Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2015-3004 (GCVE-0-2015-3004)
Vulnerability from cvelistv5
- n/a
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T05:32:21.185Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "1032090", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1032090" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10675" }, { "name": "74017", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/74017" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2015-04-08T00:00:00", "descriptions": [ { "lang": "en", "value": "J-Web in Juniper Junos 11.4 before 11.4R12, 12.1X44 before 12.1X44-D35, 12.1X46 before 12.1X46-D25, 12.1X47 before 12.1X47-D10, 12.3X48 before 12.3X48-D10, 12.2 before 12.2R9, 12.3 before 12.3R7, 13.2 before 13.2R6, 13.2X51 before 13.2X51-D20, 13.3 before 13.3R5, 14.1 before 14.1R3, 14.1X53 before 14.1X53-D10, and 14.2 before 14.2R1 allows remote attackers to conduct clickjacking attacks via an X-Frame-Options header." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2016-12-01T15:57:02", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "1032090", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1032090" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10675" }, { "name": "74017", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/74017" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2015-3004", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "J-Web in Juniper Junos 11.4 before 11.4R12, 12.1X44 before 12.1X44-D35, 12.1X46 before 12.1X46-D25, 12.1X47 before 12.1X47-D10, 12.3X48 before 12.3X48-D10, 12.2 before 12.2R9, 12.3 before 12.3R7, 13.2 before 13.2R6, 13.2X51 before 13.2X51-D20, 13.3 before 13.3R5, 14.1 before 14.1R3, 14.1X53 before 14.1X53-D10, and 14.2 before 14.2R1 allows remote attackers to conduct clickjacking attacks via an X-Frame-Options header." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "1032090", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1032090" }, { "name": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10675", "refsource": "CONFIRM", "url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10675" }, { "name": "74017", "refsource": "BID", "url": "http://www.securityfocus.com/bid/74017" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2015-3004", "datePublished": "2015-04-10T14:00:00", "dateReserved": "2015-04-07T00:00:00", "dateUpdated": "2024-08-06T05:32:21.185Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2015-3004\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2015-04-10T15:00:08.693\",\"lastModified\":\"2025-04-12T10:46:40.837\",\"vulnStatus\":\"Deferred\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"J-Web in Juniper Junos 11.4 before 11.4R12, 12.1X44 before 12.1X44-D35, 12.1X46 before 12.1X46-D25, 12.1X47 before 12.1X47-D10, 12.3X48 before 12.3X48-D10, 12.2 before 12.2R9, 12.3 before 12.3R7, 13.2 before 13.2R6, 13.2X51 before 13.2X51-D20, 13.3 before 13.3R5, 14.1 before 14.1R3, 14.1X53 before 14.1X53-D10, and 14.2 before 14.2R1 allows remote attackers to conduct clickjacking attacks via an X-Frame-Options header.\"},{\"lang\":\"es\",\"value\":\"J-Web en Juniper Junos 11.4 anterior a 11.4R12, 12.1X44 anterior a 12.1X44-D35, 12.1X46 anterior a 12.1X46-D25, 12.1X47 anterior a 12.1X47-D10, 12.3X48 anterior a 12.3X48-D10, 12.2 anterior a 12.2R9, 12.3 anterior a 12.3R7, 13.2 anterior a 13.2R6, 13.2X51 anterior a 13.2X51-D20, 13.3 anterior a 13.3R5, 14.1 anterior a 14.1R3, 14.1X53 anterior a 14.1X53-D10, y 14.2 anterior a 14.2R1 permite a atacantes remotos realizar ataques de clickjacking a trav\u00e9s de una cabecera X-Frame-Options.\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:M/Au:N/C:N/I:P/A:N\",\"baseScore\":4.3,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"MEDIUM\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"NONE\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":8.6,\"impactScore\":2.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":true}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-20\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos:12.1x44:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1B307477-C5F2-4D98-AF4C-640D326164C7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos:12.1x44:d10:*:*:*:*:*:*\",\"matchCriteriaId\":\"AC405A12-112D-4C9D-90DA-6ED484109793\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos:12.1x44:d15:*:*:*:*:*:*\",\"matchCriteriaId\":\"3FC42F2D-7593-4DBE-AE89-A6B78E7F9089\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos:12.1x44:d20:*:*:*:*:*:*\",\"matchCriteriaId\":\"731A6469-3DE0-491A-BCC5-7642FB347ACE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos:12.1x44:d25:*:*:*:*:*:*\",\"matchCriteriaId\":\"D12A8119-3E59-4062-9A04-1F6EA48B78E9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos:12.1x44:d30:*:*:*:*:*:*\",\"matchCriteriaId\":\"E8B33B80-3189-4412-BFE0-359E755AB07A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos:12.1x46:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CFB89F64-16BB-4A14-9084-B338668D7FF1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos:12.1x46:d10:*:*:*:*:*:*\",\"matchCriteriaId\":\"A71742CF-50B1-44BB-AB7B-27E5DCC9CF70\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos:12.1x46:d15:*:*:*:*:*:*\",\"matchCriteriaId\":\"4FD4237A-C257-4D8A-ABC4-9B2160530A4E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos:12.1x46:d20:*:*:*:*:*:*\",\"matchCriteriaId\":\"5A449C87-C5C3-48FE-9E46-64ED5DD5F193\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos:12.1x47:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0BB3DE56-1B04-4A53-B4A4-93286FC98463\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos:12.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5FB9541A-2570-459A-87D6-5341C67B8EC8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos:12.2:r1:*:*:*:*:*:*\",\"matchCriteriaId\":\"43B661F8-1F43-4073-9275-AE1FFCB17BF8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos:12.2:r2:*:*:*:*:*:*\",\"matchCriteriaId\":\"EF88921E-18E4-49B2-AAF4-ED8C393D4750\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos:12.2:r3:*:*:*:*:*:*\",\"matchCriteriaId\":\"144DA08B-A129-4DC6-81D2-782BD7C3074B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos:12.2:r4:*:*:*:*:*:*\",\"matchCriteriaId\":\"F1936A41-302E-4546-9F7A-CAE3A3C68718\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos:12.2:r5:*:*:*:*:*:*\",\"matchCriteriaId\":\"6EB55673-5857-452F-9D22-B422CC9CC3F3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos:12.2:r6:*:*:*:*:*:*\",\"matchCriteriaId\":\"03D4519D-1289-47E9-BFB7-E3831BFD50F6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos:12.2:r7:*:*:*:*:*:*\",\"matchCriteriaId\":\"77CDB10F-3BCE-41AF-B633-DFAC9B8A5D9F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos:12.2:r8:*:*:*:*:*:*\",\"matchCriteriaId\":\"B795A4AD-38A1-470B-86B2-872011C80DB3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos:12.2:r8-s2:*:*:*:*:*:*\",\"matchCriteriaId\":\"A89F7B01-F83C-426B-A555-A553479CB0F3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos:12.3:r1:*:*:*:*:*:*\",\"matchCriteriaId\":\"371A7DF8-3F4B-439D-8990-D1BC6F0C25C5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos:12.3:r2:*:*:*:*:*:*\",\"matchCriteriaId\":\"7CC3BCFD-2B0F-4994-9FE4-9D37FA85F1E2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos:12.3:r3:*:*:*:*:*:*\",\"matchCriteriaId\":\"C6F309FD-0A5A-4C86-B227-B2B511A5CEB4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos:12.3:r4:*:*:*:*:*:*\",\"matchCriteriaId\":\"960059B5-0701-4B75-AB51-0A430247D9F0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos:12.3:r5:*:*:*:*:*:*\",\"matchCriteriaId\":\"1D1DCA52-DA81-495B-B516-5571F01E3B0A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos:12.3:r6:*:*:*:*:*:*\",\"matchCriteriaId\":\"05E187F6-BACD-4DD5-B393-B2FE4349053A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos:12.3x48:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7192552C-7D4A-4D95-BA79-CDF465E27D37\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos:13.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CAB7D840-9469-4CE2-8DBF-017A44741374\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos:13.2:r1:*:*:*:*:*:*\",\"matchCriteriaId\":\"D3A0A607-7D3C-4F2A-B5F5-576A70649CB1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos:13.2:r2:*:*:*:*:*:*\",\"matchCriteriaId\":\"32E9620A-7C0A-474C-919E-13609FFE580D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos:13.2:r3:*:*:*:*:*:*\",\"matchCriteriaId\":\"672D3A38-92B4-4F33-82A6-B2D3F3403AF3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos:13.2:r4:*:*:*:*:*:*\",\"matchCriteriaId\":\"F5C24441-6E9D-4EF7-8903-A109A52340C0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos:13.2:r5:*:*:*:*:*:*\",\"matchCriteriaId\":\"7CB98C4F-617F-4F51-A86E-D1EBE2BDE583\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos:13.2x51:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8B73BE56-F298-4EC5-88A3-D9808B89B63B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos:13.2x51:d10:*:*:*:*:*:*\",\"matchCriteriaId\":\"62B55703-15BC-409B-ACF0-CD5671B9E372\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos:13.2x51:d15:*:*:*:*:*:*\",\"matchCriteriaId\":\"3947A516-2054-48B3-ADFD-3CF88EC2288D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos:13.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E4AF5DAA-62F5-491F-A9CE-098970671D43\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos:13.3:r1:*:*:*:*:*:*\",\"matchCriteriaId\":\"3FF9FF91-9184-4D18-8288-9110E35F4AE5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos:13.3:r2:*:*:*:*:*:*\",\"matchCriteriaId\":\"0F2E537B-9504-4912-B231-0D83F4459469\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos:13.3:r2-s2:*:*:*:*:*:*\",\"matchCriteriaId\":\"99A946CE-FFC7-4F16-82F4-795A6E5B84C2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos:13.3:r3:*:*:*:*:*:*\",\"matchCriteriaId\":\"4BCB3837-DCBC-4997-B63E-E47957584709\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos:13.3:r4:*:*:*:*:*:*\",\"matchCriteriaId\":\"6C88E2B1-469B-442B-9FC0-7C9408CE3917\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos:14.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6237291A-B861-4D53-B7AA-C53A44B76896\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos:14.1:r1:*:*:*:*:*:*\",\"matchCriteriaId\":\"9C778627-820A-48F5-9680-0205D6DB5EB6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos:14.1:r2:*:*:*:*:*:*\",\"matchCriteriaId\":\"FA7F03DC-73A2-4760-B386-2A57E9C97E65\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos:14.1x53:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9C7FCCC1-B151-465A-8327-26DB5DC074F0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos:14.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D59449C6-5BD5-4C07-AEF6-EEBC70D9C4C7\"}]}]}],\"references\":[{\"url\":\"http://www.securityfocus.com/bid/74017\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.securitytracker.com/id/1032090\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10675\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.securityfocus.com/bid/74017\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securitytracker.com/id/1032090\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10675\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]}]}}" } }
