VAR-201306-0317
Vulnerability from variot - Updated: 2023-12-18 13:44Juniper Junos Pulse Secure Access Service (aka SSL VPN) with IVE OS 7.0r2 through 7.0r8 and 7.1r1 through 7.1r5 and Junos Pulse Access Control Service (aka UAC) with UAC OS 4.1r1 through 4.1r5 include a test Certification Authority (CA) certificate in the Trusted Server CAs list, which makes it easier for man-in-the-middle attackers to spoof SSL servers by leveraging control over that test CA. Juniper Networks Junos Pulse Secure Access Service and Pulse Access Control Service are prone to a security vulnerability that allows attackers to perform man-in-the-middle attacks. Remote attackers can exploit this issue to gain access to sensitive information; other attacks are also possible
Show details on source website{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"configurations": {
"@id": "https://www.variotdbs.pl/ref/configurations"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-201306-0317",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "junos pulse secure access service",
"scope": "eq",
"trust": 1.6,
"vendor": "juniper",
"version": "7.1r4"
},
{
"model": "junos pulse secure access service",
"scope": "eq",
"trust": 1.6,
"vendor": "juniper",
"version": "7.0r8"
},
{
"model": "junos pulse access control service",
"scope": "eq",
"trust": 1.6,
"vendor": "juniper",
"version": "4.1r4"
},
{
"model": "junos pulse secure access service",
"scope": "eq",
"trust": 1.6,
"vendor": "juniper",
"version": "7.1r1.1"
},
{
"model": "junos pulse access control service",
"scope": "eq",
"trust": 1.6,
"vendor": "juniper",
"version": "4.1r2"
},
{
"model": "junos pulse secure access service",
"scope": "eq",
"trust": 1.6,
"vendor": "juniper",
"version": "7.0r4"
},
{
"model": "junos pulse access control service",
"scope": "eq",
"trust": 1.6,
"vendor": "juniper",
"version": "4.1r5"
},
{
"model": "junos pulse access control service",
"scope": "eq",
"trust": 1.6,
"vendor": "juniper",
"version": "4.1r1.1"
},
{
"model": "junos pulse access control service",
"scope": "eq",
"trust": 1.6,
"vendor": "juniper",
"version": "4.1r1"
},
{
"model": "junos pulse access control service",
"scope": "eq",
"trust": 1.6,
"vendor": "juniper",
"version": "4.1r3"
},
{
"model": "junos pulse secure access service",
"scope": "eq",
"trust": 1.0,
"vendor": "juniper",
"version": "7.0r3"
},
{
"model": "junos pulse secure access service",
"scope": "eq",
"trust": 1.0,
"vendor": "juniper",
"version": "7.0r2"
},
{
"model": "junos pulse secure access service",
"scope": "eq",
"trust": 1.0,
"vendor": "juniper",
"version": "7.0r7"
},
{
"model": "junos pulse secure access service",
"scope": "eq",
"trust": 1.0,
"vendor": "juniper",
"version": "7.1r5"
},
{
"model": "junos pulse secure access service",
"scope": "eq",
"trust": 1.0,
"vendor": "juniper",
"version": "7.0r5.1"
},
{
"model": "junos pulse secure access service",
"scope": "eq",
"trust": 1.0,
"vendor": "juniper",
"version": "7.1r3"
},
{
"model": "junos pulse secure access service",
"scope": "eq",
"trust": 1.0,
"vendor": "juniper",
"version": "7.0r6"
},
{
"model": "junos pulse secure access service",
"scope": "eq",
"trust": 1.0,
"vendor": "juniper",
"version": "7.1r2"
},
{
"model": "junos pulse secure access service",
"scope": "eq",
"trust": 1.0,
"vendor": "juniper",
"version": "7.1r1"
},
{
"model": "junos pulse secure access service",
"scope": "eq",
"trust": 1.0,
"vendor": "juniper",
"version": "7.0r5"
},
{
"model": "junos pulse access control service",
"scope": "eq",
"trust": 0.8,
"vendor": "juniper",
"version": "4.1r1 to 4.1r5 (uac os)"
},
{
"model": "junos pulse secure access service",
"scope": "eq",
"trust": 0.8,
"vendor": "juniper",
"version": "7.0r2 to 7.0r8 (ive os)"
},
{
"model": "junos pulse secure access service",
"scope": "eq",
