VAR-201409-0549
Vulnerability from variot - Updated: 2023-12-18 13:57The Juniper Junos Pulse Secure Access Service (SSL VPN) devices with IVE OS 8.0 before 8.0r1, 7.4 before 7.4r5, and 7.1 before 7.1r18 allows remote attackers to conduct clickjacking attacks via unspecified vectors. Successful exploits will allow an attacker to compromise the affected application or obtain sensitive information. Other attacks are also possible. The client supports remote and mobile users to access enterprise resources with various web devices. A remote attacker can exploit this vulnerability to implement clickjacking attacks
Show details on source website{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"configurations": {
"@id": "https://www.variotdbs.pl/ref/configurations"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-201409-0549",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "junos pulse secure access service",
"scope": "eq",
"trust": 1.6,
"vendor": "juniper",
"version": "7.1r4"
},
{
"model": "junos pulse secure access service",
"scope": "eq",
"trust": 1.6,
"vendor": "juniper",
"version": "7.1r1.1"
},
{
"model": "junos pulse secure access service",
"scope": "eq",
"trust": 1.6,
"vendor": "juniper",
"version": "7.1r10"
},
{
"model": "junos pulse secure access service",
"scope": "eq",
"trust": 1.6,
"vendor": "juniper",
"version": "7.1r3"
},
{
"model": "junos pulse secure access service",
"scope": "eq",
"trust": 1.6,
"vendor": "juniper",
"version": "7.1r11"
},
{
"model": "junos pulse secure access service",
"scope": "eq",
"trust": 1.6,
"vendor": "juniper",
"version": "7.1r2"
},
{
"model": "junos pulse secure access service",
"scope": "eq",
"trust": 1.6,
"vendor": "juniper",
"version": "7.1r12"
},
{
"model": "junos pulse secure access service",
"scope": "eq",
"trust": 1.6,
"vendor": "juniper",
"version": "7.1r14"
},
{
"model": "junos pulse secure access service",
"scope": "eq",
"trust": 1.6,
"vendor": "juniper",
"version": "7.1r15"
},
{
"model": "junos pulse secure access service",
"scope": "eq",
"trust": 1.6,
"vendor": "juniper",
"version": "7.1r13"
},
{
"model": "junos pulse secure access service",
"scope": "eq",
"trust": 1.0,
"vendor": "juniper",
"version": "7.1r6"
},
{
"model": "junos pulse secure access service",
"scope": "eq",
"trust": 1.0,
"vendor": "juniper",
"version": "7.1r9"
},
{
"model": "junos pulse secure access service",
"scope": "eq",
"trust": 1.0,
"vendor": "juniper",
"version": "7.1r8"
},
{
"model": "junos pulse secure access service",
"scope": "eq",
"trust": 1.0,
"vendor": "juniper",
"version": "7.1r5"
},
{
"model": "junos pulse secure access service",
"scope": "eq",
"trust": 1.0,
"vendor": "juniper",
"version": "7.1"
},
{
"model": "junos pulse secure access service",
"scope": "eq",
"trust": 1.0,
"vendor": "juniper",
"version": "7.1r7"
},
{
"model": "junos pulse secure access service",
"scope": "eq",
"trust": 1.0,
"vendor": "juniper",
"version": "7.4"
},
{
"model": "junos pulse secure access service",
"scope": "eq",
"trust": 1.0,
"vendor": "juniper",
"version": "8.0"
},
{
"model": "junos pulse secure access service",
"scope": "eq",
"trust": 0.8,
"vendor": "juniper",
"version": "(ive os) 7.1r18"
},
{
"model": "junos pulse secure access service",
"scope": "eq",
"trust": 0.8,
"vendor": "juniper",
"version": "(ive os) 8.0r1"
},
{
"model": "junos pulse secure access service",
"scope": "lt",
"trust": 0.8,
"vendor": "juniper",
"version": "7.4"
},
{
"model": "secure access 700",
"scope": null,
"trust": 0.8,
"vendor": "juniper",
"version": null
},
{
"model": "secure access 6000",
"scope": null,
"trust": 0.8,
"vendor": "juniper",
"version": null
},
{
"model": "fips secure access 4000",
"scope": null,
"trust": 0.8,
"vendor": "juniper",
"version": null
},
{
"model": "secure access 6500",
"scope": null,
"trust": 0.8,