cnvd-2015-02392
Vulnerability from cnvd
目前厂商已经发布了升级补丁以修复这个安全问题,请到厂商的主页下载: https://kb.juniper.net/InfoCenter/index?page=content&id=JSA10675
Name | ['Juniper Junos 12.1X44(<12.1X44-D45)', 'Juniper Junos 12.1X46(<12.1X46-D30)', 'Juniper Junos 12.1X47(<12.1X47-D20)', 'Juniper Junos 12.3X48(<12.3X48-D10)', 'Juniper Junos 11.4(<11.4R12)', 'Juniper Junos 12.2(<12.2R9)', 'Juniper Junos 12.3(<12.3R7)', 'Juniper Junos 13.2(<13.2R6)', 'Juniper Junos 13.2X51(<13.2X51-D20)', 'Juniper Junos 13.3(<13.3R5)', 'Juniper Junos 14.1(<14.1R3)', 'Juniper Junos 14.1X53(<14.1X53-D10)', 'Juniper Junos 14.2(<14.2R1)'] |
---|
{ "bids": { "bid": { "bidNumber": "74017" } }, "cves": { "cve": { "cveNumber": "CVE-2015-3004" } }, "description": "Juniper Networks JUNOS\u662f\u4e00\u6b3eJuniper\u7f51\u7edc\u516c\u53f8\u7684\u7cfb\u5217\u8fb9\u754c\u8def\u7531\u5668\u7b49\u6240\u8fd0\u884c\u7684\u64cd\u4f5c\u7cfb\u7edf\u3002\r\n\r\nJuniper Networks JUNOS\u5b58\u5728\u5b89\u5168\u6f0f\u6d1e\uff0c\u5141\u8bb8\u8fdc\u7a0b\u653b\u51fb\u8005\u5229\u7528\u6f0f\u6d1e\u901a\u8fc7X-Frame-Options\u8fdb\u884c\u70b9\u51fb\u52ab\u6301\u653b\u51fb\u3002", "discovererName": "Juniper", "formalWay": "\u76ee\u524d\u5382\u5546\u5df2\u7ecf\u53d1\u5e03\u4e86\u5347\u7ea7\u8865\u4e01\u4ee5\u4fee\u590d\u8fd9\u4e2a\u5b89\u5168\u95ee\u9898\uff0c\u8bf7\u5230\u5382\u5546\u7684\u4e3b\u9875\u4e0b\u8f7d\uff1a\r\nhttps://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10675", "isEvent": "\u901a\u7528\u8f6f\u786c\u4ef6\u6f0f\u6d1e", "number": "CNVD-2015-02392", "openTime": "2015-04-14", "patchDescription": "Juniper Networks JUNOS\u662f\u4e00\u6b3eJuniper\u7f51\u7edc\u516c\u53f8\u7684\u7cfb\u5217\u8fb9\u754c\u8def\u7531\u5668\u7b49\u6240\u8fd0\u884c\u7684\u64cd\u4f5c\u7cfb\u7edf\u3002\r\n\r\nJuniper Networks JUNOS\u5b58\u5728\u5b89\u5168\u6f0f\u6d1e\uff0c\u5141\u8bb8\u8fdc\u7a0b\u653b\u51fb\u8005\u5229\u7528\u6f0f\u6d1e\u901a\u8fc7X-Frame-Options\u8fdb\u884c\u70b9\u51fb\u52ab\u6301\u653b\u51fb\u3002\u76ee\u524d\uff0c\u4f9b\u5e94\u5546\u53d1\u5e03\u4e86\u5b89\u5168\u516c\u544a\u53ca\u76f8\u5173\u8865\u4e01\u4fe1\u606f\uff0c\u4fee\u590d\u4e86\u6b64\u6f0f\u6d1e\u3002", "patchName": "Juniper Junos J-Web\u70b9\u51fb\u52ab\u6301\u6f0f\u6d1e\u7684\u8865\u4e01", "products": { "product": [ "Juniper Junos 12.1X44\uff08\u003c12.1X44-D45\uff09", "Juniper Junos 12.1X46\uff08\u003c12.1X46-D30\uff09", "Juniper Junos 12.1X47\uff08\u003c12.1X47-D20\uff09", "Juniper Junos 12.3X48\uff08\u003c12.3X48-D10\uff09", "Juniper Junos 11.4(\u003c11.4R12)", "Juniper Junos 12.2(\u003c12.2R9)", "Juniper Junos 12.3(\u003c12.3R7)", "Juniper Junos 13.2(\u003c13.2R6)", "Juniper Junos 13.2X51(\u003c13.2X51-D20)", "Juniper Junos 13.3(\u003c13.3R5)", "Juniper Junos 14.1(\u003c14.1R3)", "Juniper Junos 14.1X53(\u003c14.1X53-D10)", "Juniper Junos 14.2(\u003c14.2R1)" ] }, "referenceLink": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10675", "serverity": "\u4e2d", "submitTime": "2015-04-13", "title": "Juniper Junos J-Web\u70b9\u51fb\u52ab\u6301\u6f0f\u6d1e" }
var-201504-0552
Vulnerability from variot
J-Web in Juniper Junos 11.4 before 11.4R12, 12.1X44 before 12.1X44-D35, 12.1X46 before 12.1X46-D25, 12.1X47 before 12.1X47-D10, 12.3X48 before 12.3X48-D10, 12.2 before 12.2R9, 12.3 before 12.3R7, 13.2 before 13.2R6, 13.2X51 before 13.2X51-D20, 13.3 before 13.3R5, 14.1 before 14.1R3, 14.1X53 before 14.1X53-D10, and 14.2 before 14.2R1 allows remote attackers to conduct clickjacking attacks via an X-Frame-Options header. Juniper Junos J-Web is prone to a clickjacking vulnerability because it fails to perform validity checks on certain user actions through HTTP requests. Successful exploits will allow an attacker to compromise the affected application or obtain sensitive information. Other attacks are also possible. Juniper Networks Junos is a set of network operating system of Juniper Networks (Juniper Networks) dedicated to the company's hardware system. The operating system provides a secure programming interface and Junos SDK. J-Web is a network management tool for routers or switches using Junos. A security vulnerability exists in J-Web for Juniper Networks Junos. The following versions are affected: Juniper Networks Junos 11.4 before 11.4R12, 12.1X44 before 12.1X44-D35, 12.1X46 before 12.1X46-D25, 12.1X47 before 12.1X47-D10, 12.3X48 before 12.3X48-D10, 12.2 before 12.2R9, 12.3 before 12.3R7, 13.2 before 13.2R6, 13.2X51 before 13.2X51-D20, 13.3 before 13.3R5, 14.1 before 14.1R3, 14.1X53 before 14.1X53-D10, 14.2R1 Prior to version 14.2
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201504-0552", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "junos", "scope": "eq", "trust": 1.9, "vendor": "juniper", "version": "12.2" }, { "model": "junos", "scope": "eq", "trust": 1.9, "vendor": "juniper", "version": "12.1x47" }, { "model": "junos", "scope": "eq", "trust": 1.9, "vendor": "juniper", "version": "12.1x46" }, { "model": "junos", "scope": "eq", "trust": 1.9, "vendor": "juniper", "version": "12.1x44" }, { "model": "junos", "scope": "eq", "trust": 1.3, "vendor": "juniper", "version": "14.1" }, { "model": "junos", "scope": "eq", "trust": 1.3, "vendor": "juniper", "version": "13.3" }, { "model": "junos", "scope": "eq", "trust": 1.3, "vendor": "juniper", "version": "13.2" }, { "model": "junos", "scope": "eq", "trust": 1.3, "vendor": "juniper", "version": "12.3" }, { "model": "junos", "scope": "eq", "trust": 1.0, "vendor": "juniper", "version": "13.2x51" }, { "model": "junos", "scope": "eq", "trust": 1.0, "vendor": "juniper", "version": "14.2" }, { "model": "junos", "scope": "eq", "trust": 1.0, "vendor": "juniper", "version": "12.3x48" }, { "model": "junos", "scope": "eq", "trust": 1.0, "vendor": "juniper", "version": "14.1x53" }, { "model": "junos os", "scope": "lt", "trust": 0.8, "vendor": "juniper", "version": "12.1x44" }, { "model": "junos os", "scope": "lt", "trust": 0.8, "vendor": "juniper", "version": "12.3x48" }, { "model": "junos os", "scope": "eq", "trust": 0.8, "vendor": "juniper", "version": "13.2r6" }, { "model": "junos os", "scope": "lt", "trust": 0.8, "vendor": "juniper", "version": "11.4" }, { "model": "junos os", "scope": "eq", "trust": 0.8, "vendor": "juniper", "version": "13.3r5" }, { "model": "junos os", "scope": "eq", "trust": 0.8, "vendor": "juniper", "version": "14.1x53-d10" }, { "model": "junos os", "scope": "eq", "trust": 0.8, "vendor": "juniper", "version": "11.4r12" }, { "model": "junos os", "scope": "lt", "trust": 0.8, "vendor": "juniper", "version": "12.3" }, { "model": "junos os", "scope": "lt", "trust": 0.8, "vendor": "juniper", "version": "14.2" }, { "model": "junos os", "scope": "lt", "trust": 0.8, "vendor": "juniper", "version": "13.3" }, { "model": "junos os", "scope": "eq", "trust": 0.8, "vendor": "juniper", "version": "13.2x51-d20" }, { "model": "junos os", "scope": "eq", "trust": 0.8, "vendor": "juniper", "version": "12.1x44-d35" }, { "model": "junos os", "scope": "lt", "trust": 0.8, "vendor": "juniper", "version": "13.2" }, { "model": "junos os", "scope": "lt", "trust": 0.8, "vendor": "juniper", "version": "14.1x53" }, { "model": "junos os", "scope": "lt", "trust": 0.8, "vendor": "juniper", "version": "14.1" }, { "model": "junos os", "scope": "eq", "trust": 0.8, "vendor": "juniper", "version": "14.2r1" }, { "model": "junos os", "scope": "lt", "trust": 0.8, "vendor": "juniper", "version": "12.1x46" }, { "model": "junos os", "scope": "lt", "trust": 0.8, "vendor": "juniper", "version": "12.2" }, { "model": "junos os", "scope": "lt", "trust": 0.8, "vendor": "juniper", "version": "12.1x47" }, { "model": "junos os", "scope": "eq", "trust": 0.8, "vendor": "juniper", "version": "12.1x47-d10" }, { "model": "junos os", "scope": "eq", "trust": 0.8, "vendor": "juniper", "version": "12.1x46-d25" }, { "model": "junos os", "scope": "eq", "trust": 0.8, "vendor": "juniper", "version": "14.1r3" }, { "model": "junos os", "scope": "lt", "trust": 0.8, "vendor": "juniper", "version": "13.2x51" }, { "model": "junos os", "scope": "eq", "trust": 0.8, "vendor": "juniper", "version": "12.3x48-d10" }, { "model": "junos os", "scope": "eq", "trust": 0.8, "vendor": "juniper", "version": "12.3r7" }, { "model": "junos os", "scope": "eq", "trust": 0.8, "vendor": "juniper", "version": "12.2r9" }, { "model": "junos 12.1x44-d20", "scope": null, "trust": 0.6, "vendor": "juniper", "version": null }, { "model": "junos", "scope": "eq", "trust": 0.3, "vendor": "juniper", "version": "5.2" }, { "model": "junos", "scope": "eq", "trust": 0.3, "vendor": "juniper", "version": "7.0" }, { "model": "junos 14.1r2", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "junos 14.1r1", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "junos r3", "scope": "eq", "trust": 0.3, "vendor": "juniper", "version": "14.1" }, { "model": "junos r2", "scope": "eq", "trust": 0.3, "vendor": "juniper", "version": "14.1" }, { "model": "junos r1", "scope": "eq", "trust": 0.3, "vendor": "juniper", "version": "14.1" }, { "model": "junos 13.3r6", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "junos 13.3r4", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "junos 13.3r3-s3", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "junos 13.3r3", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "junos 13.3r2-s3", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "junos 13.3r2-s2", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "junos 13.3r2", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "junos 13.3r1.7", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "junos 13.3r1", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "junos r5", "scope": "eq", "trust": 0.3, "vendor": "juniper", "version": "13.3" }, { "model": "junos r4", "scope": "eq", "trust": 0.3, "vendor": "juniper", "version": "13.3" }, { "model": "junos r3", "scope": "eq", "trust": 0.3, "vendor": "juniper", "version": "13.3" }, { "model": "junos r2-s2", "scope": "eq", "trust": 0.3, "vendor": "juniper", "version": "13.3" }, { "model": "junos r2", "scope": "eq", "trust": 0.3, "vendor": "juniper", "version": "13.3" }, { "model": "junos r1", "scope": "eq", "trust": 0.3, "vendor": "juniper", "version": "13.3" }, { "model": "junos 13.2x52-d15", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "junos 13.2x51-d30", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "junos 13.2x51-d27.2", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "junos 13.2x51-d26", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "junos 13.2x51-d25.2", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "junos 13.2x51-d25", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "junos 13.2x51-d15", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "junos 13.2x50-d20", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "junos 13.2x50-d15.3", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "junos 13.2r5", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "junos 13.2r4", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "junos 13.2r3", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "junos 13.2r2-s2", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "junos 13.2r2", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "junos 13.2r1", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "junos r5", "scope": "eq", "trust": 0.3, "vendor": "juniper", "version": "13.2" }, { "model": "junos r4", "scope": "eq", "trust": 0.3, "vendor": "juniper", "version": "13.2" }, { "model": "junos r3", "scope": "eq", "trust": 0.3, "vendor": "juniper", "version": "13.2" }, { "model": "junos r2", "scope": "eq", "trust": 0.3, "vendor": "juniper", "version": "13.2" }, { "model": "junos r1", "scope": "eq", "trust": 0.3, "vendor": "juniper", "version": "13.2" }, { "model": "junos 13.1x50-d30", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "junos 13.1x49-d55", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "junos 13.1x49-d49", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "junos 13.1r5", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "junos 13.1r4-s3", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "junos 13.1r4-s2", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "junos 13.1r4", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "junos 13.1r3-s1", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "junos 13.1r3", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "junos 13.1r2", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "junos 13.1r1", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "junos 13.1r.3-s1", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "junos r4-s2", "scope": "eq", "trust": 0.3, "vendor": "juniper", "version": "13.1" }, { "model": "junos r4", "scope": "eq", "trust": 0.3, "vendor": "juniper", "version": "13.1" }, { "model": "junos r3", "scope": "eq", "trust": 0.3, "vendor": "juniper", "version": "13.1" }, { "model": "junos r2", "scope": "eq", "trust": 0.3, "vendor": "juniper", "version": "13.1" }, { "model": "junos r1", "scope": "eq", "trust": 0.3, "vendor": "juniper", "version": "13.1" }, { "model": "junos", "scope": "eq", "trust": 0.3, "vendor": "juniper", "version": "13.1" }, { "model": "junos 12.3r9", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "junos 12.3r8", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "junos 12.3r7-s1", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "junos 12.3r7", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "junos 12.3r6.6", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "junos 12.3r6", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "junos 12.3r5", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "junos 12.3r4.6", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "junos 12.3r4-s3", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "junos 12.3r4-s2", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "junos 12.3r4", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "junos 12.3r3.4", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "junos 12.3r3", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "junos 12.3r2-s3", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "junos 12.3r2", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "junos r8", "scope": "eq", "trust": 0.3, "vendor": "juniper", "version": "12.3" }, { "model": "junos r6", "scope": "eq", "trust": 0.3, "vendor": "juniper", "version": "12.3" }, { "model": "junos r5", "scope": "eq", "trust": 0.3, "vendor": "juniper", "version": "12.3" }, { "model": "junos r4", "scope": "eq", "trust": 0.3, "vendor": "juniper", "version": "12.3" }, { "model": "junos r3", "scope": "eq", "trust": 0.3, "vendor": "juniper", "version": "12.3" }, { "model": "junos r2", "scope": "eq", "trust": 0.3, "vendor": "juniper", "version": "12.3" }, { "model": "junos r1", "scope": "eq", "trust": 0.3, "vendor": "juniper", "version": "12.3" }, { "model": "junos 12.2x50-d70", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "junos 12.2x50-d50.1", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "junos 12.2x50-d40.5", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "junos 12.2x50-d20.4", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "junos 12.2r8-s2", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "junos 12.2r8", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "junos 12.2r7", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "junos 12.2r6", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "junos 12.2r4", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "junos 12.2r3", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "junos 12.2r1.3", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "junos 12.2r1", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "junos r8-s2", "scope": "eq", "trust": 0.3, "vendor": "juniper", "version": "12.2" }, { "model": "junos r8", "scope": "eq", "trust": 0.3, "vendor": "juniper", "version": "12.2" }, { "model": "junos r7", "scope": "eq", "trust": 0.3, "vendor": "juniper", "version": "12.2" }, { "model": "junos r6", "scope": "eq", "trust": 0.3, "vendor": "juniper", "version": "12.2" }, { "model": "junos r5", "scope": "eq", "trust": 0.3, "vendor": "juniper", "version": "12.2" }, { "model": "junos r4", "scope": "eq", "trust": 0.3, "vendor": "juniper", "version": "12.2" }, { "model": "junos r3", "scope": "eq", "trust": 0.3, "vendor": "juniper", "version": "12.2" }, { "model": "junos r2", "scope": "eq", "trust": 0.3, "vendor": "juniper", "version": "12.2" }, { "model": "junos r1", "scope": "eq", "trust": 0.3, "vendor": "juniper", "version": "12.2" }, { "model": "junos 12.1x48-d62", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "junos 12.1x48-d41", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "junos 12.1x47-d20", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "junos 12.1x47-d15", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "junos 12.1x47-d11", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "junos d10", "scope": "eq", "trust": 0.3, "vendor": "juniper", "version": "12.1x47" }, { "model": "junos 12.1x46-d30", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "junos 12.1x46-d25", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "junos 12.1x46-d20.5", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "junos 12.1x46-d20", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "junos 12.1x46-d15", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "junos 12.1x46-d10", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "junos d25", "scope": "eq", "trust": 0.3, "vendor": "juniper", "version": "12.1x46" }, { "model": "junos d20", "scope": "eq", "trust": 0.3, "vendor": "juniper", "version": "12.1x46" }, { "model": "junos d15", "scope": "eq", "trust": 0.3, "vendor": "juniper", "version": "12.1x46" }, { "model": "junos d10", "scope": "eq", "trust": 0.3, "vendor": "juniper", "version": "12.1x46" }, { "model": "junos -d10", "scope": "eq", "trust": 0.3, "vendor": "juniper", "version": "12.1x46" }, { "model": "junos 12.1x45-d30", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "junos 12.1x45-d25", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "junos 12.1x45-d20", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "junos 12.1x45-d15", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "junos 12.1x45-d10", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "junos d15", "scope": "eq", "trust": 0.3, "vendor": "juniper", "version": "12.1x45-" }, { "model": "junos d30", "scope": "eq", "trust": 0.3, "vendor": "juniper", "version": "12.1x45" }, { "model": "junos d20", "scope": "eq", "trust": 0.3, "vendor": "juniper", "version": "12.1x45" }, { "model": "junos d15", "scope": "eq", "trust": 0.3, "vendor": "juniper", "version": "12.1x45" }, { "model": "junos d10", "scope": "eq", "trust": 0.3, "vendor": "juniper", "version": "12.1x45" }, { "model": "junos", "scope": "eq", "trust": 0.3, "vendor": "juniper", "version": "12.1x45" }, { "model": "junos 12.1x44-d45", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "junos 12.1x44-d40", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "junos 12.1x44-d34", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "junos 12.1x44-d32", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "junos 12.1x44-d30.4", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "junos 12.1x44-d30", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "junos 12.1x44-d26", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "junos 12.1x44-d25", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "junos 12.1x44-d20.3", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "junos 12.1x44-d15", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "junos d40", "scope": "eq", "trust": 0.3, "vendor": "juniper", "version": "12.1x44" }, { "model": "junos d35", "scope": "eq", "trust": 0.3, "vendor": "juniper", "version": "12.1x44" }, { "model": "junos d30", "scope": "eq", "trust": 0.3, "vendor": "juniper", "version": "12.1x44" }, { "model": "junos d25", "scope": "eq", "trust": 0.3, "vendor": "juniper", "version": "12.1x44" }, { "model": "junos d20", "scope": "eq", "trust": 0.3, "vendor": "juniper", "version": "12.1x44" }, { "model": "junos d15", "scope": "eq", "trust": 0.3, "vendor": "juniper", "version": "12.1x44" }, { "model": "junos d10", "scope": "eq", "trust": 0.3, "vendor": "juniper", "version": "12.1x44" }, { "model": "junos 12.1r9", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "junos 12.1r8-s3", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "junos 12.1r8-s2", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "junos 12.1r8", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "junos 12.1r7-s1", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "junos 12.1r7", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "junos 12.1r6", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "junos 12.1r5.5", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "junos 12.1r5-s3", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "junos 12.1r5", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "junos 12.1r3", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "junos 12.1r11", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "junos 12.1r10", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "junos 12.1r", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "junos r11", "scope": "eq", "trust": 0.3, "vendor": "juniper", "version": "12.1" }, { "model": "junos", "scope": "eq", "trust": 0.3, "vendor": "juniper", "version": "12.1" }, { "model": "junos", "scope": "eq", "trust": 0.3, "vendor": "juniper", "version": "11.4x27.44" }, { "model": "junos", "scope": "eq", "trust": 0.3, "vendor": "juniper", "version": "11.4x27" }, { "model": "junos 11.4r9-s1", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "junos 11.4r9", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "junos 11.4r8", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "junos 11.4r7.5", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "junos 11.4r7-s2", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "junos 11.4r7-s1", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "junos 11.4r7", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "junos 11.4r6.6", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "junos 11.4r6-s2", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "junos 11.4r5.5", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "junos 11.4r5-s2", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "junos 11.4r4.4", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "junos 11.4r3.7", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "junos 11.4r2.14", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "junos 11.4r13", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "junos 11.4r12-s4", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "junos 11.4r12-s1", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "junos 11.4r12", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "junos 11.4r11.4", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "junos 11.4r11", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "junos 11.4r10.3", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "junos 11.4r10-s1", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "junos 11.4r10", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "junos 11.4r1.6", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "junos 11.4r1", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "junos r9", "scope": "eq", "trust": 0.3, "vendor": "juniper", "version": "11.4" }, { "model": "junos r8", "scope": "eq", "trust": 0.3, "vendor": "juniper", "version": "11.4" }, { "model": "junos r7", "scope": "eq", "trust": 0.3, "vendor": "juniper", "version": "11.4" }, { "model": "junos r6", "scope": "eq", "trust": 0.3, "vendor": "juniper", "version": "11.4" }, { "model": "junos r5", "scope": "eq", "trust": 0.3, "vendor": "juniper", "version": "11.4" }, { "model": "junos r4", "scope": "eq", "trust": 0.3, "vendor": "juniper", "version": "11.4" }, { "model": "junos r3", "scope": "eq", "trust": 0.3, "vendor": "juniper", "version": "11.4" }, { "model": "junos r2", "scope": "eq", "trust": 0.3, "vendor": "juniper", "version": "11.4" }, { "model": "junos r11", "scope": "eq", "trust": 0.3, "vendor": "juniper", "version": "11.4" }, { "model": "junos r10", "scope": "eq", "trust": 0.3, "vendor": "juniper", "version": "11.4" }, { "model": "junos r1", "scope": "eq", "trust": 0.3, "vendor": "juniper", "version": "11.4" }, { "model": "junos", "scope": "eq", "trust": 0.3, "vendor": "juniper", "version": "11.4" }, { "model": "junos 11.3r5.3", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "junos 11.3r4.2", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "junos", "scope": "eq", "trust": 0.3, "vendor": "juniper", "version": "11.3" }, { "model": "junos 11.2r2", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "junos 11.2r1.2", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "junos 11.2r1", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "junos", "scope": "eq", "trust": 0.3, "vendor": "juniper", "version": "11.2" }, { "model": "junos 11.1r5", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "junos 11.1r4", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "junos", "scope": "eq", "trust": 0.3, "vendor": "juniper", "version": "11.1" }, { "model": "junos", "scope": "eq", "trust": 0.3, "vendor": "juniper", "version": "11.0" }, { "model": "junos 10.4s15", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "junos 10.4s14", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "junos 10.4s13", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "junos 10.4s", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "junos 10.4r9.2", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "junos 10.4r7", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "junos 10.4r6", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "junos 10.4r16", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "junos 10.4r15", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "junos 10.4r14", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "junos 10.4r13", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "junos 10.4r11", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "junos 10.4r10", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "junos 10.4r", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "junos", "scope": "eq", "trust": 0.3, "vendor": "juniper", "version": "10.4" }, { "model": "junos", "scope": "eq", "trust": 0.3, "vendor": "juniper", "version": "10.3" }, { "model": "junos 10.2r3", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "junos 10.2r2", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "junos", "scope": "eq", "trust": 0.3, "vendor": "juniper", "version": "10.2" }, { "model": "junos", "scope": "eq", "trust": 0.3, "vendor": "juniper", "version": "10.1" }, { "model": "junos 10.0s28", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "junos 10.0s25", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "junos 10.0s18", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "junos", "scope": "eq", "trust": 0.3, "vendor": "juniper", "version": "10.0" }, { "model": "junos 14.2r1", "scope": "ne", "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "junos 14.1x53-d10", "scope": "ne", "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "junos 14.1r3", "scope": "ne", "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "junos 13.3r5", "scope": "ne", "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "junos 13.2x51-d20", "scope": "ne", "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "junos 13.2r6", "scope": "ne", "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "junos 12.3x48-d10", "scope": "ne", "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "junos r7", "scope": "ne", "trust": 0.3, "vendor": "juniper", "version": "12.3" }, { "model": "junos 12.2r9", "scope": "ne", "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "junos 12.1x47-d10", "scope": "ne", "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "junos 12.1x46-d25", "scope": "ne", "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "junos 12.1x44-d35", "scope": "ne", "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "junos r12", "scope": "ne", "trust": 0.3, "vendor": "juniper", "version": "11.4" } ], "sources": [ { "db": "BID", "id": "74017" }, { "db": "JVNDB", "id": "JVNDB-2015-002205" }, { "db": "CNNVD", "id": "CNNVD-201504-182" }, { "db": "NVD", "id": "CVE-2015-3004" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/o:juniper:junos", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2015-002205" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The vendor reported this issue.", "sources": [ { "db": "BID", "id": "74017" } ], "trust": 0.3 }, "cve": "CVE-2015-3004", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "exploitabilityScore": 8.6, "id": "CVE-2015-3004", "impactScore": 2.9, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 1.8, "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "exploitabilityScore": 8.6, "id": "VHN-80965", "impactScore": 2.9, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:M/AU:N/C:N/I:P/A:N", "version": "2.0" } ], "cvssV3": [], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2015-3004", "trust": 1.0, "value": "MEDIUM" }, { "author": "NVD", "id": "CVE-2015-3004", "trust": 0.8, "value": "Medium" }, { "author": "CNNVD", "id": "CNNVD-201504-182", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-80965", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-80965" }, { "db": "JVNDB", "id": "JVNDB-2015-002205" }, { "db": "CNNVD", "id": "CNNVD-201504-182" }, { "db": "NVD", "id": "CVE-2015-3004" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "J-Web in Juniper Junos 11.4 before 11.4R12, 12.1X44 before 12.1X44-D35, 12.1X46 before 12.1X46-D25, 12.1X47 before 12.1X47-D10, 12.3X48 before 12.3X48-D10, 12.2 before 12.2R9, 12.3 before 12.3R7, 13.2 before 13.2R6, 13.2X51 before 13.2X51-D20, 13.3 before 13.3R5, 14.1 before 14.1R3, 14.1X53 before 14.1X53-D10, and 14.2 before 14.2R1 allows remote attackers to conduct clickjacking attacks via an X-Frame-Options header. Juniper Junos J-Web is prone to a clickjacking vulnerability because it fails to perform validity checks on certain user actions through HTTP requests. \nSuccessful exploits will allow an attacker to compromise the affected application or obtain sensitive information. Other attacks are also possible. Juniper Networks Junos is a set of network operating system of Juniper Networks (Juniper Networks) dedicated to the company\u0027s hardware system. The operating system provides a secure programming interface and Junos SDK. J-Web is a network management tool for routers or switches using Junos. A security vulnerability exists in J-Web for Juniper Networks Junos. The following versions are affected: Juniper Networks Junos 11.4 before 11.4R12, 12.1X44 before 12.1X44-D35, 12.1X46 before 12.1X46-D25, 12.1X47 before 12.1X47-D10, 12.3X48 before 12.3X48-D10, 12.2 before 12.2R9, 12.3 before 12.3R7, 13.2 before 13.2R6, 13.2X51 before 13.2X51-D20, 13.3 before 13.3R5, 14.1 before 14.1R3, 14.1X53 before 14.1X53-D10, 14.2R1 Prior to version 14.2", "sources": [ { "db": "NVD", "id": "CVE-2015-3004" }, { "db": "JVNDB", "id": "JVNDB-2015-002205" }, { "db": "BID", "id": "74017" }, { "db": "VULHUB", "id": "VHN-80965" } ], "trust": 1.98 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2015-3004", "trust": 2.8 }, { "db": "JUNIPER", "id": "JSA10675", "trust": 2.0 }, { "db": "BID", "id": "74017", "trust": 1.4 }, { "db": "SECTRACK", "id": "1032090", "trust": 1.1 }, { "db": "JVNDB", "id": "JVNDB-2015-002205", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201504-182", "trust": 0.7 }, { "db": "VULHUB", "id": "VHN-80965", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-80965" }, { "db": "BID", "id": "74017" }, { "db": "JVNDB", "id": "JVNDB-2015-002205" }, { "db": "CNNVD", "id": "CNNVD-201504-182" }, { "db": "NVD", "id": "CVE-2015-3004" } ] }, "id": "VAR-201504-0552", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-80965" } ], "trust": 0.01 }, "last_update_date": "2024-11-23T22:22:55.224000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "JSA10675", "trust": 0.8, "url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10675" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2015-002205" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-20", "trust": 1.9 } ], "sources": [ { "db": "VULHUB", "id": "VHN-80965" }, { "db": "JVNDB", "id": "JVNDB-2015-002205" }, { "db": "NVD", "id": "CVE-2015-3004" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.6, "url": "https://kb.juniper.net/infocenter/index?page=content\u0026id=jsa10675" }, { "trust": 1.1, "url": "http://www.securityfocus.com/bid/74017" }, { "trust": 1.1, "url": "http://www.securitytracker.com/id/1032090" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-3004" }, { "trust": 0.8, "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2015-3004" }, { "trust": 0.3, "url": "http://www.juniper.net/" }, { "trust": 0.3, "url": "http://kb.juniper.net/infocenter/index?page=content\u0026id=jsa10675\u0026cat=sirt_1\u0026actp=list" }, { "trust": 0.1, "url": "https://kb.juniper.net/infocenter/index?page=content\u0026amp;id=jsa10675" } ], "sources": [ { "db": "VULHUB", "id": "VHN-80965" }, { "db": "BID", "id": "74017" }, { "db": "JVNDB", "id": "JVNDB-2015-002205" }, { "db": "CNNVD", "id": "CNNVD-201504-182" }, { "db": "NVD", "id": "CVE-2015-3004" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-80965" }, { "db": "BID", "id": "74017" }, { "db": "JVNDB", "id": "JVNDB-2015-002205" }, { "db": "CNNVD", "id": "CNNVD-201504-182" }, { "db": "NVD", "id": "CVE-2015-3004" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2015-04-10T00:00:00", "db": "VULHUB", "id": "VHN-80965" }, { "date": "2015-04-09T00:00:00", "db": "BID", "id": "74017" }, { "date": "2015-04-15T00:00:00", "db": "JVNDB", "id": "JVNDB-2015-002205" }, { "date": "2015-04-14T00:00:00", "db": "CNNVD", "id": "CNNVD-201504-182" }, { "date": "2015-04-10T15:00:08.693000", "db": "NVD", "id": "CVE-2015-3004" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2016-12-03T00:00:00", "db": "VULHUB", "id": "VHN-80965" }, { "date": "2015-04-09T00:00:00", "db": "BID", "id": "74017" }, { "date": "2015-04-15T00:00:00", "db": "JVNDB", "id": "JVNDB-2015-002205" }, { "date": "2015-04-14T00:00:00", "db": "CNNVD", "id": "CNNVD-201504-182" }, { "date": "2024-11-21T02:28:29.417000", "db": "NVD", "id": "CVE-2015-3004" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201504-182" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Juniper Junos of J-Web Vulnerable to a clickjacking attack", "sources": [ { "db": "JVNDB", "id": "JVNDB-2015-002205" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "input validation", "sources": [ { "db": "CNNVD", "id": "CNNVD-201504-182" } ], "trust": 0.6 } }
fkie_cve-2015-3004
Vulnerability from fkie_nvd
URL | Tags | ||
---|---|---|---|
cve@mitre.org | http://www.securityfocus.com/bid/74017 | ||
cve@mitre.org | http://www.securitytracker.com/id/1032090 | ||
cve@mitre.org | https://kb.juniper.net/InfoCenter/index?page=content&id=JSA10675 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/74017 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.securitytracker.com/id/1032090 | ||
af854a3a-2127-422b-91ae-364da2661108 | https://kb.juniper.net/InfoCenter/index?page=content&id=JSA10675 | Vendor Advisory |
Vendor | Product | Version | |
---|---|---|---|
juniper | junos | 12.1x44 | |
juniper | junos | 12.1x44 | |
juniper | junos | 12.1x44 | |
juniper | junos | 12.1x44 | |
juniper | junos | 12.1x44 | |
juniper | junos | 12.1x44 | |
juniper | junos | 12.1x46 | |
juniper | junos | 12.1x46 | |
juniper | junos | 12.1x46 | |
juniper | junos | 12.1x46 | |
juniper | junos | 12.1x47 | |
juniper | junos | 12.2 | |
juniper | junos | 12.2 | |
juniper | junos | 12.2 | |
juniper | junos | 12.2 | |
juniper | junos | 12.2 | |
juniper | junos | 12.2 | |
juniper | junos | 12.2 | |
juniper | junos | 12.2 | |
juniper | junos | 12.2 | |
juniper | junos | 12.2 | |
juniper | junos | 12.3 | |
juniper | junos | 12.3 | |
juniper | junos | 12.3 | |
juniper | junos | 12.3 | |
juniper | junos | 12.3 | |
juniper | junos | 12.3 | |
juniper | junos | 12.3x48 | |
juniper | junos | 13.2 | |
juniper | junos | 13.2 | |
juniper | junos | 13.2 | |
juniper | junos | 13.2 | |
juniper | junos | 13.2 | |
juniper | junos | 13.2 | |
juniper | junos | 13.2x51 | |
juniper | junos | 13.2x51 | |
juniper | junos | 13.2x51 | |
juniper | junos | 13.3 | |
juniper | junos | 13.3 | |
juniper | junos | 13.3 | |
juniper | junos | 13.3 | |
juniper | junos | 13.3 | |
juniper | junos | 13.3 | |
juniper | junos | 14.1 | |
juniper | junos | 14.1 | |
juniper | junos | 14.1 | |
juniper | junos | 14.1x53 | |
juniper | junos | 14.2 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:juniper:junos:12.1x44:*:*:*:*:*:*:*", "matchCriteriaId": "1B307477-C5F2-4D98-AF4C-640D326164C7", "vulnerable": true }, { "criteria": "cpe:2.3:o:juniper:junos:12.1x44:d10:*:*:*:*:*:*", "matchCriteriaId": "AC405A12-112D-4C9D-90DA-6ED484109793", "vulnerable": true }, { "criteria": "cpe:2.3:o:juniper:junos:12.1x44:d15:*:*:*:*:*:*", "matchCriteriaId": "3FC42F2D-7593-4DBE-AE89-A6B78E7F9089", "vulnerable": true }, { "criteria": "cpe:2.3:o:juniper:junos:12.1x44:d20:*:*:*:*:*:*", "matchCriteriaId": "731A6469-3DE0-491A-BCC5-7642FB347ACE", "vulnerable": true }, { "criteria": "cpe:2.3:o:juniper:junos:12.1x44:d25:*:*:*:*:*:*", "matchCriteriaId": "D12A8119-3E59-4062-9A04-1F6EA48B78E9", "vulnerable": true }, { "criteria": "cpe:2.3:o:juniper:junos:12.1x44:d30:*:*:*:*:*:*", "matchCriteriaId": "E8B33B80-3189-4412-BFE0-359E755AB07A", "vulnerable": true }, { "criteria": "cpe:2.3:o:juniper:junos:12.1x46:*:*:*:*:*:*:*", "matchCriteriaId": "CFB89F64-16BB-4A14-9084-B338668D7FF1", "vulnerable": true }, { "criteria": "cpe:2.3:o:juniper:junos:12.1x46:d10:*:*:*:*:*:*", "matchCriteriaId": "A71742CF-50B1-44BB-AB7B-27E5DCC9CF70", "vulnerable": true }, { "criteria": "cpe:2.3:o:juniper:junos:12.1x46:d15:*:*:*:*:*:*", "matchCriteriaId": "4FD4237A-C257-4D8A-ABC4-9B2160530A4E", "vulnerable": true }, { "criteria": "cpe:2.3:o:juniper:junos:12.1x46:d20:*:*:*:*:*:*", "matchCriteriaId": "5A449C87-C5C3-48FE-9E46-64ED5DD5F193", "vulnerable": true }, { "criteria": "cpe:2.3:o:juniper:junos:12.1x47:*:*:*:*:*:*:*", "matchCriteriaId": "0BB3DE56-1B04-4A53-B4A4-93286FC98463", "vulnerable": true }, { "criteria": "cpe:2.3:o:juniper:junos:12.2:*:*:*:*:*:*:*", "matchCriteriaId": "5FB9541A-2570-459A-87D6-5341C67B8EC8", "vulnerable": true }, { "criteria": "cpe:2.3:o:juniper:junos:12.2:r1:*:*:*:*:*:*", "matchCriteriaId": "43B661F8-1F43-4073-9275-AE1FFCB17BF8", "vulnerable": true }, { "criteria": "cpe:2.3:o:juniper:junos:12.2:r2:*:*:*:*:*:*", "matchCriteriaId": "EF88921E-18E4-49B2-AAF4-ED8C393D4750", "vulnerable": true }, { "criteria": "cpe:2.3:o:juniper:junos:12.2:r3:*:*:*:*:*:*", "matchCriteriaId": "144DA08B-A129-4DC6-81D2-782BD7C3074B", "vulnerable": true }, { "criteria": "cpe:2.3:o:juniper:junos:12.2:r4:*:*:*:*:*:*", "matchCriteriaId": "F1936A41-302E-4546-9F7A-CAE3A3C68718", "vulnerable": true }, { "criteria": "cpe:2.3:o:juniper:junos:12.2:r5:*:*:*:*:*:*", "matchCriteriaId": "6EB55673-5857-452F-9D22-B422CC9CC3F3", "vulnerable": true }, { "criteria": "cpe:2.3:o:juniper:junos:12.2:r6:*:*:*:*:*:*", "matchCriteriaId": "03D4519D-1289-47E9-BFB7-E3831BFD50F6", "vulnerable": true }, { "criteria": "cpe:2.3:o:juniper:junos:12.2:r7:*:*:*:*:*:*", "matchCriteriaId": "77CDB10F-3BCE-41AF-B633-DFAC9B8A5D9F", "vulnerable": true }, { "criteria": "cpe:2.3:o:juniper:junos:12.2:r8:*:*:*:*:*:*", "matchCriteriaId": "B795A4AD-38A1-470B-86B2-872011C80DB3", "vulnerable": true }, { "criteria": "cpe:2.3:o:juniper:junos:12.2:r8-s2:*:*:*:*:*:*", "matchCriteriaId": "A89F7B01-F83C-426B-A555-A553479CB0F3", "vulnerable": true }, { "criteria": "cpe:2.3:o:juniper:junos:12.3:r1:*:*:*:*:*:*", "matchCriteriaId": "371A7DF8-3F4B-439D-8990-D1BC6F0C25C5", "vulnerable": true }, { "criteria": "cpe:2.3:o:juniper:junos:12.3:r2:*:*:*:*:*:*", "matchCriteriaId": "7CC3BCFD-2B0F-4994-9FE4-9D37FA85F1E2", "vulnerable": true }, { "criteria": "cpe:2.3:o:juniper:junos:12.3:r3:*:*:*:*:*:*", "matchCriteriaId": "C6F309FD-0A5A-4C86-B227-B2B511A5CEB4", "vulnerable": true }, { "criteria": "cpe:2.3:o:juniper:junos:12.3:r4:*:*:*:*:*:*", "matchCriteriaId": "960059B5-0701-4B75-AB51-0A430247D9F0", "vulnerable": true }, { "criteria": "cpe:2.3:o:juniper:junos:12.3:r5:*:*:*:*:*:*", "matchCriteriaId": "1D1DCA52-DA81-495B-B516-5571F01E3B0A", "vulnerable": true }, { "criteria": "cpe:2.3:o:juniper:junos:12.3:r6:*:*:*:*:*:*", "matchCriteriaId": "05E187F6-BACD-4DD5-B393-B2FE4349053A", "vulnerable": true }, { "criteria": "cpe:2.3:o:juniper:junos:12.3x48:*:*:*:*:*:*:*", "matchCriteriaId": "7192552C-7D4A-4D95-BA79-CDF465E27D37", "vulnerable": true }, { "criteria": "cpe:2.3:o:juniper:junos:13.2:*:*:*:*:*:*:*", "matchCriteriaId": "CAB7D840-9469-4CE2-8DBF-017A44741374", "vulnerable": true }, { "criteria": "cpe:2.3:o:juniper:junos:13.2:r1:*:*:*:*:*:*", "matchCriteriaId": "D3A0A607-7D3C-4F2A-B5F5-576A70649CB1", "vulnerable": true }, { "criteria": "cpe:2.3:o:juniper:junos:13.2:r2:*:*:*:*:*:*", "matchCriteriaId": "32E9620A-7C0A-474C-919E-13609FFE580D", "vulnerable": true }, { "criteria": "cpe:2.3:o:juniper:junos:13.2:r3:*:*:*:*:*:*", "matchCriteriaId": "672D3A38-92B4-4F33-82A6-B2D3F3403AF3", "vulnerable": true }, { "criteria": "cpe:2.3:o:juniper:junos:13.2:r4:*:*:*:*:*:*", "matchCriteriaId": "F5C24441-6E9D-4EF7-8903-A109A52340C0", "vulnerable": true }, { "criteria": "cpe:2.3:o:juniper:junos:13.2:r5:*:*:*:*:*:*", "matchCriteriaId": "7CB98C4F-617F-4F51-A86E-D1EBE2BDE583", "vulnerable": true }, { "criteria": "cpe:2.3:o:juniper:junos:13.2x51:*:*:*:*:*:*:*", "matchCriteriaId": "8B73BE56-F298-4EC5-88A3-D9808B89B63B", "vulnerable": true }, { "criteria": "cpe:2.3:o:juniper:junos:13.2x51:d10:*:*:*:*:*:*", "matchCriteriaId": "62B55703-15BC-409B-ACF0-CD5671B9E372", "vulnerable": true }, { "criteria": "cpe:2.3:o:juniper:junos:13.2x51:d15:*:*:*:*:*:*", "matchCriteriaId": "3947A516-2054-48B3-ADFD-3CF88EC2288D", "vulnerable": true }, { "criteria": "cpe:2.3:o:juniper:junos:13.3:*:*:*:*:*:*:*", "matchCriteriaId": "E4AF5DAA-62F5-491F-A9CE-098970671D43", "vulnerable": true }, { "criteria": "cpe:2.3:o:juniper:junos:13.3:r1:*:*:*:*:*:*", "matchCriteriaId": "3FF9FF91-9184-4D18-8288-9110E35F4AE5", "vulnerable": true }, { "criteria": "cpe:2.3:o:juniper:junos:13.3:r2:*:*:*:*:*:*", "matchCriteriaId": "0F2E537B-9504-4912-B231-0D83F4459469", "vulnerable": true }, { "criteria": "cpe:2.3:o:juniper:junos:13.3:r2-s2:*:*:*:*:*:*", "matchCriteriaId": "99A946CE-FFC7-4F16-82F4-795A6E5B84C2", "vulnerable": true }, { "criteria": "cpe:2.3:o:juniper:junos:13.3:r3:*:*:*:*:*:*", "matchCriteriaId": "4BCB3837-DCBC-4997-B63E-E47957584709", "vulnerable": true }, { "criteria": "cpe:2.3:o:juniper:junos:13.3:r4:*:*:*:*:*:*", "matchCriteriaId": "6C88E2B1-469B-442B-9FC0-7C9408CE3917", "vulnerable": true }, { "criteria": "cpe:2.3:o:juniper:junos:14.1:*:*:*:*:*:*:*", "matchCriteriaId": "6237291A-B861-4D53-B7AA-C53A44B76896", "vulnerable": true }, { "criteria": "cpe:2.3:o:juniper:junos:14.1:r1:*:*:*:*:*:*", "matchCriteriaId": "9C778627-820A-48F5-9680-0205D6DB5EB6", "vulnerable": true }, { "criteria": "cpe:2.3:o:juniper:junos:14.1:r2:*:*:*:*:*:*", "matchCriteriaId": "FA7F03DC-73A2-4760-B386-2A57E9C97E65", "vulnerable": true }, { "criteria": "cpe:2.3:o:juniper:junos:14.1x53:*:*:*:*:*:*:*", "matchCriteriaId": "9C7FCCC1-B151-465A-8327-26DB5DC074F0", "vulnerable": true }, { "criteria": "cpe:2.3:o:juniper:junos:14.2:*:*:*:*:*:*:*", "matchCriteriaId": "D59449C6-5BD5-4C07-AEF6-EEBC70D9C4C7", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "J-Web in Juniper Junos 11.4 before 11.4R12, 12.1X44 before 12.1X44-D35, 12.1X46 before 12.1X46-D25, 12.1X47 before 12.1X47-D10, 12.3X48 before 12.3X48-D10, 12.2 before 12.2R9, 12.3 before 12.3R7, 13.2 before 13.2R6, 13.2X51 before 13.2X51-D20, 13.3 before 13.3R5, 14.1 before 14.1R3, 14.1X53 before 14.1X53-D10, and 14.2 before 14.2R1 allows remote attackers to conduct clickjacking attacks via an X-Frame-Options header." }, { "lang": "es", "value": "J-Web en Juniper Junos 11.4 anterior a 11.4R12, 12.1X44 anterior a 12.1X44-D35, 12.1X46 anterior a 12.1X46-D25, 12.1X47 anterior a 12.1X47-D10, 12.3X48 anterior a 12.3X48-D10, 12.2 anterior a 12.2R9, 12.3 anterior a 12.3R7, 13.2 anterior a 13.2R6, 13.2X51 anterior a 13.2X51-D20, 13.3 anterior a 13.3R5, 14.1 anterior a 14.1R3, 14.1X53 anterior a 14.1X53-D10, y 14.2 anterior a 14.2R1 permite a atacantes remotos realizar ataques de clickjacking a trav\u00e9s de una cabecera X-Frame-Options." } ], "id": "CVE-2015-3004", "lastModified": "2025-04-12T10:46:40.837", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2015-04-10T15:00:08.693", "references": [ { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/74017" }, { "source": "cve@mitre.org", "url": "http://www.securitytracker.com/id/1032090" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10675" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/74017" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id/1032090" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10675" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-20" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
gsd-2015-3004
Vulnerability from gsd
{ "GSD": { "alias": "CVE-2015-3004", "description": "J-Web in Juniper Junos 11.4 before 11.4R12, 12.1X44 before 12.1X44-D35, 12.1X46 before 12.1X46-D25, 12.1X47 before 12.1X47-D10, 12.3X48 before 12.3X48-D10, 12.2 before 12.2R9, 12.3 before 12.3R7, 13.2 before 13.2R6, 13.2X51 before 13.2X51-D20, 13.3 before 13.3R5, 14.1 before 14.1R3, 14.1X53 before 14.1X53-D10, and 14.2 before 14.2R1 allows remote attackers to conduct clickjacking attacks via an X-Frame-Options header.", "id": "GSD-2015-3004" }, "gsd": { "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "osvSchema": { "aliases": [ "CVE-2015-3004" ], "details": "J-Web in Juniper Junos 11.4 before 11.4R12, 12.1X44 before 12.1X44-D35, 12.1X46 before 12.1X46-D25, 12.1X47 before 12.1X47-D10, 12.3X48 before 12.3X48-D10, 12.2 before 12.2R9, 12.3 before 12.3R7, 13.2 before 13.2R6, 13.2X51 before 13.2X51-D20, 13.3 before 13.3R5, 14.1 before 14.1R3, 14.1X53 before 14.1X53-D10, and 14.2 before 14.2R1 allows remote attackers to conduct clickjacking attacks via an X-Frame-Options header.", "id": "GSD-2015-3004", "modified": "2023-12-13T01:20:07.423574Z", "schema_version": "1.4.0" } }, "namespaces": { "cve.org": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2015-3004", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "J-Web in Juniper Junos 11.4 before 11.4R12, 12.1X44 before 12.1X44-D35, 12.1X46 before 12.1X46-D25, 12.1X47 before 12.1X47-D10, 12.3X48 before 12.3X48-D10, 12.2 before 12.2R9, 12.3 before 12.3R7, 13.2 before 13.2R6, 13.2X51 before 13.2X51-D20, 13.3 before 13.3R5, 14.1 before 14.1R3, 14.1X53 before 14.1X53-D10, and 14.2 before 14.2R1 allows remote attackers to conduct clickjacking attacks via an X-Frame-Options header." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "1032090", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1032090" }, { "name": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10675", "refsource": "CONFIRM", "url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10675" }, { "name": "74017", "refsource": "BID", "url": "http://www.securityfocus.com/bid/74017" } ] } }, "nvd.nist.gov": { "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:juniper:junos:12.1x44:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:juniper:junos:12.1x44:d10:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:juniper:junos:12.1x46:d15:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:juniper:junos:12.1x46:d20:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:juniper:junos:12.2:r5:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:juniper:junos:12.2:r6:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:juniper:junos:12.3:r4:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:juniper:junos:12.3:r5:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:juniper:junos:12.3:r6:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:juniper:junos:13.2:r5:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:juniper:junos:13.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:juniper:junos:12.1x44:d15:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:juniper:junos:12.1x44:d20:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:juniper:junos:12.1x47:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:juniper:junos:12.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:juniper:junos:12.2:r7:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:juniper:junos:12.2:r8:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:juniper:junos:12.3x48:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:juniper:junos:13.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:juniper:junos:13.3:r1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:juniper:junos:13.3:r2:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:juniper:junos:14.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:juniper:junos:13.2x51:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:juniper:junos:12.1x46:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:juniper:junos:12.1x46:d10:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:juniper:junos:12.2:r3:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:juniper:junos:12.2:r4:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:juniper:junos:12.3:r2:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:juniper:junos:12.3:r3:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:juniper:junos:13.2:r3:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:juniper:junos:13.2:r4:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:juniper:junos:13.3:r4:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:juniper:junos:14.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:juniper:junos:14.1x53:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:juniper:junos:14.1:r1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:juniper:junos:14.1:r2:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:juniper:junos:12.1x44:d25:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:juniper:junos:12.1x44:d30:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:juniper:junos:12.2:r1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:juniper:junos:12.2:r2:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:juniper:junos:12.2:r8-s2:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:juniper:junos:12.3:r1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:juniper:junos:13.2:r1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:juniper:junos:13.2:r2:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:juniper:junos:13.3:r2-s2:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:juniper:junos:13.3:r3:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:juniper:junos:13.2x51:d10:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:juniper:junos:13.2x51:d15:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] }, "cve": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2015-3004" }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "en", "value": "J-Web in Juniper Junos 11.4 before 11.4R12, 12.1X44 before 12.1X44-D35, 12.1X46 before 12.1X46-D25, 12.1X47 before 12.1X47-D10, 12.3X48 before 12.3X48-D10, 12.2 before 12.2R9, 12.3 before 12.3R7, 13.2 before 13.2R6, 13.2X51 before 13.2X51-D20, 13.3 before 13.3R5, 14.1 before 14.1R3, 14.1X53 before 14.1X53-D10, and 14.2 before 14.2R1 allows remote attackers to conduct clickjacking attacks via an X-Frame-Options header." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "en", "value": "CWE-20" } ] } ] }, "references": { "reference_data": [ { "name": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10675", "refsource": "CONFIRM", "tags": [ "Vendor Advisory" ], "url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10675" }, { "name": "1032090", "refsource": "SECTRACK", "tags": [], "url": "http://www.securitytracker.com/id/1032090" }, { "name": "74017", "refsource": "BID", "tags": [], "url": "http://www.securityfocus.com/bid/74017" } ] } }, "impact": { "baseMetricV2": { "cvssV2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "userInteractionRequired": true } }, "lastModifiedDate": "2016-12-03T03:07Z", "publishedDate": "2015-04-10T15:00Z" } } }
ghsa-mvmx-mpf4-hpgj
Vulnerability from github
J-Web in Juniper Junos 11.4 before 11.4R12, 12.1X44 before 12.1X44-D35, 12.1X46 before 12.1X46-D25, 12.1X47 before 12.1X47-D10, 12.3X48 before 12.3X48-D10, 12.2 before 12.2R9, 12.3 before 12.3R7, 13.2 before 13.2R6, 13.2X51 before 13.2X51-D20, 13.3 before 13.3R5, 14.1 before 14.1R3, 14.1X53 before 14.1X53-D10, and 14.2 before 14.2R1 allows remote attackers to conduct clickjacking attacks via an X-Frame-Options header.
{ "affected": [], "aliases": [ "CVE-2015-3004" ], "database_specific": { "cwe_ids": [ "CWE-20" ], "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2015-04-10T15:00:00Z", "severity": "MODERATE" }, "details": "J-Web in Juniper Junos 11.4 before 11.4R12, 12.1X44 before 12.1X44-D35, 12.1X46 before 12.1X46-D25, 12.1X47 before 12.1X47-D10, 12.3X48 before 12.3X48-D10, 12.2 before 12.2R9, 12.3 before 12.3R7, 13.2 before 13.2R6, 13.2X51 before 13.2X51-D20, 13.3 before 13.3R5, 14.1 before 14.1R3, 14.1X53 before 14.1X53-D10, and 14.2 before 14.2R1 allows remote attackers to conduct clickjacking attacks via an X-Frame-Options header.", "id": "GHSA-mvmx-mpf4-hpgj", "modified": "2022-05-17T03:33:24Z", "published": "2022-05-17T03:33:24Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-3004" }, { "type": "WEB", "url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10675" }, { "type": "WEB", "url": "http://www.securityfocus.com/bid/74017" }, { "type": "WEB", "url": "http://www.securitytracker.com/id/1032090" } ], "schema_version": "1.4.0", "severity": [] }
CERTFR-2015-AVI-146
Vulnerability from certfr_avis
De multiples vulnérabilités ont été corrigées dans les produits Juniper. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service à distance et un déni de service.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
NoneVendor | Product | Description | ||
---|---|---|---|---|
Juniper Networks | N/A | Juniper NSM versions antérieures à 2012.2R12 | ||
Juniper Networks | Junos OS | Juniper Junos OS versions antérieures à 12.3R9 | ||
Juniper Networks | N/A | Juniper CTPOS versions antérieures à 6.6R5 | ||
Juniper Networks | Junos OS | Juniper Junos OS versions antérieures à 12.2X50-D70 | ||
Juniper Networks | Junos OS | Juniper Junos OS versions antérieures à 11.4R12 | ||
Juniper Networks | Junos OS | Juniper Junos OS versions antérieures à 13.2X51-D30 | ||
Juniper Networks | Junos OS | Juniper Junos OS versions antérieures à 12.3R7 | ||
Juniper Networks | N/A | Juniper NSM versions antérieures à 2012.2R11 | ||
Juniper Networks | Junos OS | Juniper Junos OS versions antérieures à 12.3R10 | ||
Juniper Networks | Junos OS | Juniper Junos OS versions antérieures à 13.2R6 | ||
Juniper Networks | N/A | Juniper CTPView versions antérieures à 7.1R1 | ||
Juniper Networks | Junos OS | Juniper Junos OS versions antérieures à 13.3R6 | ||
Juniper Networks | Junos OS | Juniper Junos OS versions antérieures à 14.2R1 | ||
Juniper Networks | Junos OS | Juniper Junos OS versions antérieures à 12.3X48-D10 | ||
Juniper Networks | N/A | Juniper CTPOS versions antérieures à 7.0R4 | ||
Juniper Networks | Junos OS | Juniper Junos OS versions antérieures à 14.1X53-D10 | ||
Juniper Networks | Junos OS | Juniper Junos OS versions antérieures à 12.1X46-D35 | ||
Juniper Networks | Junos OS | Juniper Junos OS versions antérieures à 12.1X47-D25 | ||
Juniper Networks | Junos OS | Juniper Junos OS versions antérieures à 14.1R5 | ||
Juniper Networks | N/A | Juniper CTPOS versions antérieures à 7.1R1 | ||
Juniper Networks | Junos OS | Juniper Junos OS versions antérieures à 12.1X44-D50 | ||
Juniper Networks | Junos OS | Juniper Junos OS versions antérieures à 13.3R5 | ||
Juniper Networks | Junos OS | Juniper Junos OS versions antérieures à 13.2X52-D15 | ||
Juniper Networks | Junos OS | Juniper Junos OS versions antérieures à 14.1R3 | ||
Juniper Networks | Junos OS | Juniper Junos OS versions antérieures à 14.2R3 | ||
Juniper Networks | Junos OS | Juniper Junos OS versions antérieures à 13.2R8 | ||
Juniper Networks | Junos OS | Juniper Junos OS versions antérieures à 12.2R9 | ||
Juniper Networks | Junos OS | Juniper Junos OS versions antérieures à 13.1X50-D30 | ||
Juniper Networks | N/A | Juniper IDP OS versions antérieures à 5.1r4 |
Title | Publication Time | Tags | |||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "$ref": "https://www.cert.ssi.gouv.fr/openapi.json", "affected_systems": [ { "description": "Juniper NSM versions ant\u00e9rieures \u00e0 2012.2R12", "product": { "name": "N/A", "vendor": { "name": "Juniper Networks", "scada": false } } }, { "description": "Juniper Junos OS versions ant\u00e9rieures \u00e0 12.3R9", "product": { "name": "Junos OS", "vendor": { "name": "Juniper Networks", "scada": false } } }, { "description": "Juniper CTPOS versions ant\u00e9rieures \u00e0 6.6R5", "product": { "name": "N/A", "vendor": { "name": "Juniper Networks", "scada": false } } }, { "description": "Juniper Junos OS versions ant\u00e9rieures \u00e0 12.2X50-D70", "product": { "name": "Junos OS", "vendor": { "name": "Juniper Networks", "scada": false } } }, { "description": "Juniper Junos OS versions ant\u00e9rieures \u00e0 11.4R12", "product": { "name": "Junos OS", "vendor": { "name": "Juniper Networks", "scada": false } } }, { "description": "Juniper Junos OS versions ant\u00e9rieures \u00e0 13.2X51-D30", "product": { "name": "Junos OS", "vendor": { "name": "Juniper Networks", "scada": false } } }, { "description": "Juniper Junos OS versions ant\u00e9rieures \u00e0 12.3R7", "product": { "name": "Junos OS", "vendor": { "name": "Juniper Networks", "scada": false } } }, { "description": "Juniper NSM versions ant\u00e9rieures \u00e0 2012.2R11", "product": { "name": "N/A", "vendor": { "name": "Juniper Networks", "scada": false } } }, { "description": "Juniper Junos OS versions ant\u00e9rieures \u00e0 12.3R10", "product": { "name": "Junos OS", "vendor": { "name": "Juniper Networks", "scada": false } } }, { "description": "Juniper Junos OS versions ant\u00e9rieures \u00e0 13.2R6", "product": { "name": "Junos OS", "vendor": { "name": "Juniper Networks", "scada": false } } }, { "description": "Juniper CTPView versions ant\u00e9rieures \u00e0 7.1R1", "product": { "name": "N/A", "vendor": { "name": "Juniper Networks", "scada": false } } }, { "description": "Juniper Junos OS versions ant\u00e9rieures \u00e0 13.3R6", "product": { "name": "Junos OS", "vendor": { "name": "Juniper Networks", "scada": false } } }, { "description": "Juniper Junos OS versions ant\u00e9rieures \u00e0 14.2R1", "product": { "name": "Junos OS", "vendor": { "name": "Juniper Networks", "scada": false } } }, { "description": "Juniper Junos OS versions ant\u00e9rieures \u00e0 12.3X48-D10", "product": { "name": "Junos OS", "vendor": { "name": "Juniper Networks", "scada": false } } }, { "description": "Juniper CTPOS versions ant\u00e9rieures \u00e0 7.0R4", "product": { "name": "N/A", "vendor": { "name": "Juniper Networks", "scada": false } } }, { "description": "Juniper Junos OS versions ant\u00e9rieures \u00e0 14.1X53-D10", "product": { "name": "Junos OS", "vendor": { "name": "Juniper Networks", "scada": false } } }, { "description": "Juniper Junos OS versions ant\u00e9rieures \u00e0 12.1X46-D35", "product": { "name": "Junos OS", "vendor": { "name": "Juniper Networks", "scada": false } } }, { "description": "Juniper Junos OS versions ant\u00e9rieures \u00e0 12.1X47-D25", "product": { "name": "Junos OS", "vendor": { "name": "Juniper Networks", "scada": false } } }, { "description": "Juniper Junos OS versions ant\u00e9rieures \u00e0 14.1R5", "product": { "name": "Junos OS", "vendor": { "name": "Juniper Networks", "scada": false } } }, { "description": "Juniper CTPOS versions ant\u00e9rieures \u00e0 7.1R1", "product": { "name": "N/A", "vendor": { "name": "Juniper Networks", "scada": false } } }, { "description": "Juniper Junos OS versions ant\u00e9rieures \u00e0 12.1X44-D50", "product": { "name": "Junos OS", "vendor": { "name": "Juniper Networks", "scada": false } } }, { "description": "Juniper Junos OS versions ant\u00e9rieures \u00e0 13.3R5", "product": { "name": "Junos OS", "vendor": { "name": "Juniper Networks", "scada": false } } }, { "description": "Juniper Junos OS versions ant\u00e9rieures \u00e0 13.2X52-D15", "product": { "name": "Junos OS", "vendor": { "name": "Juniper Networks", "scada": false } } }, { "description": "Juniper Junos OS versions ant\u00e9rieures \u00e0 14.1R3", "product": { "name": "Junos OS", "vendor": { "name": "Juniper Networks", "scada": false } } }, { "description": "Juniper Junos OS versions ant\u00e9rieures \u00e0 14.2R3", "product": { "name": "Junos OS", "vendor": { "name": "Juniper Networks", "scada": false } } }, { "description": "Juniper Junos OS versions ant\u00e9rieures \u00e0 13.2R8", "product": { "name": "Junos OS", "vendor": { "name": "Juniper Networks", "scada": false } } }, { "description": "Juniper Junos OS versions ant\u00e9rieures \u00e0 12.2R9", "product": { "name": "Junos OS", "vendor": { "name": "Juniper Networks", "scada": false } } }, { "description": "Juniper Junos OS versions ant\u00e9rieures \u00e0 13.1X50-D30", "product": { "name": "Junos OS", "vendor": { "name": "Juniper Networks", "scada": false } } }, { "description": "Juniper IDP OS versions ant\u00e9rieures \u00e0 5.1r4", "product": { "name": "N/A", "vendor": { "name": "Juniper Networks", "scada": false } } } ], "affected_systems_content": null, "content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n", "cves": [ { "name": "CVE-2015-0208", "url": "https://www.cve.org/CVERecord?id=CVE-2015-0208" }, { "name": "CVE-2015-0292", "url": "https://www.cve.org/CVERecord?id=CVE-2015-0292" }, { "name": "CVE-2014-3571", "url": "https://www.cve.org/CVERecord?id=CVE-2014-3571" }, { "name": "CVE-2015-0286", "url": "https://www.cve.org/CVERecord?id=CVE-2015-0286" }, { "name": "CVE-2015-3002", "url": "https://www.cve.org/CVERecord?id=CVE-2015-3002" }, { "name": "CVE-2014-3570", "url": "https://www.cve.org/CVERecord?id=CVE-2014-3570" }, { "name": "CVE-2015-3004", "url": "https://www.cve.org/CVERecord?id=CVE-2015-3004" }, { "name": "CVE-2009-3563", "url": "https://www.cve.org/CVERecord?id=CVE-2009-3563" }, { "name": "CVE-2015-0288", "url": "https://www.cve.org/CVERecord?id=CVE-2015-0288" }, { "name": "CVE-2015-0206", "url": "https://www.cve.org/CVERecord?id=CVE-2015-0206" }, { "name": "CVE-2015-0290", "url": "https://www.cve.org/CVERecord?id=CVE-2015-0290" }, { "name": "CVE-2014-6271", "url": "https://www.cve.org/CVERecord?id=CVE-2014-6271" }, { "name": "CVE-2012-5195", "url": "https://www.cve.org/CVERecord?id=CVE-2012-5195" }, { "name": "CVE-2011-0539", "url": "https://www.cve.org/CVERecord?id=CVE-2011-0539" }, { "name": "CVE-2015-0207", "url": "https://www.cve.org/CVERecord?id=CVE-2015-0207" }, { "name": "CVE-2010-4478", "url": "https://www.cve.org/CVERecord?id=CVE-2010-4478" }, { "name": "CVE-2015-0285", "url": "https://www.cve.org/CVERecord?id=CVE-2015-0285" }, { "name": "CVE-2014-4478", "url": "https://www.cve.org/CVERecord?id=CVE-2014-4478" }, { "name": "CVE-2015-3003", "url": "https://www.cve.org/CVERecord?id=CVE-2015-3003" }, { "name": "CVE-2012-0814", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0814" }, { "name": "CVE-2015-0204", "url": "https://www.cve.org/CVERecord?id=CVE-2015-0204" }, { "name": "CVE-2015-0293", "url": "https://www.cve.org/CVERecord?id=CVE-2015-0293" }, { "name": "CVE-2015-0287", "url": "https://www.cve.org/CVERecord?id=CVE-2015-0287" }, { "name": "CVE-2015-1787", "url": "https://www.cve.org/CVERecord?id=CVE-2015-1787" }, { "name": "CVE-2014-8275", "url": "https://www.cve.org/CVERecord?id=CVE-2014-8275" }, { "name": "CVE-2015-0205", "url": "https://www.cve.org/CVERecord?id=CVE-2015-0205" }, { "name": "CVE-2015-0209", "url": "https://www.cve.org/CVERecord?id=CVE-2015-0209" }, { "name": "CVE-2015-0291", "url": "https://www.cve.org/CVERecord?id=CVE-2015-0291" }, { "name": "CVE-2015-0289", "url": "https://www.cve.org/CVERecord?id=CVE-2015-0289" }, { "name": "CVE-2014-3572", "url": "https://www.cve.org/CVERecord?id=CVE-2014-3572" }, { "name": "CVE-2014-3569", "url": "https://www.cve.org/CVERecord?id=CVE-2014-3569" }, { "name": "CVE-2015-3005", "url": "https://www.cve.org/CVERecord?id=CVE-2015-3005" }, { "name": "CVE-2014-8500", "url": "https://www.cve.org/CVERecord?id=CVE-2014-8500" }, { "name": "CVE-2012-2131", "url": "https://www.cve.org/CVERecord?id=CVE-2012-2131" }, { "name": "CVE-2015-3006", "url": "https://www.cve.org/CVERecord?id=CVE-2015-3006" } ], "initial_release_date": "2015-04-13T00:00:00", "last_revision_date": "2015-04-13T00:00:00", "links": [], "reference": "CERTFR-2015-AVI-146", "revisions": [ { "description": "version initiale.", "revision_date": "2015-04-13T00:00:00.000000" } ], "risks": [ { "description": "D\u00e9ni de service \u00e0 distance" }, { "description": "Ex\u00e9cution de code arbitraire \u00e0 distance" }, { "description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es" }, { "description": "Injection de code indirecte \u00e0 distance" }, { "description": "D\u00e9ni de service" }, { "description": "Contournement de la politique de s\u00e9curit\u00e9" }, { "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es" }, { "description": "\u00c9l\u00e9vation de privil\u00e8ges" } ], "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 corrig\u00e9es dans les produits \u003cspan\nclass=\"textit\"\u003eJuniper\u003c/span\u003e. Certaines d\u0027entre elles permettent \u00e0 un\nattaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance, un\nd\u00e9ni de service \u00e0 distance et un d\u00e9ni de service.\n", "title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Juniper", "vendor_advisories": [ { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10679 du 07 avril 2015", "url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10679" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10676 du 07 avril 2015", "url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10676" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10673 du 07 avril 2015", "url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10673" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10672 du 07 avril 2015", "url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10672" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10680 du 07 avril 2015", "url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10680" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10677 du 07 avril 2015", "url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10677" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10678 du 07 avril 2015", "url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10678" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10675 du 07 avril 2015", "url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10675" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10674 du 07 avril 2015", "url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10674" } ] }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.