Vulnerability Details : CVE-2014-2398
Unspecified vulnerability in Oracle Java SE 5.0u61, 6u71, 7u51, and 8; JavaFX 2.2.51; and JRockit R27.8.1 and R28.3.1 allows remote authenticated users to affect integrity via unknown vectors related to Javadoc.
Exploit prediction scoring system (EPSS) score for CVE-2014-2398
Probability of exploitation activity in the next 30 days: 0.15%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 51 % EPSS Score History EPSS FAQ
CVSS scores for CVE-2014-2398
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Source |
---|---|---|---|---|---|
3.5
|
LOW | AV:N/AC:M/Au:S/C:N/I:P/A:N |
6.8
|
2.9
|
[email protected] |
References for CVE-2014-2398
-
http://www-01.ibm.com/support/docview.wss?uid=swg21672080
Third Party Advisory
-
http://marc.info/?l=bugtraq&m=140852886808946&w=2
Issue Tracking;Mailing List;Third Party Advisory
-
https://access.redhat.com/errata/RHSA-2014:0414
Third Party Advisory
-
http://www.oracle.com/technetwork/topics/security/cpuapr2014-1972952.html
Vendor Advisory
-
http://www.ubuntu.com/usn/USN-2187-1
Third Party Advisory
-
http://security.gentoo.org/glsa/glsa-201502-12.xml
Third Party Advisory
-
http://www.debian.org/security/2014/dsa-2912
Third Party Advisory
-
http://www.securityfocus.com/bid/66920
Third Party Advisory;VDB Entry
-
http://marc.info/?l=bugtraq&m=140852974709252&w=2
Issue Tracking;Mailing List;Third Party Advisory
-
http://rhn.redhat.com/errata/RHSA-2014-0675.html
Third Party Advisory
-
http://www.ubuntu.com/usn/USN-2191-1
Third Party Advisory
-
https://access.redhat.com/errata/RHSA-2014:0413
Third Party Advisory
-
http://www-01.ibm.com/support/docview.wss?uid=swg21676746
Broken Link
-
http://rhn.redhat.com/errata/RHSA-2014-0685.html
Third Party Advisory
-
http://security.gentoo.org/glsa/glsa-201406-32.xml
Third Party Advisory
Products affected by CVE-2014-2398
- cpe:2.3:a:ibm:forms_viewer:*:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:forms_viewer:*:*:*:*:*:*:*:*
- cpe:2.3:o:debian:debian_linux:6.0:*:*:*:*:*:*:*
- cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
- cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
- cpe:2.3:a:oracle:jrockit:r28.3.1:*:*:*:*:*:*:*
- cpe:2.3:a:oracle:jrockit:r27.8.1:*:*:*:*:*:*:*
- cpe:2.3:a:oracle:jdk:1.7.0:update51:*:*:*:*:*:*
- cpe:2.3:a:oracle:jdk:1.8.0:-:*:*:*:*:*:*
- cpe:2.3:a:oracle:jdk:1.6.0:update71:*:*:*:*:*:*
- cpe:2.3:a:oracle:jdk:1.5.0:update61:*:*:*:*:*:*
- cpe:2.3:a:oracle:jre:1.7.0:update51:*:*:*:*:*:*
- cpe:2.3:a:oracle:jre:1.8.0:-:*:*:*:*:*:*
- cpe:2.3:a:oracle:jre:1.6.0:update71:*:*:*:*:*:*
- cpe:2.3:a:oracle:jre:1.5.0:update61:*:*:*:*:*:*
- cpe:2.3:a:oracle:javafx:2.2.51:*:*:*:*:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:13.10:*:*:*:*:*:*:*