Rapid7 VulnDB

HP-UX: CVE-2014-6601: Potential security vulnerabilities have been identified in the Java Runtime Environment (JRE) and the Java Developer Kit (JDK) running on HP-UX. These vulnerabilities could allow remote unauthorized access, disclosure of information, and other vulnerabilities.

Back to Search

HP-UX: CVE-2014-6601: Potential security vulnerabilities have been identified in the Java Runtime Environment (JRE) and the Java Developer Kit (JDK) running on HP-UX. These vulnerabilities could allow remote unauthorized access, disclosure of information, and other vulnerabilities.

Severity
10
CVSS
(AV:N/AC:L/Au:N/C:C/I:C/A:C)
Published
01/21/2015
Created
07/25/2018
Added
08/11/2017
Modified
09/12/2017

Description

Unspecified vulnerability in Oracle Java SE 6u85, 7u72, and 8u25 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Hotspot.

Solution(s)

  • hpux-update-jdk60-jdk60
  • hpux-update-jdk60-jdk60-com
  • hpux-update-jdk60-jdk60-ipf32
  • hpux-update-jdk60-jdk60-ipf64
  • hpux-update-jdk60-jdk60-pa20
  • hpux-update-jdk60-jdk60-pa20w
  • hpux-update-jdk60-jdk60-pnv2
  • hpux-update-jdk60-jdk60-pwv2
  • hpux-update-jdk70-jdk70
  • hpux-update-jdk70-jdk70-com
  • hpux-update-jdk70-jdk70-demo
  • hpux-update-jdk70-jdk70-ipf32
  • hpux-update-jdk70-jdk70-ipf64
  • hpux-update-jdk80-jdk80-com
  • hpux-update-jdk80-jdk80-demo
  • hpux-update-jdk80-jdk80-ipf32
  • hpux-update-jdk80-jdk80-ipf64
  • hpux-update-jre60-jre60-com
  • hpux-update-jre60-jre60-com-doc
  • hpux-update-jre60-jre60-ipf32
  • hpux-update-jre60-jre60-ipf32-hs
  • hpux-update-jre60-jre60-ipf64
  • hpux-update-jre60-jre60-ipf64-hs
  • hpux-update-jre60-jre60-pa20
  • hpux-update-jre60-jre60-pa20-hs
  • hpux-update-jre60-jre60-pa20w
  • hpux-update-jre60-jre60-pa20w-hs
  • hpux-update-jre60-jre60-pnv2
  • hpux-update-jre60-jre60-pnv2-h
  • hpux-update-jre60-jre60-pwv2
  • hpux-update-jre60-jre60-pwv2-h
  • hpux-update-jre70-jre70
  • hpux-update-jre70-jre70-com
  • hpux-update-jre70-jre70-com-doc
  • hpux-update-jre70-jre70-ipf32
  • hpux-update-jre70-jre70-ipf32-hs
  • hpux-update-jre70-jre70-ipf64
  • hpux-update-jre70-jre70-ipf64-hs
  • hpux-update-jre80-jre80-com
  • hpux-update-jre80-jre80-com-doc
  • hpux-update-jre80-jre80-ipf64
  • hpux-update-jre80-jre80-ipf64-hs
  • hpux-update-jre80-jre800-ipf32
  • hpux-update-jre80-jre800-ipf32-hs

References

  • hpux-update-jdk60-jdk60
  • hpux-update-jdk60-jdk60-com
  • hpux-update-jdk60-jdk60-ipf32
  • hpux-update-jdk60-jdk60-ipf64
  • hpux-update-jdk60-jdk60-pa20
  • hpux-update-jdk60-jdk60-pa20w
  • hpux-update-jdk60-jdk60-pnv2
  • hpux-update-jdk60-jdk60-pwv2
  • hpux-update-jdk70-jdk70
  • hpux-update-jdk70-jdk70-com
  • hpux-update-jdk70-jdk70-demo
  • hpux-update-jdk70-jdk70-ipf32
  • hpux-update-jdk70-jdk70-ipf64
  • hpux-update-jdk80-jdk80-com
  • hpux-update-jdk80-jdk80-demo
  • hpux-update-jdk80-jdk80-ipf32
  • hpux-update-jdk80-jdk80-ipf64
  • hpux-update-jre60-jre60-com
  • hpux-update-jre60-jre60-com-doc
  • hpux-update-jre60-jre60-ipf32
  • hpux-update-jre60-jre60-ipf32-hs
  • hpux-update-jre60-jre60-ipf64
  • hpux-update-jre60-jre60-ipf64-hs
  • hpux-update-jre60-jre60-pa20
  • hpux-update-jre60-jre60-pa20-hs
  • hpux-update-jre60-jre60-pa20w
  • hpux-update-jre60-jre60-pa20w-hs
  • hpux-update-jre60-jre60-pnv2
  • hpux-update-jre60-jre60-pnv2-h
  • hpux-update-jre60-jre60-pwv2
  • hpux-update-jre60-jre60-pwv2-h
  • hpux-update-jre70-jre70
  • hpux-update-jre70-jre70-com
  • hpux-update-jre70-jre70-com-doc
  • hpux-update-jre70-jre70-ipf32
  • hpux-update-jre70-jre70-ipf32-hs
  • hpux-update-jre70-jre70-ipf64
  • hpux-update-jre70-jre70-ipf64-hs
  • hpux-update-jre80-jre80-com
  • hpux-update-jre80-jre80-com-doc
  • hpux-update-jre80-jre80-ipf64
  • hpux-update-jre80-jre80-ipf64-hs
  • hpux-update-jre80-jre800-ipf32
  • hpux-update-jre80-jre800-ipf32-hs

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;