Search for vulnerabilities
| Vulnerability ID | VCID-xap5-djda-2uem |
| Aliases |
CVE-2014-3566
|
| Summary | Multiple vulnerabilities have been found in Oracle JRE/JDK, allowing both local and remote attackers to compromise various Java components. |
| Status | Published |
| Exploitability | 2.0 |
| Weighted Severity | 3.9 |
| Risk | 7.8 |
| Affected and Fixed Packages | Package Details |
| System | Score | Found at |
|---|---|---|
| epss | 0.94015 | https://api.first.org/data/v1/epss?cve=CVE-2014-3566 |
| epss | 0.94015 | https://api.first.org/data/v1/epss?cve=CVE-2014-3566 |
| epss | 0.94015 | https://api.first.org/data/v1/epss?cve=CVE-2014-3566 |
| cvssv2 | 5.8 | https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml |
| cvssv2 | 4.3 | https://nvd.nist.gov/vuln/detail/CVE-2014-3566 |
| cvssv3.1 | 3.4 | https://nvd.nist.gov/vuln/detail/CVE-2014-3566 |
| Data source | Metasploit |
|---|---|
| Description | Check if a server supports a given version of SSL/TLS and cipher suites. The certificate is stored in loot, and any known vulnerabilities against that SSL version and cipher suite combination are checked. These checks include POODLE, deprecated protocols, expired/not valid certs, low key strength, null cipher suites, certificates signed with MD5, DROWN, RC4 ciphers, exportable ciphers, LOGJAM, and BEAST. |
| Note | {}
|
| Ransomware campaign use | Unknown |
| Source publication date | Oct. 14, 2014 |
| Source URL | https://github.com/rapid7/metasploit-framework/tree/master/modules/auxiliary/scanner/ssl/ssl_version.rb |
| Exploitability (E) | Access Vector (AV) | Access Complexity (AC) | Authentication (Au) | Confidentiality Impact (C) | Integrity Impact (I) | Availability Impact (A) |
|---|---|---|---|---|---|---|
high functional unproven proof_of_concept not_defined |
local adjacent_network network |
high medium low |
multiple single none |
none partial complete |
none partial complete |
none partial complete |
| Exploitability (E) | Access Vector (AV) | Access Complexity (AC) | Authentication (Au) | Confidentiality Impact (C) | Integrity Impact (I) | Availability Impact (A) |
|---|---|---|---|---|---|---|
high functional unproven proof_of_concept not_defined |
local adjacent_network network |
high medium low |
multiple single none |
none partial complete |
none partial complete |
none partial complete |
| Attack Vector (AV) | Attack Complexity (AC) | Privileges Required (PR) | User Interaction (UI) | Scope (S) | Confidentiality Impact (C) | Integrity Impact (I) | Availability Impact (A) |
|---|---|---|---|---|---|---|---|
network adjacent_network local physical |
low high |
none low high |
none required |
unchanged changed |
high low none |
high low none |
high low none |
| Percentile | 0.99894 |
| EPSS Score | 0.94015 |
| Published At | April 2, 2026, 12:55 p.m. |
| Date | Actor | Action | Source | VulnerableCode Version |
|---|---|---|---|---|
| 2026-04-01T13:01:30.635306+00:00 | Gentoo Importer | Import | https://security.gentoo.org/glsa/201507-14 | 38.0.0 |