The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a database and tools to fix them.

Computer vulnerabilities of HPE HP-UX

2 BIND: denial of service via DNSSEC Key
An attacker can query BIND for a domain containing a malformed DNSSEC key, to force an assertion error in buffer.c, in order to trigger a denial of service...
bulletinjul2015, c04800156, c04891218, c04923105, CERTFR-2015-AVI-389, CVE-2015-5722, DSA-3350-1, FEDORA-2015-14958, FEDORA-2015-15041, FEDORA-2015-15061, FreeBSD-SA-15:23.bind, HPSBUX03511, HPSBUX03522, HPSBUX03529, openSUSE-SU-2015:1597-1, openSUSE-SU-2015:1667-1, RHSA-2015:1705-01, RHSA-2015:1706-01, RHSA-2015:1707-01, RHSA-2016:0078-01, RHSA-2016:0079-01, SOL17181, SSA:2015-245-01, SSRT102248, SSRT102942, SSRT102967, SUSE-SU-2015:1480-1, SUSE-SU-2015:1481-1, SUSE-SU-2015:1496-1, SUSE-SU-2016:0227-1, USN-2728-1, VIGILANCE-VUL-17798
2 HP-UX: privilege escalation via execve
A local attacker can call execve() on HP-UX, in order to escalate his privileges...
c04735247, CVE-2015-2132, HPSBUX03369, SSRT102037, VIGILANCE-VUL-17728
3 BIND: denial of service via TKEY
An attacker can force an assertion error with a TKEY query sent to BIND, in order to trigger a denial of service...
AA-01272, bulletinjul2015, c04769567, c04800156, c04891218, CERTFR-2015-AVI-322, CERTFR-2016-AVI-020, CVE-2015-5477, DSA-3319-1, FEDORA-2015-12316, FEDORA-2015-12335, FEDORA-2015-12357, FreeBSD-SA-15:17.bind, HPSBUX03400, HPSBUX03511, HPSBUX03522, JSA10718, openSUSE-SU-2015:1326-1, openSUSE-SU-2015:1335-1, RHSA-2015:1513-01, RHSA-2015:1514-01, RHSA-2015:1515-01, RHSA-2016:0078-01, RHSA-2016:0079-01, SOL16909, SSA:2015-209-01, SSRT102211, SSRT102248, SSRT102942, SUSE-SU-2015:1304-1, SUSE-SU-2015:1305-1, SUSE-SU-2015:1316-1, SUSE-SU-2015:1322-1, SUSE-SU-2016:0227-1, USN-2693-1, VIGILANCE-VUL-17520
3 Apache httpd: three vulnerabilities
An attacker can use several vulnerabilities of Apache httpd...
1963361, 1965444, 1967197, 1969062, bulletinoct2015, c04832246, c04926789, CVE-2015-0253, CVE-2015-3183, CVE-2015-3185, DSA-2019-131, DSA-3325-1, DSA-3325-2, FEDORA-2015-11689, FEDORA-2015-11792, HPSBUX03435, HPSBUX03512, openSUSE-SU-2015:1684-1, RHSA-2015:1666-01, RHSA-2015:1667-01, RHSA-2015:1668-01, RHSA-2015:2659-01, RHSA-2015:2660-01, RHSA-2015:2661-01, RHSA-2016:0062-01, RHSA-2016:2054-01, RHSA-2016:2055-01, RHSA-2016:2056-01, SOL17251, SSA:2015-198-01, SSRT102254, SSRT102977, USN-2686-1, VIGILANCE-VUL-17378
3 OpenSSL: X.509 certification chain forgery
An attacker can force OpenSSL to accept spoofed certificates, in order to listen for encrypted communications or bypass signature based authentication...