"trust": 0.8,
"vendor": "juniper",
"version": "7.1r1 to 7.1r5 (ive os)"
},
{
"model": "uac os 4.1r5",
"scope": null,
"trust": 0.3,
"vendor": "juniper",
"version": null
},
{
"model": "uac os 4.1r4",
"scope": null,
"trust": 0.3,
"vendor": "juniper",
"version": null
},
{
"model": "uac os 4.1r3",
"scope": null,
"trust": 0.3,
"vendor": "juniper",
"version": null
},
{
"model": "uac os 4.1r2",
"scope": null,
"trust": 0.3,
"vendor": "juniper",
"version": null
},
{
"model": "uac os 4.1r1",
"scope": null,
"trust": 0.3,
"vendor": "juniper",
"version": null
},
{
"model": "ive os 7.1r5",
"scope": null,
"trust": 0.3,
"vendor": "juniper",
"version": null
},
{
"model": "ive os 7.1r4",
"scope": null,
"trust": 0.3,
"vendor": "juniper",
"version": null
},
{
"model": "ive os 7.1r3",
"scope": null,
"trust": 0.3,
"vendor": "juniper",
"version": null
},
{
"model": "ive os 7.1r2",
"scope": null,
"trust": 0.3,
"vendor": "juniper",
"version": null
},
{
"model": "ive os 7.1r1",
"scope": null,
"trust": 0.3,
"vendor": "juniper",
"version": null
},
{
"model": "ive os 7.0r8",
"scope": null,
"trust": 0.3,
"vendor": "juniper",
"version": null
},
{
"model": "ive os 7.0r7",
"scope": null,
"trust": 0.3,
"vendor": "juniper",
"version": null
},
{
"model": "ive os 7.0r6",
"scope": null,
"trust": 0.3,
"vendor": "juniper",
"version": null
},
{
"model": "ive os 7.0r5",
"scope": null,
"trust": 0.3,
"vendor": "juniper",
"version": null
},
{
"model": "ive os 7.0r4",
"scope": null,
"trust": 0.3,
"vendor": "juniper",
"version": null
},
{
"model": "ive os 7.0r3",
"scope": null,
"trust": 0.3,
"vendor": "juniper",
"version": null
},
{
"model": "ive os 7.0r2",
"scope": null,
"trust": 0.3,
"vendor": "juniper",
"version": null
},
{
"model": "uac os 4.1r6",
"scope": "ne",
"trust": 0.3,
"vendor": "juniper",
"version": null
},
{
"model": "ive os 7.1r7",
"scope": "ne",
"trust": 0.3,
"vendor": "juniper",
"version": null
}
],
"sources": [
{
"db": "BID",
"id": "60521"
},
{
"db": "JVNDB",
"id": "JVNDB-2013-002976"
},
{
"db": "NVD",
"id": "CVE-2013-3970"
},
{
"db": "CNNVD",
"id": "CNNVD-201306-243"
}
]
},
"configurations": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/configurations#",
"children": {
"@container": "@list"
},
"cpe_match": {
"@container": "@list"
},
"data": {
"@container": "@list"
},
"nodes": {
"@container": "@list"
}
},
"data": [
{
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:juniper:junos_pulse_secure_access_service:7.0r2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:juniper:junos_pulse_secure_access_service:7.0r3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:juniper:junos_pulse_secure_access_service:7.0r4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:juniper:junos_pulse_secure_access_service:7.0r8:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:juniper:junos_pulse_secure_access_service:7.1r1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:juniper:junos_pulse_secure_access_service:7.1r1.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:juniper:junos_pulse_secure_access_service:7.1r2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:juniper:junos_pulse_secure_access_service:7.0r5.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:juniper:junos_pulse_secure_access_service:7.0r7:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:juniper:junos_pulse_secure_access_service:7.1r3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:juniper:junos_pulse_secure_access_service:7.1r5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:juniper:junos_pulse_secure_access_service:7.0r5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:juniper:junos_pulse_secure_access_service:7.0r6:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:juniper:junos_pulse_secure_access_service:7.1r4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:juniper:junos_pulse_access_control_service:4.1r1.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:juniper:junos_pulse_access_control_service:4.1r2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:juniper:junos_pulse_access_control_service:4.1r3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:juniper:junos_pulse_access_control_service:4.1r4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:juniper:junos_pulse_access_control_service:4.1r1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:juniper:junos_pulse_access_control_service:4.1r5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
]
}
],
"sources": [
{
"db": "NVD",
"id": "CVE-2013-3970"
}
]
},
"credits": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/credits#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Reported by the vendor.",
"sources": [
{
"db": "BID",
"id": "60521"
}
],
"trust": 0.3
},
"cve": "CVE-2013-3970",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [
{
"acInsufInfo": false,
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "NVD",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"exploitabilityScore": 8.6,
"impactScore": 2.9,
"integrityImpact": "PARTIAL",
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "MEDIUM",
"trust": 1.0,
"userInteractionRequired": false,
"vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
{
"acInsufInfo": null,
"accessComplexity": "Medium",
"accessVector": "Network",
"authentication": "None",
"author": "NVD",
"availabilityImpact": "None",
"baseScore": 4.3,
"confidentialityImpact": "None",
"exploitabilityScore": null,
"id": "CVE-2013-3970",
"impactScore": null,
"integrityImpact": "Partial",
"obtainAllPrivilege": null,
"obtainOtherPrivilege": null,
"obtainUserPrivilege": null,
"severity": "Medium",
"trust": 0.8,
"userInteractionRequired": null,
"vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
{
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "VULHUB",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"exploitabilityScore": 8.6,
"id": "VHN-63972",
"impactScore": 2.9,
"integrityImpact": "PARTIAL",
"severity": "MEDIUM",
"trust": 0.1,
"vectorString": "AV:N/AC:M/AU:N/C:N/I:P/A:N",
"version": "2.0"
}
],
"cvssV3": [],
"severity": [
{
"author": "NVD",
"id": "CVE-2013-3970",
"trust": 1.8,
"value": "MEDIUM"
},
{
"author": "CNNVD",
"id": "CNNVD-201306-243",
"trust": 0.6,
"value": "MEDIUM"
},
{
"author": "VULHUB",
"id": "VHN-63972",
"trust": 0.1,
"value": "MEDIUM"
}
]
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-63972"
},
{
"db": "JVNDB",
"id": "JVNDB-2013-002976"
},
{
"db": "NVD",
"id": "CVE-2013-3970"
},
{
"db": "CNNVD",
"id": "CNNVD-201306-243"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Juniper Junos Pulse Secure Access Service (aka SSL VPN) with IVE OS 7.0r2 through 7.0r8 and 7.1r1 through 7.1r5 and Junos Pulse Access Control Service (aka UAC) with UAC OS 4.1r1 through 4.1r5 include a test Certification Authority (CA) certificate in the Trusted Server CAs list, which makes it easier for man-in-the-middle attackers to spoof SSL servers by leveraging control over that test CA. Juniper Networks Junos Pulse Secure Access Service and Pulse Access Control Service are prone to a security vulnerability that allows attackers to perform man-in-the-middle attacks. \nRemote attackers can exploit this issue to gain access to sensitive information; other attacks are also possible",
"sources": [
{
"db": "NVD",
"id": "CVE-2013-3970"
},
{
"db": "JVNDB",
"id": "JVNDB-2013-002976"
},
{
"db": "BID",
"id": "60521"
},
{
"db": "VULHUB",
"id": "VHN-63972"
}
],
"trust": 1.98
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "NVD",
"id": "CVE-2013-3970",
"trust": 2.8
},
{
"db": "JUNIPER",
"id": "JSA10571",
"trust": 2.0
},
{
"db": "JVNDB",
"id": "JVNDB-2013-002976",
"trust": 0.8
},
{
"db": "CNNVD",
"id": "CNNVD-201306-243",
"trust": 0.7
},
{
"db": "BID",
"id": "60521",
"trust": 0.4
},
{
"db": "VULHUB",
"id": "VHN-63972",
"trust": 0.1
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-63972"
},
{
"db": "BID",
"id": "60521"
},
{
"db": "JVNDB",
"id": "JVNDB-2013-002976"
},
{
"db": "NVD",
"id": "CVE-2013-3970"
},
{
"db": "CNNVD",
"id": "CNNVD-201306-243"
}
]
},
"id": "VAR-201306-0317",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "VULHUB",
"id": "VHN-63972"
}
],
"trust": 0.01
},
"last_update_date": "2023-12-18T13:44:36.157000Z",
"patch": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/patch#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"title": "JSA10571",
"trust": 0.8,
"url": "http://kb.juniper.net/infocenter/index?page=content\u0026id=jsa10571"
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2013-002976"
}
]
},
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "CWE-310",
"trust": 1.9
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-63972"
},
{
"db": "JVNDB",
"id": "JVNDB-2013-002976"
},
{
"db": "NVD",
"id": "CVE-2013-3970"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 1.7,
"url": "http://kb.juniper.net/jsa10571"
},
{
"trust": 0.8,
"url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2013-3970"
},
{
"trust": 0.8,
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2013-3970"
},
{
"trust": 0.3,
"url": "https://www.juniper.net/in/en/products-services/software/junos-platform/junos-pulse/access-control/"
},
{
"trust": 0.3,
"url": "http://www.juniper.net/us/en/products-services/software/junos-platform/junos-pulse/secure-access/"
},
{
"trust": 0.3,
"url": "http://kb.juniper.net/infocenter/index?page=content\u0026id=jsa10571"
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-63972"
},
{
"db": "BID",
"id": "60521"
},
{
"db": "JVNDB",
"id": "JVNDB-2013-002976"
},
{
"db": "NVD",
"id": "CVE-2013-3970"
},
{
"db": "CNNVD",
"id": "CNNVD-201306-243"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "VULHUB",
"id": "VHN-63972"
},
{
"db": "BID",
"id": "60521"
},
{
"db": "JVNDB",
"id": "JVNDB-2013-002976"
},
{
"db": "NVD",
"id": "CVE-2013-3970"
},
{
"db": "CNNVD",
"id": "CNNVD-201306-243"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2013-06-13T00:00:00",
"db": "VULHUB",
"id": "VHN-63972"
},
{
"date": "2013-06-12T00:00:00",
"db": "BID",
"id": "60521"
},
{
"date": "2013-06-14T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2013-002976"
},
{
"date": "2013-06-13T16:47:25.930000",
"db": "NVD",
"id": "CVE-2013-3970"
},
{
"date": "2013-06-17T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201306-243"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2013-06-13T00:00:00",
"db": "VULHUB",
"id": "VHN-63972"
},
{
"date": "2013-06-12T00:00:00",
"db": "BID",
"id": "60521"
},
{
"date": "2013-06-14T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2013-002976"
},
{
"date": "2013-06-13T17:47:42.580000",
"db": "NVD",
"id": "CVE-2013-3970"
},
{
"date": "2013-06-17T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201306-243"
}
]
},
"threat_type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/threat_type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "remote",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201306-243"
}
],
"trust": 0.6
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Juniper Junos Pulse Secure Access Service and Junos Pulse Access Control Service In SSL Vulnerability impersonating a server",
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2013-002976"
}
],
"trust": 0.8
},
"type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "encryption problem",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201306-243"
}
],
"trust": 0.6
}
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…