{"id":"CVE-2015-7501","details":"Red Hat JBoss A-MQ 6.x; BPM Suite (BPMS) 6.x; BRMS 6.x and 5.x; Data Grid (JDG) 6.x; Data Virtualization (JDV) 6.x and 5.x; Enterprise Application Platform 6.x, 5.x, and 4.3.x; Fuse 6.x; Fuse Service Works (FSW) 6.x; Operations Network (JBoss ON) 3.x; Portal 6.x; SOA Platform (SOA-P) 5.x; Web Server (JWS) 3.x; Red Hat OpenShift/xPAAS 3.x; and Red Hat Subscription Asset Manager 1.3 allow remote attackers to execute arbitrary commands via a crafted serialized Java object, related to the Apache Commons Collections (ACC) library.","aliases":["GHSA-fjq5-5j5f-mvxh"],"modified":"2026-04-16T06:24:09.655339617Z","published":"2017-11-09T17:29:00Z","references":[{"type":"ADVISORY","url":"http://rhn.redhat.com/errata/RHSA-2015-2500.html"},{"type":"ADVISORY","url":"http://rhn.redhat.com/errata/RHSA-2015-2501.html"},{"type":"ADVISORY","url":"http://rhn.redhat.com/errata/RHSA-2015-2502.html"},{"type":"ADVISORY","url":"http://rhn.redhat.com/errata/RHSA-2015-2514.html"},{"type":"ADVISORY","url":"http://rhn.redhat.com/errata/RHSA-2015-2516.html"},{"type":"ADVISORY","url":"http://rhn.redhat.com/errata/RHSA-2015-2517.html"},{"type":"ADVISORY","url":"http://rhn.redhat.com/errata/RHSA-2015-2521.html"},{"type":"ADVISORY","url":"http://rhn.redhat.com/errata/RHSA-2015-2522.html"},{"type":"ADVISORY","url":"http://rhn.redhat.com/errata/RHSA-2015-2524.html"},{"type":"ADVISORY","url":"http://rhn.redhat.com/errata/RHSA-2015-2670.html"},{"type":"ADVISORY","url":"http://rhn.redhat.com/errata/RHSA-2015-2671.html"},{"type":"ADVISORY","url":"http://rhn.redhat.com/errata/RHSA-2016-0040.html"},{"type":"ADVISORY","url":"http://rhn.redhat.com/errata/RHSA-2016-1773.html"},{"type":"ADVISORY","url":"http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html"},{"type":"ADVISORY","url":"http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html"},{"type":"ADVISORY","url":"http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html"},{"type":"ADVISORY","url":"http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html"},{"type":"ADVISORY","url":"http://www.securityfocus.com/bid/78215"},{"type":"ADVISORY","url":"http://www.securitytracker.com/id/1034097"},{"type":"ADVISORY","url":"http://www.securitytracker.com/id/1037052"},{"type":"ADVISORY","url":"http://www.securitytracker.com/id/1037053"},{"type":"ADVISORY","url":"http://www.securitytracker.com/id/1037640"},{"type":"ADVISORY","url":"https://access.redhat.com/security/vulnerabilities/2059393"},{"type":"ADVISORY","url":"https://access.redhat.com/solutions/2045023"},{"type":"ADVISORY","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1279330"},{"type":"ADVISORY","url":"https://rhn.redhat.com/errata/RHSA-2015-2536.html"},{"type":"ADVISORY","url":"https://security.netapp.com/advisory/ntap-20240216-0010/"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1279330"},{"type":"WEB","url":"https://www.oracle.com/security-alerts/cpujul2020.html"}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}]}