1962398, 1963151, BSA-2015-009, bulletinjul2015, c04760669, c05184351, CERTFR-2015-AVI-285, CERTFR-2015-AVI-431, cisco-sa-20150710-openssl, cpuoct2017, CVE-2015-1793, FEDORA-2015-11414, FEDORA-2015-11475, FreeBSD-SA-15:12.openssl, HPSBHF03613, HPSBUX03388, JSA10694, SB10125, SOL16937, SPL-103044, SSA:2015-190-01, SSRT102180, VIGILANCE-VUL-17337
4 ISC Bind: denial of service via DNSCEC validation
An attacker can force an assertion error in the DNSSEC validation of ISC Bind, in order to trigger a denial of service...
BSA-2015-009, c04745746, CVE-2015-4620, DSA-3304-1, FEDORA-2015-11483, FEDORA-2015-11484, FreeBSD-SA-15:11.bind, HPSBUX03379, openSUSE-SU-2015:1250-1, openSUSE-SU-2015:1250-2, openSUSE-SU-2015:1326-1, RHSA-2015:1443-01, RHSA-2015:1471-01, SOL16912, SSA:2015-188-04, SSRT101976, SUSE-SU-2015:1205-1, USN-2669-1, VIGILANCE-VUL-17320
2 OpenSSL: four vulnerabilities
An attacker can use several vulnerabilities of OpenSSL...
1450666, 1610582, 1647054, 1961111, 1961569, 1964113, 1964766, 1966038, 1970103, 1972125, 9010038, 9010039, BSA-2015-006, bulletinjul2015, c04760669, c05184351, c05353965, CERTFR-2015-AVI-257, CERTFR-2015-AVI-431, CERTFR-2016-AVI-128, CERTFR-2016-AVI-303, cisco-sa-20150612-openssl, cpuapr2017, cpuoct2017, CTX216642, CVE-2015-1788, CVE-2015-1789, CVE-2015-1790, CVE-2015-1792, DSA-3287-1, FEDORA-2015-10047, FEDORA-2015-10108, FreeBSD-SA-15:10.openssl, HPSBGN03678, HPSBHF03613, HPSBUX03388, JSA10694, JSA10733, NetBSD-SA2015-008, NTAP-20150616-0001, openSUSE-SU-2015:1139-1, openSUSE-SU-2015:1277-1, openSUSE-SU-2015:2243-1, openSUSE-SU-2016:0640-1, PAN-SA-2016-0020, PAN-SA-2016-0028, RHSA-2015:1115-01, RHSA-2015:1197-01, SA40002, SA98, SB10122, SOL16898, SOL16913, SOL16915, SOL16938, SSA:2015-162-01, SSRT102180, SUSE-SU-2015:1143-1, SUSE-SU-2015:1150-1, SUSE-SU-2015:1181-1, SUSE-SU-2015:1181-2, SUSE-SU-2015:1182-2, SUSE-SU-2015:1183-1, SUSE-SU-2015:1183-2, SUSE-SU-2015:1184-1, SUSE-SU-2015:1184-2, SUSE-SU-2015:1185-1, TNS-2015-07, TSB16728, USN-2639-1, VIGILANCE-VUL-17117
2 OpenSSL: use after free via NewSessionTicket
An attacker, who own a malicious TLS server, can send the NewSessionTicket message, to force the usage of a freed memory area in a client linked to OpenSSL, in order to trigger a denial of service, and possibly to execute code...
1961569, 1964113, 1970103, 2003480, 2003620, 2003673, 9010038, 9010039, bulletinjul2015, c04760669, c05184351, c05353965, CERTFR-2015-AVI-431, CERTFR-2016-AVI-128, CERTFR-2016-AVI-303, cisco-sa-20150612-openssl, cpuapr2017, cpuoct2016, cpuoct2017, CTX216642, CVE-2015-1791, DSA-3287-1, FEDORA-2015-10047, FEDORA-2015-10108, FreeBSD-SA-15:10.openssl, HPSBGN03678, HPSBHF03613, HPSBUX03388, JSA10694, JSA10733, NetBSD-SA2015-008, NTAP-20150616-0001, openSUSE-SU-2015:1139-1, openSUSE-SU-2016:0640-1, PAN-SA-2016-0020, PAN-SA-2016-0028, RHSA-2015:1115-01, SA40002, SA98, SB10122, SOL16914, SSA:2015-162-01, SSRT102180, SUSE-SU-2015:1143-1, SUSE-SU-2015:1150-1, SUSE-SU-2015:1182-2, SUSE-SU-2015:1184-1, SUSE-SU-2015:1184-2, SUSE-SU-2015:1185-1, TSB16728, USN-2639-1, VIGILANCE-VUL-17062
2 TLS: weakening Diffie-Hellman via Logjam
An attacker, located as a Man-in-the-Middle, can force the TLS client/server to accept a weak export algorithm, in order to more easily capture or alter exchanged data...