"vendor": "juniper",
"version": null
},
{
"model": "fips secure access 6000",
"scope": null,
"trust": 0.8,
"vendor": "juniper",
"version": null
},
{
"model": "secure access 4000",
"scope": null,
"trust": 0.8,
"vendor": "juniper",
"version": null
},
{
"model": "junos pulse secure access service",
"scope": "lt",
"trust": 0.8,
"vendor": "juniper",
"version": "8.0"
},
{
"model": "junos pulse secure access service",
"scope": "lt",
"trust": 0.8,
"vendor": "juniper",
"version": "7.1"
},
{
"model": "mag4610 gateway",
"scope": null,
"trust": 0.8,
"vendor": "juniper",
"version": null
},
{
"model": "mag2600 gateway",
"scope": null,
"trust": 0.8,
"vendor": "juniper",
"version": null
},
{
"model": "mag6611 gateway",
"scope": null,
"trust": 0.8,
"vendor": "juniper",
"version": null
},
{
"model": "secure access 4500",
"scope": null,
"trust": 0.8,
"vendor": "juniper",
"version": null
},
{
"model": "mag6610 gateway",
"scope": null,
"trust": 0.8,
"vendor": "juniper",
"version": null
},
{
"model": "secure access 2000",
"scope": null,
"trust": 0.8,
"vendor": "juniper",
"version": null
},
{
"model": "fips secure access 6500",
"scope": null,
"trust": 0.8,
"vendor": "juniper",
"version": null
},
{
"model": "secure access 2500",
"scope": null,
"trust": 0.8,
"vendor": "juniper",
"version": null
},
{
"model": "fips secure access 4500",
"scope": null,
"trust": 0.8,
"vendor": "juniper",
"version": null
},
{
"model": "junos pulse secure access service",
"scope": "eq",
"trust": 0.8,
"vendor": "juniper",
"version": "(ive os) 7.4r5"
},
{
"model": "networks ive os 7.1r6",
"scope": null,
"trust": 0.3,
"vendor": "juniper",
"version": null
},
{
"model": "networks ive os 7.1r1",
"scope": null,
"trust": 0.3,
"vendor": "juniper",
"version": null
},
{
"model": "networks ive os",
"scope": "eq",
"trust": 0.3,
"vendor": "juniper",
"version": "7.1"
}
],
"sources": [
{
"db": "BID",
"id": "69800"
},
{
"db": "JVNDB",
"id": "JVNDB-2014-004483"
},
{
"db": "NVD",
"id": "CVE-2014-3823"
},
{
"db": "CNNVD",
"id": "CNNVD-201409-996"
}
]
},
"configurations": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/configurations#",
"children": {
"@container": "@list"
},
"cpe_match": {
"@container": "@list"
},
"data": {
"@container": "@list"
},
"nodes": {
"@container": "@list"
}
},
"data": [
{
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:juniper:junos_pulse_secure_access_service:7.4:r3.0:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:juniper:junos_pulse_secure_access_service:7.4:r4.0:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:juniper:junos_pulse_secure_access_service:7.1r9:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:juniper:junos_pulse_secure_access_service:7.1r8:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:juniper:junos_pulse_secure_access_service:7.1r1.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:juniper:junos_pulse_secure_access_service:7.1r3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:juniper:junos_pulse_secure_access_service:7.1r2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:juniper:junos_pulse_secure_access_service:7.1r15:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:juniper:junos_pulse_secure_access_service:7.1r14:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:juniper:junos_pulse_secure_access_service:7.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:juniper:junos_pulse_secure_access_service:7.4:r2.0:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:juniper:junos_pulse_secure_access_service:7.1r7:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:juniper:junos_pulse_secure_access_service:7.1r5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:juniper:junos_pulse_secure_access_service:7.1r12:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:juniper:junos_pulse_secure_access_service:7.1r10:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:juniper:junos_pulse_secure_access_service:8.