CVE-2014-6450 (GCVE-0-2014-6450)
Vulnerability from cvelistv5
Published
2015-10-16 20:00
Modified
2024-08-06 12:17
Severity ?
CWE
  • n/a
Summary
Juniper Junos OS before 11.4R12-S4, 12.1X44 before 12.1X44-D41, 12.1X46 before 12.1X46-D26, 12.1X47 before 12.1X47-D11/D15, 12.2 before 12.2R9, 12.2X50 before 12.2X50-D70, 12.3 before 12.3R8, 12.3X48 before 12.3X48-D10, 12.3X50 before 12.3X50-D42, 13.1 before 13.1R4-S3, 13.1X49 before 13.1X49-D42, 13.1X50 before 13.1X50-D30, 13.2 before 13.2R6, 13.2X51 before 13.2X51-D26, 13.2X52 before 13.2X52-D15, 13.3 before 13.3R3-S3, 14.1 before 14.1R3, 14.2 before 14.2R1, 15.1 before 15.1R1, and 15.1X49 before 15.1X49-D10, when configured for IPv6, allow remote attackers to cause a denial of service (mbuf chain corruption and kernel panic) via crafted IPv6 packets.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T12:17:23.886Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10699"
          },
          {
            "name": "1033855",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://www.securitytracker.com/id/1033855"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2015-10-14T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Juniper Junos OS before 11.4R12-S4, 12.1X44 before 12.1X44-D41, 12.1X46 before 12.1X46-D26, 12.1X47 before 12.1X47-D11/D15, 12.2 before 12.2R9, 12.2X50 before 12.2X50-D70, 12.3 before 12.3R8, 12.3X48 before 12.3X48-D10, 12.3X50 before 12.3X50-D42, 13.1 before 13.1R4-S3, 13.1X49 before 13.1X49-D42, 13.1X50 before 13.1X50-D30, 13.2 before 13.2R6, 13.2X51 before 13.2X51-D26, 13.2X52 before 13.2X52-D15, 13.3 before 13.3R3-S3, 14.1 before 14.1R3, 14.2 before 14.2R1, 15.1 before 15.1R1, and 15.1X49 before 15.1X49-D10, when configured for IPv6, allow remote attackers to cause a denial of service (mbuf chain corruption and kernel panic) via crafted IPv6 packets."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2016-12-06T18:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10699"
        },
        {
          "name": "1033855",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://www.securitytracker.com/id/1033855"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2014-6450",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Juniper Junos OS before 11.4R12-S4, 12.1X44 before 12.1X44-D41, 12.1X46 before 12.1X46-D26, 12.1X47 before 12.1X47-D11/D15, 12.2 before 12.2R9, 12.2X50 before 12.2X50-D70, 12.3 before 12.3R8, 12.3X48 before 12.3X48-D10, 12.3X50 before 12.3X50-D42, 13.1 before 13.1R4-S3, 13.1X49 before 13.1X49-D42, 13.1X50 before 13.1X50-D30, 13.2 before 13.2R6, 13.2X51 before 13.2X51-D26, 13.2X52 before 13.2X52-D15, 13.3 before 13.3R3-S3, 14.1 before 14.1R3, 14.2 before 14.2R1, 15.1 before 15.1R1, and 15.1X49 before 15.1X49-D10, when configured for IPv6, allow remote attackers to cause a denial of service (mbuf chain corruption and kernel panic) via crafted IPv6 packets."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10699",
              "refsource": "CONFIRM",
              "url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10699"
            },
            {
              "name": "1033855",
              "refsource": "SECTRACK",
              "url": "http://www.securitytracker.com/id/1033855"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2014-6450",
    "datePublished": "2015-10-16T20:00:00",
    "dateReserved": "2014-09-17T00:00:00",
    "dateUpdated": "2024-08-06T12:17:23.886Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "vulnerability-lookup:meta": {
    "nvd": "{\"cve\":{\"id\":\"CVE-2014-6450\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2015-10-16T20:59:01.697\",\"lastModified\":\"2025-04-12T10:46:40.837\",\"vulnStatus\":\"Deferred\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Juniper Junos OS before 11.4R12-S4, 12.1X44 before 12.1X44-D41, 12.1X46 before 12.1X46-D26, 12.1X47 before 12.1X47-D11/D15, 12.2 before 12.2R9, 12.2X50 before 12.2X50-D70, 12.3 before 12.3R8, 12.3X48 before 12.3X48-D10, 12.3X50 before 12.3X50-D42, 13.1 before 13.1R4-S3, 13.1X49 before 13.1X49-D42, 13.1X50 before 13.1X50-D30, 13.2 before 13.2R6, 13.2X51 before 13.2X51-D26, 13.2X52 before 13.2X52-D15, 13.3 before 13.3R3-S3, 14.1 before 14.1R3, 14.2 before 14.2R1, 15.1 before 15.1R1, and 15.1X49 before 15.1X49-D10, when configured for IPv6, allow remote attackers to cause a denial of service (mbuf chain corruption and kernel panic) via crafted IPv6 packets.\"},{\"lang\":\"es\",\"value\":\"Juniper Junos SO en versiones anteriores a 11.4R12-S4, 12.1X44 en versiones anteriores a 12.1X44-D41, 12.1X46 en versiones anteriores a 12.1X46-D26, 12.1X47 en versiones anteriores a 12.1X47-D11/D15, 12.2 en versiones anteriores a 12.2R9, 12.2X50 en versiones anteriores a 12.2X50-D70, 12.3 en versiones anteriores a 12.3R8, 12.3X48 en versiones anteriores a 12.3X48-D10, 12.3X50 en versiones anteriores a 12.3X50-D42, 13.1 en versiones anteriores a 13.1R4-S3, 13.1X49 en versiones anteriores a 13.1X49-D42, 13.1X50 en versiones anteriores a 13.1X50-D30, 13.2 en versiones anteriores a 13.2R6, 13.2X51 en versiones anteriores a 13.2X51-D26, 13.2X52 en versiones anteriores a 13.2X52-D15, 13.3 en versiones anteriores a 13.3R3-S3, 14.1 en versiones anteriores a 14.1R3, 14.2 en versiones anteriores a 14.2R1, 15.1 en versiones anteriores a 15.1R1 y 15.1X49 en versiones anteriores a 15.1X49-D10, cuando est\u00e1 configurado para IPv6, permite a atacantes remotos provocar una denegaci\u00f3n de servicio (corrupci\u00f3n de la cadena mbuf y kernel panic) a trav\u00e9s de paquetes IPv6 manipulados.\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:N/I:N/A:C\",\"baseScore\":7.8,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"COMPLETE\"},\"baseSeverity\":\"HIGH\",\"exploitabilityScore\":10.0,\"impactScore\":6.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-119\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos:12.1x44:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1B307477-C5F2-4D98-AF4C-640D326164C7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos:12.1x44:d10:*:*:*:*:*:*\",\"matchCriteriaId\":\"AC405A12-112D-4C9D-90DA-6ED484109793\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos:12.1x44:d15:*:*:*:*:*:*\",\"matchCriteriaId\":\"3FC42F2D-7593-4DBE-AE89-A6B78E7F9089\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos:12.1x44:d20:*:*:*:*:*:*\",\"matchCriteriaId\":\"731A6469-3DE0-491A-BCC5-7642FB347ACE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos:12.1x44:d25:*:*:*:*:*:*\",\"matchCriteriaId\":\"D12A8119-3E59-4062-9A04-1F6EA48B78E9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos:12.1x44:d30:*:*:*:*:*:*\",\"matchCriteriaId\":\"E8B33B80-3189-4412-BFE0-359E755AB07A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos:12.1x44:d35:*:*:*:*:*:*\",\"matchCriteriaId\":\"C0E8F87E-DEB2-4849-ABB5-75A67CFD2D39\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos:12.1x44:d40:*:*:*:*:*:*\",\"matchCriteriaId\":\"BDE231CE-0D93-4293-8720-4CCEE2EA651E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos:12.1x46:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CFB89F64-16BB-4A14-9084-B338668D7FF1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos:12.1x46:d10:*:*:*:*:*:*\",\"matchCriteriaId\":\"A71742CF-50B1-44BB-AB7B-27E5DCC9CF70\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos:12.1x46:d15:*:*:*:*:*:*\",\"matchCriteriaId\":\"4FD4237A-C257-4D8A-ABC4-9B2160530A4E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos:12.1x46:d20:*:*:*:*:*:*\",\"matchCriteriaId\":\"5A449C87-C5C3-48FE-9E46-64ED5DD5F193\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos:12.1x46:d25:*:*:*:*:*:*\",\"matchCriteriaId\":\"F4B6215F-76BF-473F-B325-0975B0EB101E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos:12.1x47:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0BB3DE56-1B04-4A53-B4A4-93286FC98463\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos:12.1x47:d10:*:*:*:*:*:*\",\"matchCriteriaId\":\"181C0D30-4476-48EE-A4A4-3B2461F4AC20\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos:12.1x47:d15:*:*:*:*:*:*\",\"matchCriteriaId\":\"63F559A2-2744-4771-9420-C70AA87496A2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos:12.