":"secalert_us@oracle.com"},{"url":"http://secunia.com/advisories/61163","source":"secalert_us@oracle.com"},{"url":"http://secunia.com/advisories/61164","source":"secalert_us@oracle.com"},{"url":"http://secunia.com/advisories/61346","source":"secalert_us@oracle.com"},{"url":"http://secunia.com/advisories/61609","source":"secalert_us@oracle.com"},{"url":"http://secunia.com/advisories/61629","source":"secalert_us@oracle.com"},{"url":"http://secunia.com/advisories/61928","source":"secalert_us@oracle.com"},{"url":"http://security.gentoo.org/glsa/glsa-201502-12.xml","source":"secalert_us@oracle.com"},{"url":"http://www-01.ibm.com/support/docview.wss?uid=swg21688283","source":"secalert_us@oracle.com"},{"url":"http://www.debian.org/security/2014/dsa-3077","source":"secalert_us@oracle.com"},{"url":"http://www.debian.org/security/2014/dsa-3080","source":"secalert_us@oracle.com"},{"url":"http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html","source":"secalert_us@oracle.com","tags":["Patch","Vendor Advisory"]},{"url":"http://www.securityfocus.com/bid/70556","source":"secalert_us@oracle.com"},{"url":"http://www.ubuntu.com/usn/USN-2386-1","source":"secalert_us@oracle.com"},{"url":"http://www.ubuntu.com/usn/USN-2388-1","source":"secalert_us@oracle.com"},{"url":"http://www.ubuntu.com/usn/USN-2388-2","source":"secalert_us@oracle.com"},{"url":"http://linux.oracle.com/errata/ELSA-2014-1633.html","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://linux.oracle.com/errata/ELSA-2014-1634.html","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://linux.oracle.com/errata/ELSA-2014-1636","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://lists.opensuse.org/opensuse-security-announce/2014-11/msg00013.html","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://lists.opensuse.org/opensuse-security-announce/2014-11/msg00021.html","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://lists.opensuse.org/opensuse-security-announce/2014-12/msg00002.html","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00026.html","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00027.html","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00033.html","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00036.html","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://marc.info/?l=bugtraq&m=141775382904016&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://rhn.redhat.com/errata/RHSA-2014-1620.html","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://rhn.redhat.com/errata/RHSA-2014-1633.html","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://rhn.redhat.com/errata/RHSA-2014-1634.html","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://rhn.redhat.com/errata/RHSA-2014-1636.html","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://rhn.redhat.com/errata/RHSA-2014-1657.html","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://rhn.redhat.com/errata/RHSA-2014-1658.html","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://rhn.redhat.com/errata/RHSA-2014-1876.html","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://rhn.redhat.com/errata/RHSA-2014-1877.html","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://rhn.redhat.com/errata/RHSA-2014-1880.html","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://rhn.redhat.com/errata/RHSA-2014-1881.html","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://rhn.redhat.com/errata/RHSA-2014-1882.html","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://rhn.redhat.com/errata/RHSA-2015-0264.html","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://secunia.com/advisories/60414","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://secunia.com/advisories/60416","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://secunia.com/advisories/60417","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://secunia.com/advisories/61018","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://secunia.com/advisories/61020","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://secunia.com/advisories/61143","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://secunia.com/advisories/61163","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://secunia.com/advisories/61164","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://secunia.com/advisories/61346","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://secunia.com/advisories/61609","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://secunia.com/advisories/61629","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://secunia.com/advisories/61928","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://security.gentoo.org/glsa/glsa-201502-12.xml","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www-01.ibm.com/support/docview.wss?uid=swg21688283","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.debian.org/security/2014/dsa-3077","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.debian.org/security/2014/dsa-3080","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"]},{"url":"http://www.securityfocus.com/bid/70556","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.ubuntu.com/usn/USN-2386-1","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.ubuntu.com/usn/USN-2388-1","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.ubuntu.com/usn/USN-2388-2","source":"af854a3a-2127-422b-91ae-364da2661108"}]}}]}