Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2014-4478 (GCVE-0-2014-4478)
Vulnerability from cvelistv5
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual who requested this candidate did not associate it with any vulnerability during 2014. Notes: none
Show details on NVD website{ "containers": { "cna": { "providerMetadata": { "dateUpdated": "2017-05-11T13:57:01", "orgId": "286789f9-fbc2-4510-9f9a-43facdede74c", "shortName": "apple" }, "rejectedReasons": [ { "lang": "en", "value": "DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual who requested this candidate did not associate it with any vulnerability during 2014. Notes: none" } ] } }, "cveMetadata": { "assignerOrgId": "286789f9-fbc2-4510-9f9a-43facdede74c", "assignerShortName": "apple", "cveId": "CVE-2014-4478", "datePublished": "2017-05-11T14:01:00", "dateRejected": "2017-05-11T13:57:01", "dateReserved": "2014-06-20T00:00:00", "dateUpdated": "2017-05-11T13:57:01", "state": "REJECTED" }, "dataType": "CVE_RECORD", "dataVersion": "5.0", "vulnerability-lookup:meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2014-4478\",\"sourceIdentifier\":\"product-security@apple.com\",\"published\":\"2017-05-11T14:29:35.840\",\"lastModified\":\"2023-11-07T02:20:34.130\",\"vulnStatus\":\"Rejected\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual who requested this candidate did not associate it with any vulnerability during 2014. Notes: none\"}],\"metrics\":{},\"references\":[]}}" } }
CERTFR-2015-AVI-146
Vulnerability from certfr_avis
De multiples vulnérabilités ont été corrigées dans les produits Juniper. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service à distance et un déni de service.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
NoneImpacted products
Vendor | Product | Description | ||
---|---|---|---|---|
Juniper Networks | N/A | Juniper NSM versions antérieures à 2012.2R12 | ||
Juniper Networks | Junos OS | Juniper Junos OS versions antérieures à 12.3R9 | ||
Juniper Networks | N/A | Juniper CTPOS versions antérieures à 6.6R5 | ||
Juniper Networks | Junos OS | Juniper Junos OS versions antérieures à 12.2X50-D70 | ||
Juniper Networks | Junos OS | Juniper Junos OS versions antérieures à 11.4R12 | ||
Juniper Networks | Junos OS | Juniper Junos OS versions antérieures à 13.2X51-D30 | ||
Juniper Networks | Junos OS | Juniper Junos OS versions antérieures à 12.3R7 | ||
Juniper Networks | N/A | Juniper NSM versions antérieures à 2012.2R11 | ||
Juniper Networks | Junos OS | Juniper Junos OS versions antérieures à 12.3R10 | ||
Juniper Networks | Junos OS | Juniper Junos OS versions antérieures à 13.2R6 | ||
Juniper Networks | N/A | Juniper CTPView versions antérieures à 7.1R1 | ||
Juniper Networks | Junos OS | Juniper Junos OS versions antérieures à 13.3R6 | ||
Juniper Networks | Junos OS | Juniper Junos OS versions antérieures à 14.2R1 | ||
Juniper Networks | Junos OS | Juniper Junos OS versions antérieures à 12.3X48-D10 | ||
Juniper Networks | N/A | Juniper CTPOS versions antérieures à 7.0R4 | ||
Juniper Networks | Junos OS | Juniper Junos OS versions antérieures à 14.1X53-D10 | ||
Juniper Networks | Junos OS | Juniper Junos OS versions antérieures à 12.1X46-D35 | ||
Juniper Networks | Junos OS | Juniper Junos OS versions antérieures à 12.1X47-D25 | ||
Juniper Networks | Junos OS | Juniper Junos OS versions antérieures à 14.1R5 | ||
Juniper Networks | N/A | Juniper CTPOS versions antérieures à 7.1R1 | ||
Juniper Networks | Junos OS | Juniper Junos OS versions antérieures à 12.1X44-D50 | ||
Juniper Networks | Junos OS | Juniper Junos OS versions antérieures à 13.3R5 | ||
Juniper Networks | Junos OS | Juniper Junos OS versions antérieures à 13.2X52-D15 | ||
Juniper Networks | Junos OS | Juniper Junos OS versions antérieures à 14.1R3 | ||
Juniper Networks | Junos OS | Juniper Junos OS versions antérieures à 14.2R3 | ||
Juniper Networks | Junos OS | Juniper Junos OS versions antérieures à 13.2R8 | ||
Juniper Networks | Junos OS | Juniper Junos OS versions antérieures à 12.2R9 | ||
Juniper Networks | Junos OS | Juniper Junos OS versions antérieures à 13.1X50-D30 | ||
Juniper Networks | N/A | Juniper IDP OS versions antérieures à 5.1r4 |
References