1610582, 1647054, 1957980, 1958984, 1959033, 1959539, 1959745, 1960194, 1960418, 1960862, 1962398, 1962694, 1963151, 9010038, 9010039, 9010041, 9010044, BSA-2015-005, bulletinjan2016, bulletinjul2015, c04725401, c04760669, c04767175, c04770140, c04773119, c04773241, c04774058, c04778650, c04832246, c04918839, c04926789, CERTFR-2016-AVI-303, CTX216642, CVE-2015-4000, DLA-507-1, DSA-3287-1, DSA-3300-1, DSA-3688-1, FEDORA-2015-10047, FEDORA-2015-10108, FEDORA-2015-9048, FEDORA-2015-9130, FEDORA-2015-9161, FreeBSD-EN-15:08.sendmail, FreeBSD-SA-15:10.openssl, HPSBGN03399, HPSBGN03407, HPSBGN03411, HPSBGN03417, HPSBHF03433, HPSBMU03345, HPSBMU03401, HPSBUX03363, HPSBUX03388, HPSBUX03435, HPSBUX03512, JSA10681, Logjam, NetBSD-SA2015-008, NTAP-20150616-0001, NTAP-20150715-0001, NTAP-20151028-0001, openSUSE-SU-2015:1139-1, openSUSE-SU-2015:1209-1, openSUSE-SU-2015:1216-1, openSUSE-SU-2015:1277-1, openSUSE-SU-2016:0226-1, openSUSE-SU-2016:0255-1, openSUSE-SU-2016:0261-1, openSUSE-SU-2016:2267-1, PAN-SA-2016-0020, PAN-SA-2016-0028, RHSA-2015:1072-01, RHSA-2015:1185-01, RHSA-2015:1197-01, RHSA-2016:2054-01, RHSA-2016:2055-01, RHSA-2016:2056-01, SA111, SA40002, SA98, SB10122, SSA:2015-219-02, SSRT102180, SSRT102254, SSRT102964, SSRT102977, SUSE-SU-2015:1143-1, SUSE-SU-2015:1150-1, SUSE-SU-2015:1177-1, SUSE-SU-2015:1177-2, SUSE-SU-2015:1181-1, SUSE-SU-2015:1181-2, SUSE-SU-2015:1182-2, SUSE-SU-2015:1183-1, SUSE-SU-2015:1183-2, SUSE-SU-2015:1184-1, SUSE-SU-2015:1184-2, SUSE-SU-2015:1185-1, SUSE-SU-2015:1268-1, SUSE-SU-2015:1268-2, SUSE-SU-2015:1269-1, SUSE-SU-2015:1581-1, SUSE-SU-2016:0224-1, SUSE-SU-2018:1768-1, TSB16728, USN-2624-1, USN-2625-1, USN-2656-1, USN-2656-2, VIGILANCE-VUL-16950, VN-2015-007
2 Apache Tomcat: privilege escalation via Web Application
An attacker can create a malicious application, and invite the administrator to install it on Apache Tomcat, in order to escalate his privileges...
bulletinoct2015, c05054964, cpujul2018, CVE-2014-7810, DSA-3428-1, DSA-3447-1, DSA-3530-1, HPSBUX03561, ibm10729557, ibm10739953, RHSA-2015:1621-01, RHSA-2015:1622-01, RHSA-2016:0492-01, VIGILANCE-VUL-16917
Our database contains other pages. You can request a free trial to read them.

Display information about HPE HP-UX: