{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"state":"PUBLISHED","cveId":"CVE-2015-7501","assignerOrgId":"53f830b8-0a3f-465b-8143-3b8a9948e749","assignerShortName":"redhat","dateUpdated":"2024-08-06T07:51:28.224Z","dateReserved":"2015-09-29T00:00:00.000Z","datePublished":"2017-11-09T00:00:00.000Z"},"containers":{"cna":{"providerMetadata":{"orgId":"53f830b8-0a3f-465b-8143-3b8a9948e749","shortName":"redhat","dateUpdated":"2024-02-16T13:06:08.221Z"},"descriptions":[{"lang":"en","value":"Red Hat JBoss A-MQ 6.x; BPM Suite (BPMS) 6.x; BRMS 6.x and 5.x; Data Grid (JDG) 6.x; Data Virtualization (JDV) 6.x and 5.x; Enterprise Application Platform 6.x, 5.x, and 4.3.x; Fuse 6.x; Fuse Service Works (FSW) 6.x; Operations Network (JBoss ON) 3.x; Portal 6.x; SOA Platform (SOA-P) 5.x; Web Server (JWS) 3.x; Red Hat OpenShift/xPAAS 3.x; and Red Hat Subscription Asset Manager 1.3 allow remote attackers to execute arbitrary commands via a crafted serialized Java object, related to the Apache Commons Collections (ACC) library."}],"affected":[{"vendor":"n/a","product":"n/a","versions":[{"version":"n/a","status":"affected"}]}],"references":[{"name":"RHSA-2016:0040","tags":["vendor-advisory"],"url":"http://rhn.redhat.com/errata/RHSA-2016-0040.html"},{"name":"RHSA-2015:2670","tags":["vendor-advisory"],"url":"http://rhn.redhat.com/errata/RHSA-2015-2670.html"},{"name":"RHSA-2015:2501","tags":["vendor-advisory"],"url":"http://rhn.redhat.com/errata/RHSA-2015-2501.html"},{"name":"RHSA-2015:2517","tags":["vendor-advisory"],"url":"http://rhn.redhat.com/errata/RHSA-2015-2517.html"},{"name":"78215","tags":["vdb-entry"],"url":"http://www.securityfocus.com/bid/78215"},{"name":"1034097","tags":["vdb-entry"],"url":"http://www.securitytracker.com/id/1034097"},{"name":"RHSA-2015:2671","tags":["vendor-advisory"],"url":"http://rhn.redhat.com/errata/RHSA-2015-2671.html"},{"name":"1037052","tags":["vdb-entry"],"url":"http://www.securitytracker.com/id/1037052"},{"name":"1037640","tags":["vdb-entry"],"url":"http://www.securitytracker.com/id/1037640"},{"name":"RHSA-2015:2522","tags":["vendor-advisory"],"url":"http://rhn.redhat.com/errata/RHSA-2015-2522.html"},{"name":"RHSA-2015:2521","tags":["vendor-advisory"],"url":"http://rhn.redhat.com/errata/RHSA-2015-2521.html"},{"name":"RHSA-2015:2516","tags":["vendor-advisory"],"url":"http://rhn.redhat.com/errata/RHSA-2015-2516.html"},{"name":"RHSA-2015:2500","tags":["vendor-advisory"],"url":"http://rhn.redhat.com/errata/RHSA-2015-2500.html"},{"name":"RHSA-2015:2514","tags":["vendor-advisory"],"url":"http://rhn.redhat.com/errata/RHSA-2015-2514.html"},{"name":"RHSA-2015:2502","tags":["vendor-advisory"],"url":"http://rhn.redhat.com/errata/RHSA-2015-2502.html"},{"name":"RHSA-2015:2536","tags":["vendor-advisory"],"url":"https://rhn.redhat.com/errata/RHSA-2015-2536.html"},{"name":"RHSA-2016:1773","tags":["vendor-advisory"],"url":"http://rhn.redhat.com/errata/RHSA-2016-1773.html"},{"name":"RHSA-2015:2524","tags":["vendor-advisory"],"url":"http://rhn.redhat.com/errata/RHSA-2015-2524.html"},{"name":"1037053","tags":["vdb-entry"],"url":"http://www.securitytracker.com/id/1037053"},{"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1279330"},{"url":"https://access.redhat.com/solutions/2045023"},{"url":"http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html"},{"url":"http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html"},{"url":"http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html"},{"url":"https://access.redhat.com/security/vulnerabilities/2059393"},{"url":"http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html"},{"url":"https://www.oracle.com/security-alerts/cpujul2020.html"},{"url":"https://security.netapp.com/advisory/ntap-20240216-0010/"}],"problemTypes":[{"descriptions":[{"type":"text","lang":"en","description":"n/a"}]}],"datePublic":"2015-11-06T00:00:00.000Z"},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-06T07:51:28.224Z"},"title":"CVE Program Container","references":[{"name":"RHSA-2016:0040","tags":["vendor-advisory","x_transferred"],"url":"http://rhn.redhat.com/errata/RHSA-2016-0040.html"},{"name":"RHSA-2015:2670","tags":["vendor-advisory","x_transferred"],"url":"http://rhn.redhat.com/errata/RHSA-2015-2670.html"},{"name":"RHSA-2015:2501","tags":["vendor-advisory","x_transferred"],"url":"http://rhn.redhat.com/errata/RHSA-2015-2501.html"},{"name":"RHSA-2015:2517","tags":["vendor-advisory","x_transferred"],"url":"http://rhn.redhat.com/errata/RHSA-2015-2517.html"},{"name":"78215","tags":["vdb-entry","x_transferred"],"url":"http://www.securityfocus.com/bid/78215"},{"name":"1034097","tags":["vdb-entry","x_transferred"],"url":"http://www.securitytracker.com/id/1034097"},{"name":"RHSA-2015:2671","tags":["vendor-advisory","x_transferred"],"url":"http://rhn.redhat.com/errata/RHSA-2015-2671.html"},{"name":"1037052","tags":["vdb-entry","x_transferred"],"url":"http://www.securitytracker.com/id/1037052"},{"name":"1037640","tags":["vdb-entry","x_transferred"],"url":"http://www.securitytracker.com/id/1037640"},{"name":"RHSA-2015:2522","tags":["vendor-advisory","x_transferred"],"url":"http://rhn.redhat.com/errata/RHSA-2015-2522.html"},{"name":"RHSA-2015:2521","tags":["vendor-advisory","x_transferred"],"url":"http://rhn.redhat.com/errata/RHSA-2015-2521.html"},{"name":"RHSA-2015:2516","tags":["vendor-advisory","x_transferred"],"url":"http://rhn.redhat.com/errata/RHSA-2015-2516.html"},{"name":"RHSA-2015:2500","tags":["vendor-advisory","x_transferred"],"url":"http://rhn.redhat.com/errata/RHSA-2015-2500.html"},{"name":"RHSA-2015:2514","tags":["vendor-advisory","x_transferred"],"url":"http://rhn.redhat.com/errata/RHSA-2015-2514.html"},{"name":"RHSA-2015:2502","tags":["vendor-advisory","x_transferred"],"url":"http://rhn.redhat.com/errata/RHSA-2015-2502.html"},{"name":"RHSA-2015:2536","tags":["vendor-advisory","x_transferred"],"url":"https://rhn.redhat.com/errata/RHSA-2015-2536.html"},{"name":"RHSA-2016:1773","tags":["vendor-advisory","x_transferred"],"url":"http://rhn.redhat.com/errata/RHSA-2016-1773.html"},{"name":"RHSA-2015:2524","tags":["vendor-advisory","x_transferred"],"url":"http://rhn.redhat.com/errata/RHSA-2015-2524.html"},{"name":"1037053","tags":["vdb-entry","x_transferred"],"url":"http://www.securitytracker.com/id/1037053"},{"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1279330","tags":["x_transferred"]},{"url":"https://access.redhat.com/solutions/2045023","tags":["x_transferred"]},{"url":"http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html","tags":["x_transferred"]},{"url":"http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html","tags":["x_transferred"]},{"url":"http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html","tags":["x_transferred"]},{"url":"https://access.redhat.com/security/vulnerabilities/2059393","tags":["x_transferred"]},{"url":"http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html","tags":["x_transferred"]},{"url":"https://www.oracle.com/security-alerts/cpujul2020.html","tags":["x_transferred"]},{"url":"https://security.netapp.com/advisory/ntap-20240216-0010/","tags":["x_transferred"]}]}]}}