Title | Publication Time | Tags | |||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "$ref": "https://www.cert.ssi.gouv.fr/openapi.json", "affected_systems": [ { "description": "Juniper NSM versions ant\u00e9rieures \u00e0 2012.2R12", "product": { "name": "N/A", "vendor": { "name": "Juniper Networks", "scada": false } } }, { "description": "Juniper Junos OS versions ant\u00e9rieures \u00e0 12.3R9", "product": { "name": "Junos OS", "vendor": { "name": "Juniper Networks", "scada": false } } }, { "description": "Juniper CTPOS versions ant\u00e9rieures \u00e0 6.6R5", "product": { "name": "N/A", "vendor": { "name": "Juniper Networks", "scada": false } } }, { "description": "Juniper Junos OS versions ant\u00e9rieures \u00e0 12.2X50-D70", "product": { "name": "Junos OS", "vendor": { "name": "Juniper Networks", "scada": false } } }, { "description": "Juniper Junos OS versions ant\u00e9rieures \u00e0 11.4R12", "product": { "name": "Junos OS", "vendor": { "name": "Juniper Networks", "scada": false } } }, { "description": "Juniper Junos OS versions ant\u00e9rieures \u00e0 13.2X51-D30", "product": { "name": "Junos OS", "vendor": { "name": "Juniper Networks", "scada": false } } }, { "description": "Juniper Junos OS versions ant\u00e9rieures \u00e0 12.3R7", "product": { "name": "Junos OS", "vendor": { "name": "Juniper Networks", "scada": false } } }, { "description": "Juniper NSM versions ant\u00e9rieures \u00e0 2012.2R11", "product": { "name": "N/A", "vendor": { "name": "Juniper Networks", "scada": false } } }, { "description": "Juniper Junos OS versions ant\u00e9rieures \u00e0 12.3R10", "product": { "name": "Junos OS", "vendor": { "name": "Juniper Networks", "scada": false } } }, { "description": "Juniper Junos OS versions ant\u00e9rieures \u00e0 13.2R6", "product": { "name": "Junos OS", "vendor": { "name": "Juniper Networks", "scada": false } } }, { "description": "Juniper CTPView versions ant\u00e9rieures \u00e0 7.1R1", "product": { "name": "N/A", "vendor": { "name": "Juniper Networks", "scada": false } } }, { "description": "Juniper Junos OS versions ant\u00e9rieures \u00e0 13.3R6", "product": { "name": "Junos OS", "vendor": { "name": "Juniper Networks", "scada": false } } }, { "description": "Juniper Junos OS versions ant\u00e9rieures \u00e0 14.2R1", "product": { "name": "Junos OS", "vendor": { "name": "Juniper Networks", "scada": false } } }, { "description": "Juniper Junos OS versions ant\u00e9rieures \u00e0 12.3X48-D10", "product": { "name": "Junos OS", "vendor": { "name": "Juniper Networks", "scada": false } } }, { "description": "Juniper CTPOS versions ant\u00e9rieures \u00e0 7.0R4", "product": { "name": "N/A", "vendor": { "name": "Juniper Networks", "scada": false } } }, { "description": "Juniper Junos OS versions ant\u00e9rieures \u00e0 14.1X53-D10", "product": { "name": "Junos OS", "vendor": { "name": "Juniper Networks", "scada": false } } }, { "description": "Juniper Junos OS versions ant\u00e9rieures \u00e0 12.1X46-D35", "product": { "name": "Junos OS", "vendor": { "name": "Juniper Networks", "scada": false } } }, { "description": "Juniper Junos OS versions ant\u00e9rieures \u00e0 12.1X47-D25", "product": { "name": "Junos OS", "vendor": { "name": "Juniper Networks", "scada": false } } }, { "description": "Juniper Junos OS versions ant\u00e9rieures \u00e0 14.1R5", "product": { "name": "Junos OS", "vendor": { "name": "Juniper Networks", "scada": false } } }, { "description": "Juniper CTPOS versions ant\u00e9rieures \u00e0 7.1R1", "product": { "name": "N/A", "vendor": { "name": "Juniper Networks", "scada": false } } }, { "description": "Juniper Junos OS versions ant\u00e9rieures \u00e0 12.1X44-D50", "product": { "name": "Junos OS", "vendor": { "name": "Juniper Networks", "scada": false } } }, { "description": "Juniper Junos OS versions ant\u00e9rieures \u00e0 13.3R5", "product": { "name": "Junos OS", "vendor": { "name": "Juniper Networks", "scada": false } } }, { "description": "Juniper Junos OS versions ant\u00e9rieures \u00e0 13.2X52-D15", "product": { "name": "Junos OS", "vendor": { "name": "Juniper Networks", "scada": false } } }, { "description": "Juniper Junos OS versions ant\u00e9rieures \u00e0 14.1R3", "product": { "name": "Junos OS", "vendor": { "name": "Juniper Networks", "scada": false } } }, { "description": "Juniper Junos OS versions ant\u00e9rieures \u00e0 14.2R3", "product": { "name": "Junos OS", "vendor": { "name": "Juniper Networks", "scada": false } } }, { "description": "Juniper Junos OS versions ant\u00e9rieures \u00e0 13.2R8", "product": { "name": "Junos OS", "vendor": { "name": "Juniper Networks", "scada": false } } }, { "description": "Juniper Junos OS versions ant\u00e9rieures \u00e0 12.2R9", "product": { "name": "Junos OS", "vendor": { "name": "Juniper Networks", "scada": false } } }, { "description": "Juniper Junos OS versions ant\u00e9rieures \u00e0 13.1X50-D30", "product": { "name": "Junos OS", "vendor": { "name": "Juniper Networks", "scada": false } } }, { "description": "Juniper IDP OS versions ant\u00e9rieures \u00e0 5.1r4", "product": { "name": "N/A", "vendor": { "name": "Juniper Networks", "scada": false } } } ], "affected_systems_content": null, "content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n", "cves": [ { "name": "CVE-2015-0208", "url": "https://www.cve.org/CVERecord?id=CVE-2015-0208" }, { "name": "CVE-2015-0292", "url": "https://www.cve.org/CVERecord?id=CVE-2015-0292" }, { "name": "CVE-2014-3571", "url": "https://www.cve.org/CVERecord?id=CVE-2014-3571" }, { "name": "CVE-2015-0286", "url": "https://www.cve.org/CVERecord?id=CVE-2015-0286" }, { "name": "CVE-2015-3002", "url": "https://www.cve.org/CVERecord?id=CVE-2015-3002" }, { "name": "CVE-2014-3570", "url": "https://www.cve.org/CVERecord?id=CVE-2014-3570" }, { "name": "CVE-2015-3004", "url": "https://www.cve.org/CVERecord?id=CVE-2015-3004" }, { "name": "CVE-2009-3563", "url": "https://www.cve.org/CVERecord?id=CVE-2009-3563" }, { "name": "CVE-2015-0288", "url": "https://www.cve.org/CVERecord?id=CVE-2015-0288" }, { "name": "CVE-2015-0206", "url": "https://www.cve.org/CVERecord?id=CVE-2015-0206" }, { "name": "CVE-2015-0290", "url": "https://www.cve.org/CVERecord?id=CVE-2015-0290" }, { "name": "CVE-2014-6271", "url": "https://www.cve.org/CVERecord?id=CVE-2014-6271" }, { "name": "CVE-2012-5195", "url": "https://www.cve.org/CVERecord?id=CVE-2012-5195" }, { "name": "CVE-2011-0539", "url": "https://www.cve.org/CVERecord?id=CVE-2011-0539" }, { "name": "CVE-2015-0207", "url": "https://www.cve.org/CVERecord?id=CVE-2015-0207" }, { "name": "CVE-2010-4478", "url": "https://www.cve.org/CVERecord?id=CVE-2010-4478" }, { "name": "CVE-2015-0285", "url": "https://www.cve.org/CVERecord?id=CVE-2015-0285" }, { "name": "CVE-2014-4478", "url": "https://www.cve.org/CVERecord?id=CVE-2014-4478" }, { "name": "CVE-2015-3003", "url": "https://www.cve.org/CVERecord?id=CVE-2015-3003" }, { "name": "CVE-2012-0814", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0814" }, { "name": "CVE-2015-0204", "url": "https://www.cve.org/CVERecord?id=CVE-2015-0204" }, { "name": "CVE-2015-0293", "url": "https://www.cve.org/CVERecord?id=CVE-2015-0293" }, { "name": "CVE-2015-0287", "url": "https://www.cve.org/CVERecord?id=CVE-2015-0287" }, { "name": "CVE-2015-1787", "url": "https://www.cve.org/CVERecord?id=CVE-2015-1787" }, { "name": "CVE-2014-8275", "url": "https://www.cve.org/CVERecord?id=CVE-2014-8275" }, { "name": "CVE-2015-0205", "url": "https://www.cve.org/CVERecord?id=CVE-2015-0205" }, { "name": "CVE-2015-0209", "url": "https://www.cve.org/CVERecord?id=CVE-2015-0209" }, { "name": "CVE-2015-0291", "url": "https://www.cve.org/CVERecord?id=CVE-2015-0291" }, { "name": "CVE-2015-0289", "url": "https://www.cve.org/CVERecord?id=CVE-2015-0289" }, { "name": "CVE-2014-3572", "url": "https://www.cve.org/CVERecord?id=CVE-2014-3572" }, { "name": "CVE-2014-3569", "url": "https://www.cve.org/CVERecord?id=CVE-2014-3569" }, { "name": "CVE-2015-3005", "url": "https://www.cve.org/CVERecord?id=CVE-2015-3005" }, { "name": "CVE-2014-8500", "url": "https://www.cve.org/CVERecord?id=CVE-2014-8500" }, { "name": "CVE-2012-2131", "url": "https://www.cve.org/CVERecord?id=CVE-2012-2131" }, { "name": "CVE-2015-3006", "url": "https://www.cve.org/CVERecord?id=CVE-2015-3006" } ], "initial_release_date": "2015-04-13T00:00:00", "last_revision_date": "2015-04-13T00:00:00", "links": [], "reference": "CERTFR-2015-AVI-146", "revisions": [ { "description": "version initiale.", "revision_date": "2015-04-13T00:00:00.000000" } ], "risks": [ { "description": "D\u00e9ni de service \u00e0 distance" }, { "description": "Ex\u00e9cution de code arbitraire \u00e0 distance" }, { "description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es" }, { "description": "Injection de code indirecte \u00e0 distance" }, { "description": "D\u00e9ni de service" }, { "description": "Contournement de la politique de s\u00e9curit\u00e9" }, { "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es" }, { "description": "\u00c9l\u00e9vation de privil\u00e8ges" } ], "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 corrig\u00e9es dans les produits \u003cspan\nclass=\"textit\"\u003eJuniper\u003c/span\u003e. Certaines d\u0027entre elles permettent \u00e0 un\nattaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance, un\nd\u00e9ni de service \u00e0 distance et un d\u00e9ni de service.\n", "title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Juniper", "vendor_advisories": [ { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10679 du 07 avril 2015", "url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10679" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10676 du 07 avril 2015", "url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10676" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10673 du 07 avril 2015", "url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10673" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10672 du 07 avril 2015", "url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10672" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10680 du 07 avril 2015", "url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10680" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10677 du 07 avril 2015", "url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10677" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10678 du 07 avril 2015", "url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10678" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10675 du 07 avril 2015", "url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10675" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10674 du 07 avril 2015", "url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10674" } ] }
fkie_cve-2014-4478
Vulnerability from fkie_nvd
Published
2017-05-11 14:29
Modified
2023-11-07 02:20
Severity ?
Summary
Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual who requested this candidate did not associate it with any vulnerability during 2014. Notes: none
References
URL | Tags |
---|
Impacted products
Vendor | Product | Version |
---|
{ "cveTags": [], "descriptions": [ { "lang": "en", "value": "Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual who requested this candidate did not associate it with any vulnerability during 2014. Notes: none" } ], "id": "CVE-2014-4478", "lastModified": "2023-11-07T02:20:34.130", "metrics": {}, "published": "2017-05-11T14:29:35.840", "references": [], "sourceIdentifier": "product-security@apple.com", "vulnStatus": "Rejected" }
gsd-2014-4478
Vulnerability from gsd
Modified
2023-12-13 01:22
Details
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual who requested this candidate did not associate it with any vulnerability during 2014. Notes: none.
Aliases
Aliases
{ "GSD": { "alias": "CVE-2014-4478", "description": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual who requested this candidate did not associate it with any vulnerability during 2014. Notes: none.", "id": "GSD-2014-4478" }, "gsd": { "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "osvSchema": { "aliases": [ "CVE-2014-4478" ], "details": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual who requested this candidate did not associate it with any vulnerability during 2014. Notes: none.", "id": "GSD-2014-4478", "modified": "2023-12-13T01:22:45.594855Z", "schema_version": "1.4.0" } }, "namespaces": { "cve.org": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2014-4478", "STATE": "REJECT" }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual who requested this candidate did not associate it with any vulnerability during 2014. Notes: none." } ] } } } }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…
Loading…