Rapid7 Vulnerability & Exploit Database

HP-UX: CVE-2015-0383: Potential security vulnerabilities have been identified in the Java Runtime Environment (JRE) and the Java Developer Kit (JDK) running on HP-UX. These vulnerabilities could allow remote unauthorized access, disclosure of information, and other vulnerabilities.

Back to Search

HP-UX: CVE-2015-0383: Potential security vulnerabilities have been identified in the Java Runtime Environment (JRE) and the Java Developer Kit (JDK) running on HP-UX. These vulnerabilities could allow remote unauthorized access, disclosure of information, and other vulnerabilities.

Severity
5
CVSS
(AV:L/AC:M/Au:N/C:N/I:P/A:C)
Published
01/21/2015
Created
07/25/2018
Added
08/11/2017
Modified
09/12/2017

Description

Unspecified vulnerability in Oracle Java SE 5.0u75, 6u85, 7u72, and 8u25; Java SE Embedded 7u71 and 8u6; and JRockit R27.8.4 and R28.3.4 allows local users to affect integrity and availability via unknown vectors related to Hotspot.

Solution(s)

  • hpux-update-jdk60-jdk60
  • hpux-update-jdk60-jdk60-com
  • hpux-update-jdk60-jdk60-ipf32
  • hpux-update-jdk60-jdk60-ipf64
  • hpux-update-jdk60-jdk60-pa20
  • hpux-update-jdk60-jdk60-pa20w
  • hpux-update-jdk60-jdk60-pnv2
  • hpux-update-jdk60-jdk60-pwv2
  • hpux-update-jdk70-jdk70
  • hpux-update-jdk70-jdk70-com
  • hpux-update-jdk70-jdk70-demo
  • hpux-update-jdk70-jdk70-ipf32
  • hpux-update-jdk70-jdk70-ipf64
  • hpux-update-jdk80-jdk80-com
  • hpux-update-jdk80-jdk80-demo
  • hpux-update-jdk80-jdk80-ipf32
  • hpux-update-jdk80-jdk80-ipf64
  • hpux-update-jre60-jre60-com
  • hpux-update-jre60-jre60-com-doc
  • hpux-update-jre60-jre60-ipf32
  • hpux-update-jre60-jre60-ipf32-hs
  • hpux-update-jre60-jre60-ipf64
  • hpux-update-jre60-jre60-ipf64-hs
  • hpux-update-jre60-jre60-pa20
  • hpux-update-jre60-jre60-pa20-hs
  • hpux-update-jre60-jre60-pa20w
  • hpux-update-jre60-jre60-pa20w-hs
  • hpux-update-jre60-jre60-pnv2
  • hpux-update-jre60-jre60-pnv2-h
  • hpux-update-jre60-jre60-pwv2
  • hpux-update-jre60-jre60-pwv2-h
  • hpux-update-jre70-jre70
  • hpux-update-jre70-jre70-com
  • hpux-update-jre70-jre70-com-doc
  • hpux-update-jre70-jre70-ipf32
  • hpux-update-jre70-jre70-ipf32-hs
  • hpux-update-jre70-jre70-ipf64
  • hpux-update-jre70-jre70-ipf64-hs
  • hpux-update-jre80-jre80-com
  • hpux-update-jre80-jre80-com-doc
  • hpux-update-jre80-jre80-ipf64
  • hpux-update-jre80-jre80-ipf64-hs
  • hpux-update-jre80-jre800-ipf32
  • hpux-update-jre80-jre800-ipf32-hs

References

  • hpux-update-jdk60-jdk60
  • hpux-update-jdk60-jdk60-com
  • hpux-update-jdk60-jdk60-ipf32
  • hpux-update-jdk60-jdk60-ipf64
  • hpux-update-jdk60-jdk60-pa20
  • hpux-update-jdk60-jdk60-pa20w
  • hpux-update-jdk60-jdk60-pnv2
  • hpux-update-jdk60-jdk60-pwv2
  • hpux-update-jdk70-jdk70
  • hpux-update-jdk70-jdk70-com
  • hpux-update-jdk70-jdk70-demo
  • hpux-update-jdk70-jdk70-ipf32
  • hpux-update-jdk70-jdk70-ipf64
  • hpux-update-jdk80-jdk80-com
  • hpux-update-jdk80-jdk80-demo
  • hpux-update-jdk80-jdk80-ipf32
  • hpux-update-jdk80-jdk80-ipf64
  • hpux-update-jre60-jre60-com
  • hpux-update-jre60-jre60-com-doc
  • hpux-update-jre60-jre60-ipf32
  • hpux-update-jre60-jre60-ipf32-hs
  • hpux-update-jre60-jre60-ipf64
  • hpux-update-jre60-jre60-ipf64-hs
  • hpux-update-jre60-jre60-pa20
  • hpux-update-jre60-jre60-pa20-hs
  • hpux-update-jre60-jre60-pa20w
  • hpux-update-jre60-jre60-pa20w-hs
  • hpux-update-jre60-jre60-pnv2
  • hpux-update-jre60-jre60-pnv2-h
  • hpux-update-jre60-jre60-pwv2
  • hpux-update-jre60-jre60-pwv2-h
  • hpux-update-jre70-jre70
  • hpux-update-jre70-jre70-com
  • hpux-update-jre70-jre70-com-doc
  • hpux-update-jre70-jre70-ipf32
  • hpux-update-jre70-jre70-ipf32-hs
  • hpux-update-jre70-jre70-ipf64
  • hpux-update-jre70-jre70-ipf64-hs
  • hpux-update-jre80-jre80-com
  • hpux-update-jre80-jre80-com-doc
  • hpux-update-jre80-jre80-ipf64
  • hpux-update-jre80-jre80-ipf64-hs
  • hpux-update-jre80-jre800-ipf32
  • hpux-update-jre80-jre800-ipf32-hs

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;