CVE-2015-4893 : Detail

CVE-2015-4893

3.42%V3
Network
2015-10-21
21h00 +00:00
2016-12-22
17h57 +00:00
Notifications for a CVE
Stay informed of any changes for a specific CVE.
Notifications manage

CVE Descriptions

Unspecified vulnerability in Oracle Java SE 6u101, 7u85, and 8u60; Java SE Embedded 8u51; and JRockit R28.3.7 allows remote attackers to affect availability via vectors related to JAXP, a different vulnerability than CVE-2015-4803 and CVE-2015-4911.

CVE Informations

Related Weaknesses

CWE-ID Weakness Name Source
CWE Other No informations.

Metrics

Metrics Score Severity CVSS Vector Source
V2 5 AV:N/AC:L/Au:N/C:N/I:N/A:P [email protected]

EPSS

EPSS is a scoring model that predicts the likelihood of a vulnerability being exploited.

EPSS Score

The EPSS model produces a probability score between 0 and 1 (0 and 100%). The higher the score, the greater the probability that a vulnerability will be exploited.

EPSS Percentile

The percentile is used to rank CVE according to their EPSS score. For example, a CVE in the 95th percentile according to its EPSS score is more likely to be exploited than 95% of other CVE. Thus, the percentile is used to compare the EPSS score of a CVE with that of other CVE.

Products Mentioned

Configuraton 0

Oracle>>Jrockit >> Version r28.3.7

    Configuraton 0

    Oracle>>Jdk >> Version 1.6.0

    Oracle>>Jdk >> Version 1.7.0

    Oracle>>Jdk >> Version 1.8.0

    Oracle>>Jdk >> Version 1.8.0

    Oracle>>Jre >> Version 1.6.0

      Oracle>>Jre >> Version 1.7.0

        Oracle>>Jre >> Version 1.8.0

          Oracle>>Jre >> Version 1.8.0

            References

            http://www.ubuntu.com/usn/USN-2784-1
            Tags : vendor-advisory, x_refsource_UBUNTU
            http://rhn.redhat.com/errata/RHSA-2015-2507.html
            Tags : vendor-advisory, x_refsource_REDHAT
            http://rhn.redhat.com/errata/RHSA-2015-1928.html
            Tags : vendor-advisory, x_refsource_REDHAT
            https://access.redhat.com/errata/RHSA-2016:1430
            Tags : vendor-advisory, x_refsource_REDHAT
            http://rhn.redhat.com/errata/RHSA-2015-2506.html
            Tags : vendor-advisory, x_refsource_REDHAT
            http://rhn.redhat.com/errata/RHSA-2015-2509.html
            Tags : vendor-advisory, x_refsource_REDHAT
            http://www.securitytracker.com/id/1033884
            Tags : vdb-entry, x_refsource_SECTRACK
            http://rhn.redhat.com/errata/RHSA-2015-1919.html
            Tags : vendor-advisory, x_refsource_REDHAT
            https://security.gentoo.org/glsa/201603-11
            Tags : vendor-advisory, x_refsource_GENTOO
            http://rhn.redhat.com/errata/RHSA-2015-1920.html
            Tags : vendor-advisory, x_refsource_REDHAT
            https://security.gentoo.org/glsa/201603-14
            Tags : vendor-advisory, x_refsource_GENTOO
            http://rhn.redhat.com/errata/RHSA-2015-1927.html
            Tags : vendor-advisory, x_refsource_REDHAT
            http://www.securityfocus.com/bid/77207
            Tags : vdb-entry, x_refsource_BID
            http://rhn.redhat.com/errata/RHSA-2015-1921.html
            Tags : vendor-advisory, x_refsource_REDHAT
            http://www.debian.org/security/2015/dsa-3381
            Tags : vendor-advisory, x_refsource_DEBIAN
            http://rhn.redhat.com/errata/RHSA-2015-1926.html
            Tags : vendor-advisory, x_refsource_REDHAT
            http://rhn.redhat.com/errata/RHSA-2015-2508.html
            Tags : vendor-advisory, x_refsource_REDHAT
            http://www.ubuntu.com/usn/USN-2827-1
            Tags : vendor-advisory, x_refsource_UBUNTU