Vulnerabilities of HP-UXHP-UX vulnerability: code execution via 2D
An attacker can invite the victim to display a web page containing a Java applet (or Java Web Start) using the 2D component, in order to execute code on his computer.HP-UX vulnerability: several vulnerabilities
Several vulnerabilities of Oracle JRE and JDK can be used by a malicious applet/application in order to execute code or to obtain information. A legitimate applet/application, handling malicious data, can also be forced to execute code.HP-UX vulnerability: information disclosure in CBC mode, Lucky 13
An attacker can inject wrongly encrypted messages in a TLS/DTLS session in mode CBC, and measure the delay before the error message reception, in order to progressively guess the clear content of the session.HP-UX vulnerability: authentication bypass via URL mangling
An attacker who must go through authentication via a form, can append /j_security_check to to URL, in order to bypass the authentication process.HP-UX vulnerability: bypassing the DIGEST authentication
When Apache Tomcat uses an HTTP DIGEST authentication, an attacker can replay a previously captured session, and thus access to protected resources.Display other vulnerabilities of HP-UX described by Vigil@nce...
Display information about HP-UX: