Search criteria

3 vulnerabilities found for juniper_installer_service_client by juniper

FKIE_CVE-2014-3811

Vulnerability from fkie_nvd - Published: 2014-09-29 14:55 - Updated: 2025-04-12 10:46
Severity ?
Summary
Juniper Installer Service (JIS) Client 7.x before 7.4R6 for Windows and Junos Pulse Client before 4.0R6 allows local users to gain privileges via unspecified vectors.
Impacted products
Vendor Product Version
juniper juniper_installer_service_client 7.1
juniper juniper_installer_service_client 7.1
juniper juniper_installer_service_client 7.1
juniper juniper_installer_service_client 7.1
juniper juniper_installer_service_client 7.1
juniper juniper_installer_service_client 7.1
juniper juniper_installer_service_client 7.1
juniper juniper_installer_service_client 7.1
juniper juniper_installer_service_client 7.1
juniper juniper_installer_service_client 7.1
juniper juniper_installer_service_client 7.1
juniper juniper_installer_service_client 7.1
juniper juniper_installer_service_client 7.1
juniper juniper_installer_service_client 7.1
juniper juniper_installer_service_client 7.1
juniper juniper_installer_service_client 7.1
juniper juniper_installer_service_client 7.1
juniper juniper_installer_service_client 7.1
juniper juniper_installer_service_client 7.1
juniper juniper_installer_service_client 7.2
juniper juniper_installer_service_client 7.2
juniper juniper_installer_service_client 7.2
juniper juniper_installer_service_client 7.2
juniper juniper_installer_service_client 7.2
juniper juniper_installer_service_client 7.2
juniper juniper_installer_service_client 7.2
juniper juniper_installer_service_client 7.2
juniper juniper_installer_service_client 7.2
juniper juniper_installer_service_client 7.2
juniper juniper_installer_service_client 7.2
juniper juniper_installer_service_client 7.3
juniper juniper_installer_service_client 7.3
juniper juniper_installer_service_client 7.3
juniper juniper_installer_service_client 7.3
juniper juniper_installer_service_client 7.3
juniper juniper_installer_service_client 7.3
juniper juniper_installer_service_client 7.3
juniper juniper_installer_service_client 7.3
juniper juniper_installer_service_client 7.3
juniper juniper_installer_service_client 7.3
juniper juniper_installer_service_client 7.3
juniper juniper_installer_service_client 7.3
juniper juniper_installer_service_client 7.3
juniper juniper_installer_service_client 7.4
juniper juniper_installer_service_client 7.4
juniper juniper_installer_service_client 7.4
juniper juniper_installer_service_client 7.4
juniper juniper_installer_service_client 7.4
juniper junos_pulse_client *
juniper junos_pulse_client 4.0
juniper junos_pulse_client 4.0
juniper junos_pulse_client 4.0
juniper junos_pulse_client 4.0

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:juniper:juniper_installer_service_client:7.1:r1.1:*:*:*:*:*:*",
              "matchCriteriaId": "7AC1F1E8-582A-446B-B06D-FBBF4F35F392",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:juniper:juniper_installer_service_client:7.1:r10:*:*:*:*:*:*",
              "matchCriteriaId": "7A8A22F4-C969-4350-819B-8DEE2D6AAD10",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:juniper:juniper_installer_service_client:7.1:r11:*:*:*:*:*:*",
              "matchCriteriaId": "0D9E578D-4A60-417A-B085-49713D8C94C7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:juniper:juniper_installer_service_client:7.1:r12:*:*:*:*:*:*",
              "matchCriteriaId": "253A7A34-AF75-4DB1-B6AA-CA13D116FA97",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:juniper:juniper_installer_service_client:7.1:r13:*:*:*:*:*:*",
              "matchCriteriaId": "516355CA-5D60-4064-B068-AE231FD2F909",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:juniper:juniper_installer_service_client:7.1:r14:*:*:*:*:*:*",
              "matchCriteriaId": "29C9D09A-008F-4733-9B56-EF70B425235C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:juniper:juniper_installer_service_client:7.1:r15:*:*:*:*:*:*",
              "matchCriteriaId": "22955890-0D5D-45A5-9F0C-78F970766086",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:juniper:juniper_installer_service_client:7.1:r16:*:*:*:*:*:*",
              "matchCriteriaId": "ADECC8CD-C484-4BB5-8815-4013594A5D0E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:juniper:juniper_installer_service_client:7.1:r17:*:*:*:*:*:*",
              "matchCriteriaId": "ED312AE3-CFB5-4FAA-8EE4-0BEE31F5BAFE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:juniper:juniper_installer_service_client:7.1:r2:*:*:*:*:*:*",
              "matchCriteriaId": "AD79E474-3A75-41A3-910D-E219D66ED983",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:juniper:juniper_installer_service_client:7.1:r3:*:*:*:*:*:*",
              "matchCriteriaId": "26190BAF-FB60-488D-8119-657ADE6C8BD6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:juniper:juniper_installer_service_client:7.1:r4:*:*:*:*:*:*",
              "matchCriteriaId": "E9844E36-6C46-4AD3-9C9F-57D7A0EA3716",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:juniper:juniper_installer_service_client:7.1:r4.1:*:*:*:*:*:*",
              "matchCriteriaId": "0C77826B-B1FA-435B-992E-80559C1B9E86",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:juniper:juniper_installer_service_client:7.1:r4.2:*:*:*:*:*:*",
              "matchCriteriaId": "DA3DE059-5DD9-4505-B983-D1833F84E762",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:juniper:juniper_installer_service_client:7.1:r5:*:*:*:*:*:*",
              "matchCriteriaId": "7812340E-5E68-4A0E-A517-6C04346D98F2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:juniper:juniper_installer_service_client:7.1:r6:*:*:*:*:*:*",
              "matchCriteriaId": "0F711FE7-3112-406B-8C42-F974E677BD95",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:juniper:juniper_installer_service_client:7.1:r7:*:*:*:*:*:*",
              "matchCriteriaId": "D1AB235A-FF6E-4996-85B7-FCE141585056",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:juniper:juniper_installer_service_client:7.1:r8:*:*:*:*:*:*",
              "matchCriteriaId": "0EDF7B8E-CB33-4BEF-8FAA-736E9FD4ACF8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:juniper:juniper_installer_service_client:7.1:r9:*:*:*:*:*:*",
              "matchCriteriaId": "F01E9223-9861-4D5E-9188-F649D9CC2EE9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:juniper:juniper_installer_service_client:7.2:r1.0:*:*:*:*:*:*",
              "matchCriteriaId": "9E2712CC-E71D-42CA-9C10-66020AAA32D2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:juniper:juniper_installer_service_client:7.2:r1.1:*:*:*:*:*:*",
              "matchCriteriaId": "E8EA13B9-F445-4A6F-917A-A596D5DD6C58",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:juniper:juniper_installer_service_client:7.2:r10.0:*:*:*:*:*:*",
              "matchCriteriaId": "E11A74ED-115D-4A78-8EA7-0B4B00B341B2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:juniper:juniper_installer_service_client:7.2:r11.0:*:*:*:*:*:*",
              "matchCriteriaId": "33A32900-1CC0-41D5-AE80-926C58A61783",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:juniper:juniper_installer_service_client:7.2:r12.0:*:*:*:*:*:*",
              "matchCriteriaId": "8E4CD7DC-D23C-44E0-BF57-0BD78C353CD5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:juniper:juniper_installer_service_client:7.2:r2.0:*:*:*:*:*:*",
              "matchCriteriaId": "E57E64F2-417B-4249-AA2D-31E40CCEE89B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:juniper:juniper_installer_service_client:7.2:r3.0:*:*:*:*:*:*",
              "matchCriteriaId": "F3567DC0-E0DA-487E-A897-7FEC0FD1A1C5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:juniper:juniper_installer_service_client:7.2:r4.0:*:*:*:*:*:*",
              "matchCriteriaId": "916D4C11-75A9-4963-95B9-DC94776AE390",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:juniper:juniper_installer_service_client:7.2:r5.0:*:*:*:*:*:*",
              "matchCriteriaId": "7A218718-DC6D-4DE2-8AE0-B5F39D6C2A1C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:juniper:juniper_installer_service_client:7.2:r8.0:*:*:*:*:*:*",
              "matchCriteriaId": "A5FE4572-9CD7-4140-AC16-8A68BDD85831",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:juniper:juniper_installer_service_client:7.2:r9.0:*:*:*:*:*:*",
              "matchCriteriaId": "664D023B-6554-4567-9302-803786E9A754",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:juniper:juniper_installer_service_client:7.3:r1.0:*:*:*:*:*:*",
              "matchCriteriaId": "23A8B58F-2EA8-4BC4-9F00-605DE8EF818A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:juniper:juniper_installer_service_client:7.3:r10.0:*:*:*:*:*:*",
              "matchCriteriaId": "5A13C713-0F5F-495E-9A66-3992C94DFAC7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:juniper:juniper_installer_service_client:7.3:r11.0:*:*:*:*:*:*",
              "matchCriteriaId": "FA127B06-A601-446B-AF57-71F2571DF20F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:juniper:juniper_installer_service_client:7.3:r2.0:*:*:*:*:*:*",
              "matchCriteriaId": "3506CB33-8A18-4C56-B49B-135A808A4329",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:juniper:juniper_installer_service_client:7.3:r3.0:*:*:*:*:*:*",
              "matchCriteriaId": "7C306528-2D8A-4B40-9AE6-DDAC8C6578A8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:juniper:juniper_installer_service_client:7.3:r4.0:*:*:*:*:*:*",
              "matchCriteriaId": "4C0B3CE6-F43D-4A4C-AF1E-5D39AA363040",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:juniper:juniper_installer_service_client:7.3:r4.1:*:*:*:*:*:*",
              "matchCriteriaId": "F929632E-9CDC-4867-A67C-BB820E907F72",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:juniper:juniper_installer_service_client:7.3:r5.0:*:*:*:*:*:*",
              "matchCriteriaId": "41E53E22-9235-48BF-A179-DA4CBE569F87",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:juniper:juniper_installer_service_client:7.3:r6.0:*:*:*:*:*:*",
              "matchCriteriaId": "D958EAF8-8314-467B-8DEF-5BED4E53F145",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:juniper:juniper_installer_service_client:7.3:r7.0:*:*:*:*:*:*",
              "matchCriteriaId": "4C79D74D-69AB-40F0-9F3D-BBA8D36DD3F4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:juniper:juniper_installer_service_client:7.3:r8.0:*:*:*:*:*:*",
              "matchCriteriaId": "0EFDA675-385C-4475-AE36-B890C543B2F5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:juniper:juniper_installer_service_client:7.3:r9.0:*:*:*:*:*:*",
              "matchCriteriaId": "02BD941F-8320-4BF9-950A-539D40C675F4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:juniper:juniper_installer_service_client:7.3:r9.1:*:*:*:*:*:*",
              "matchCriteriaId": "B5C8A02D-2DC8-485B-9537-192A31F0A0A3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:juniper:juniper_installer_service_client:7.4:r1.0:*:*:*:*:*:*",
              "matchCriteriaId": "3618DDAC-720E-4CC8-A00B-395EA5BDDFD5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:juniper:juniper_installer_service_client:7.4:r2.0:*:*:*:*:*:*",
              "matchCriteriaId": "F682393A-23E0-4F5D-9820-64A278489F7F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:juniper:juniper_installer_service_client:7.4:r3.0:*:*:*:*:*:*",
              "matchCriteriaId": "CAFF030E-E254-4652-A08A-6784C3094F20",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:juniper:juniper_installer_service_client:7.4:r4.0:*:*:*:*:*:*",
              "matchCriteriaId": "C12030C3-446D-465F-BEB0-44B87307D484",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:juniper:juniper_installer_service_client:7.4:r5.0:*:*:*:*:*:*",
              "matchCriteriaId": "E60FD5A3-F100-45D7-B3EC-FEF64B0748DC",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:juniper:junos_pulse_client:*:r5:*:*:*:*:*:*",
              "matchCriteriaId": "8799B7F9-2879-48CA-9EB8-F427281AD9B7",
              "versionEndIncluding": "4.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:juniper:junos_pulse_client:4.0:r1:*:*:*:*:*:*",
              "matchCriteriaId": "003A5E74-4620-4716-97F9-A4E4FAF87A22",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:juniper:junos_pulse_client:4.0:r2:*:*:*:*:*:*",
              "matchCriteriaId": "735AABB3-BDD0-49C0-8BD3-812375C0CAFC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:juniper:junos_pulse_client:4.0:r3:*:*:*:*:*:*",
              "matchCriteriaId": "BB9841D1-D2D0-4240-8D2A-A4352998FF36",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:juniper:junos_pulse_client:4.0:r4:*:*:*:*:*:*",
              "matchCriteriaId": "6299A09C-F2A0-4554-85D4-5C6462700179",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Juniper Installer Service (JIS) Client 7.x before 7.4R6 for Windows and Junos Pulse Client before 4.0R6 allows local users to gain privileges via unspecified vectors."
    },
    {
      "lang": "es",
      "value": "Juniper Installer Service (JIS) Client 7.x anterior a 7.4R6 para Windows y Junos Pulse Client anterior a 4.0R6 permiten a usuarios locales ganar privilegios a trav\u00e9s de vectores no especificados."
    }
  ],
  "id": "CVE-2014-3811",
  "lastModified": "2025-04-12T10:46:40.837",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "LOCAL",
          "authentication": "NONE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 7.2,
          "confidentialityImpact": "COMPLETE",
          "integrityImpact": "COMPLETE",
          "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 10.0,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2014-09-29T14:55:08.673",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10644"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10644"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-264"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

CVE-2014-3811 (GCVE-0-2014-3811)

Vulnerability from cvelistv5 – Published: 2014-09-29 14:00 – Updated: 2024-08-06 10:57
VLAI?
Summary
Juniper Installer Service (JIS) Client 7.x before 7.4R6 for Windows and Junos Pulse Client before 4.0R6 allows local users to gain privileges via unspecified vectors.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T10:57:17.329Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10644"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2014-09-10T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Juniper Installer Service (JIS) Client 7.x before 7.4R6 for Windows and Junos Pulse Client before 4.0R6 allows local users to gain privileges via unspecified vectors."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2014-09-29T11:57:00",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10644"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2014-3811",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Juniper Installer Service (JIS) Client 7.x before 7.4R6 for Windows and Junos Pulse Client before 4.0R6 allows local users to gain privileges via unspecified vectors."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10644",
              "refsource": "CONFIRM",
              "url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10644"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2014-3811",
    "datePublished": "2014-09-29T14:00:00",
    "dateReserved": "2014-05-21T00:00:00",
    "dateUpdated": "2024-08-06T10:57:17.329Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2014-3811 (GCVE-0-2014-3811)

Vulnerability from nvd – Published: 2014-09-29 14:00 – Updated: 2024-08-06 10:57
VLAI?
Summary
Juniper Installer Service (JIS) Client 7.x before 7.4R6 for Windows and Junos Pulse Client before 4.0R6 allows local users to gain privileges via unspecified vectors.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T10:57:17.329Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10644"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2014-09-10T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Juniper Installer Service (JIS) Client 7.x before 7.4R6 for Windows and Junos Pulse Client before 4.0R6 allows local users to gain privileges via unspecified vectors."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2014-09-29T11:57:00",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10644"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2014-3811",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Juniper Installer Service (JIS) Client 7.x before 7.4R6 for Windows and Junos Pulse Client before 4.0R6 allows local users to gain privileges via unspecified vectors."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10644",
              "refsource": "CONFIRM",
              "url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10644"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2014-3811",
    "datePublished": "2014-09-29T14:00:00",
    "dateReserved": "2014-05-21T00:00:00",
    "dateUpdated": "2024-08-06T10:57:17.329Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}