Rapid7 Vulnerability & Exploit Database

IBM WebSphere Application Server: CVE-2016-0475: IBM Multiple vulnerabilities in IBM® Java SDK affect WebSphere Application Server January 2016 CPU (CVE-2016-0475, CVE-2016-0466, CVE-2015-7575, CVE-2016-0448)

Back to Search

IBM WebSphere Application Server: CVE-2016-0475: IBM Multiple vulnerabilities in IBM® Java SDK affect WebSphere Application Server January 2016 CPU (CVE-2016-0475, CVE-2016-0466, CVE-2015-7575, CVE-2016-0448)

Severity
6
CVSS
(AV:N/AC:M/Au:N/C:P/I:P/A:N)
Published
01/20/2016
Created
07/25/2018
Added
04/27/2018
Modified
04/27/2018

Description

Unspecified vulnerability in the Java SE, Java SE Embedded, and JRockit components in Oracle Java SE 8u66; Java SE Embedded 8u65; and JRockit R28.3.8 allows remote attackers to affect confidentiality and integrity via unknown vectors related to Libraries.

Solution(s)

  • ibm-was-install-7-0-0-0-pi55781
  • ibm-was-install-8-0-0-0-pi55780
  • ibm-was-install-8-5-0-0-pi55773-liberty
  • ibm-was-install-8-5-0-0-pi55774-liberty
  • ibm-was-install-8-5-0-0-pi55775
  • ibm-was-install-8-5-0-0-pi55775-liberty
  • ibm-was-install-8-5-0-0-pi55776
  • ibm-was-install-8-5-0-0-pi55776-liberty
  • ibm-was-install-8-5-0-0-pi55778
  • ibm-was-install-8-5-0-0-pi55779-liberty
  • ibm-was-upgrade-7-0-0-0-7-0-0-41
  • ibm-was-upgrade-8-0-0-0-8-0-0-13
  • ibm-was-upgrade-8-5-0-0-8-5-5-9
  • ibm-was-upgrade-8-5-0-0-8-5-5-9-liberty

References

  • ibm-was-install-7-0-0-0-pi55781
  • ibm-was-install-8-0-0-0-pi55780
  • ibm-was-install-8-5-0-0-pi55773-liberty
  • ibm-was-install-8-5-0-0-pi55774-liberty
  • ibm-was-install-8-5-0-0-pi55775
  • ibm-was-install-8-5-0-0-pi55775-liberty
  • ibm-was-install-8-5-0-0-pi55776
  • ibm-was-install-8-5-0-0-pi55776-liberty
  • ibm-was-install-8-5-0-0-pi55778
  • ibm-was-install-8-5-0-0-pi55779-liberty
  • ibm-was-upgrade-7-0-0-0-7-0-0-41
  • ibm-was-upgrade-8-0-0-0-8-0-0-13
  • ibm-was-upgrade-8-5-0-0-8-5-5-9
  • ibm-was-upgrade-8-5-0-0-8-5-5-9-liberty

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;