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5FB9541A-2570-459A-87D6-5341C67B8EC8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos:12.2:r1:*:*:*:*:*:*\",\"matchCriteriaId\":\"43B661F8-1F43-4073-9275-AE1FFCB17BF8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos:12.2:r2:*:*:*:*:*:*\",\"matchCriteriaId\":\"EF88921E-18E4-49B2-AAF4-ED8C393D4750\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos:12.2:r3:*:*:*:*:*:*\",\"matchCriteriaId\":\"144DA08B-A129-4DC6-81D2-782BD7C3074B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos:12.2:r4:*:*:*:*:*:*\",\"matchCriteriaId\":\"F1936A41-302E-4546-9F7A-CAE3A3C68718\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos:12.2:r5:*:*:*:*:*:*\",\"matchCriteriaId\":\"6EB55673-5857-452F-9D22-B422CC9CC3F3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos:12.2:r6:*:*:*:*:*:*\",\"matchCriteriaId\":\"03D4519D-1289-47E9-BFB7-E3831BFD50F6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos:12.2:r7:*:*:*:*:*:*\",\"matchCriteriaId\":\"77CDB10F-3BCE-41AF-B633-DFAC9B8A5D9F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos:12.2:r8:*:*:*:*:*:*\",\"matchCriteriaId\":\"B795A4AD-38A1-470B-86B2-872011C80DB3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos:12.2x65:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"850822F5-7242-43DB-8879-3EB2DBE9CE65\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos:12.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8E014A0D-0054-4EBA-BA1F-035B74BD822F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos:12.3:r1:*:*:*:*:*:*\",\"matchCriteriaId\":\"371A7DF8-3F4B-439D-8990-D1BC6F0C25C5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos:12.3:r2:*:*:*:*:*:*\",\"matchCriteriaId\":\"7CC3BCFD-2B0F-4994-9FE4-9D37FA85F1E2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos:12.3:r3:*:*:*:*:*:*\",\"matchCriteriaId\":\"C6F309FD-0A5A-4C86-B227-B2B511A5CEB4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos:12.3:r4:*:*:*:*:*:*\",\"matchCriteriaId\":\"960059B5-0701-4B75-AB51-0A430247D9F0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos:12.3:r5:*:*:*:*:*:*\",\"matchCriteriaId\":\"1D1DCA52-DA81-495B-B516-5571F01E3B0A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos:12.3:r6:*:*:*:*:*:*\",\"matchCriteriaId\":\"05E187F6-BACD-4DD5-B393-B2FE4349053A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos:12.3:r7:*:*:*:*:*:*\",\"matchCriteriaId\":\"3C240840-A6BC-4E3D-A60D-22F08E67E2B2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos:12.3x48:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7192552C-7D4A-4D95-BA79-CDF465E27D37\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos:12.3x48:d5:*:*:*:*:*:*\",\"matchCriteriaId\":\"45380883-DDAD-4046-AE92-9E030371B84F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos:12.3x50:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BBB34C84-9E55-4D35-95DB-636E50275F5C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos:12.3x50:d20:*:*:*:*:*:*\",\"matchCriteriaId\":\"477E6DE9-56BE-4CFC-8F77-7291188E9282\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos:12.3x50:d30:*:*:*:*:*:*\",\"matchCriteriaId\":\"CEFB27DC-45E9-48B9-8B9B-B0C516121521\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos:12.3x50:d35:*:*:*:*:*:*\",\"matchCriteriaId\":\"8776AC92-27B9-492F-8B8A-3DEA37C1005F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos:12.3x50:d40:*:*:*:*:*:*\",\"matchCriteriaId\":\"54409F06-DD6F-448B-A3F8-07877C03775A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos:13.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"71FB12AC-DB5A-444A-81E0-C0DDD06810EB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos:13.1:r1:*:*:*:*:*:*\",\"matchCriteriaId\":\"FCD4D8EB-8625-47CD-8F0E-D2FC8CAA5462\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos:13.1:r2:*:*:*:*:*:*\",\"matchCriteriaId\":\"A0150A4C-2C5A-49FC-8FB3-B93CB45B8284\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos:13.1:r3:*:*:*:*:*:*\",\"matchCriteriaId\":\"BFEB7A59-7536-4A92-A9C8-79FDE657B8AB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos:13.1:r4:*:*:*:*:*:*\",\"matchCriteriaId\":\"AD9ADCD2-DC32-4724-8324-60246E8BC953\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos:13.1:r4-s2:*:*:*:*:*:*\",\"matchCriteriaId\":\"08BC545E-EBE1-45EB-9D1E-9CAEF52E7C6D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos:13.1x49:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C71D3BA8-DA7D-46EF-8E2C-63DD630B7A48\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos:13.1x49:d45:*:*:*:*:*:*\",\"matchCriteriaId\":\"D55E93B6-33FE-4120-8387-5ECAB60002D0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos:13.1x50:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"016DCFD8-9E72-4857-AE98-42F7BB581903\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos:13.1x50:d25:*:*:*:*:*:*\",\"matchCriteriaId\":\"6863F885-C2A2-48AA-969E-CC4E6BFA2C2D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos:13.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CAB7D840-9469-4CE2-8DBF-017A44741374\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos:13.2:r1:*:*:*:*:*:*\",\"matchCriteriaId\":\"D3A0A607-7D3C-4F2A-B5F5-576A70649CB1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos:13.2:r2:*:*:*:*:*:*\",\"matchCriteriaId\":\"32E9620A-7C0A-474C-919E-13609FFE580D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos:13.2:r3:*:*:*:*:*:*\",\"matchCriteriaId\":\"672D3A38-92B4-4F33-82A6-B2D3F3403AF3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos:13.2:r4:*:*:*:*:*:*\",\"matchCriteriaId\":\"F5C24441-6E9D-4EF7-8903-A109A52340C0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos:13.2:r5:*:*:*:*:*:*\",\"matchCriteriaId\":\"7CB98C4F-617F-4F51-A86E-D1EBE2BDE583\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos:13.2x51:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8B73BE56-F298-4EC5-88A3-D9808B89B63B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos:13.2x51:d10:*:*:*:*:*:*\",\"matchCriteriaId\":\"62B55703-15BC-409B-ACF0-CD5671B9E372\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos:13.2x51:d15:*:*:*:*:*:*\",\"matchCriteriaId\":\"3947A516-2054-48B3-ADFD-3CF88EC2288D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos:13.2x51:d20:*:*:*:*:*:*\",\"matchCriteriaId\":\"D0951235-4A0A-4200-A7B1-9FF4540A3755\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos:13.2x51:d25:*:*:*:*:*:*\",\"matchCriteriaId\":\"7478F581-8A89-49D7-B9F9-E0E90BEEAEE0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos:13.2x52:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E69CA1E9-4416-4DEC-BF97-C22C615385BC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos:13.2x52:d10:*:*:*:*:*:*\",\"matchCriteriaId\":\"1864A2D2-1FE6-4282-BB47-F5F18296D5B3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos:13.2x52:d15:*:*:*:*:*:*\",\"matchCriteriaId\":\"40267E6E-B87C-4ECD-80F7-5B0E8E1D38A3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos:13.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E4AF5DAA-62F5-491F-A9CE-098970671D43\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos:13.3:r1:*:*:*:*:*:*\",\"matchCriteriaId\":\"3FF9FF91-9184-4D18-8288-9110E35F4AE5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos:13.3:r2:*:*:*:*:*:*\",\"matchCriteriaId\":\"0F2E537B-9504-4912-B231-0D83F4459469\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos:13.3:r3:*:*:*:*:*:*\",\"matchCriteriaId\":\"4BCB3837-DCBC-4997-B63E-E47957584709\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos:14.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6237291A-B861-4D53-B7AA-C53A44B76896\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos:14.1:r1:*:*:*:*:*:*\",\"matchCriteriaId\":\"9C778627-820A-48F5-9680-0205D6DB5EB6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos:14.1:r2:*:*:*:*:*:*\",\"matchCriteriaId\":\"FA7F03DC-73A2-4760-B386-2A57E9C97E65\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos:14.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D59449C6-5BD5-4C07-AEF6-EEBC70D9C4C7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos:15.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BD0952C4-FFCC-4A78-ADFC-289BD6E269DB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos:15.1x49:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"20DABA6A-FA7A-4289-8C6A-2B93689A5440\"}]}]}],\"references\":[{\"url\":\"http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10699\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.securitytracker.com/id/1033855\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10699\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.securitytracker.com/id/1033855\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}"
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.


Loading…

Loading…