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:juniper:junos_pulse_secure_access_service:7.4:r1.0:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:juniper:junos_pulse_secure_access_service:7.1r6:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:juniper:junos_pulse_secure_access_service:7.1r4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:juniper:junos_pulse_secure_access_service:7.1r13:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:juniper:junos_pulse_secure_access_service:7.1r11:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
]
}
],
"sources": [
{
"db": "NVD",
"id": "CVE-2014-3823"
}
]
},
"credits": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/credits#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "The vendor reported this issue.",
"sources": [
{
"db": "BID",
"id": "69800"
}
],
"trust": 0.3
},
"cve": "CVE-2014-3823",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [
{
"acInsufInfo": false,
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "NVD",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"exploitabilityScore": 8.6,
"impactScore": 2.9,
"integrityImpact": "PARTIAL",
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "MEDIUM",
"trust": 1.0,
"userInteractionRequired": true,
"vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
{
"acInsufInfo": null,
"accessComplexity": "Medium",
"accessVector": "Network",
"authentication": "None",
"author": "NVD",
"availabilityImpact": "None",
"baseScore": 4.3,
"confidentialityImpact": "None",
"exploitabilityScore": null,
"id": "CVE-2014-3823",
"impactScore": null,
"integrityImpact": "Partial",
"obtainAllPrivilege": null,
"obtainOtherPrivilege": null,
"obtainUserPrivilege": null,
"severity": "Medium",
"trust": 0.8,
"userInteractionRequired": null,
"vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
{
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "VULHUB",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"exploitabilityScore": 8.6,
"id": "VHN-71763",
"impactScore": 2.9,
"integrityImpact": "PARTIAL",
"severity": "MEDIUM",
"trust": 0.1,
"vectorString": "AV:N/AC:M/AU:N/C:N/I:P/A:N",
"version": "2.0"
}
],
"cvssV3": [],
"severity": [
{
"author": "NVD",
"id": "CVE-2014-3823",
"trust": 1.8,
"value": "MEDIUM"
},
{
"author": "CNNVD",
"id": "CNNVD-201409-996",
"trust": 0.6,
"value": "MEDIUM"
},
{
"author": "VULHUB",
"id": "VHN-71763",
"trust": 0.1,
"value": "MEDIUM"
}
]
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-71763"
},
{
"db": "JVNDB",
"id": "JVNDB-2014-004483"
},
{
"db": "NVD",
"id": "CVE-2014-3823"
},
{
"db": "CNNVD",
"id": "CNNVD-201409-996"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "The Juniper Junos Pulse Secure Access Service (SSL VPN) devices with IVE OS 8.0 before 8.0r1, 7.4 before 7.4r5, and 7.1 before 7.1r18 allows remote attackers to conduct clickjacking attacks via unspecified vectors. \nSuccessful exploits will allow an attacker to compromise the affected application or obtain sensitive information. Other attacks are also possible. The client supports remote and mobile users to access enterprise resources with various web devices. A remote attacker can exploit this vulnerability to implement clickjacking attacks",
"sources": [
{
"db": "NVD",
"id": "CVE-2014-3823"
},
{
"db": "JVNDB",
"id": "JVNDB-2014-004483"
},
{
"db": "BID",
"id": "69800"
},
{
"db": "VULHUB",
"id": "VHN-71763"
}
],
"trust": 1.98
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "NVD",
"id": "CVE-2014-3823",
"trust": 2.8
},
{
"db": "JUNIPER",
"id": "JSA10647",
"trust": 1.7
},
{
"db": "BID",
"id": "69800",
"trust": 1.0
},
{
"db": "JVNDB",
"id": "JVNDB-2014-004483",
"trust": 0.8
},
{
"db": "CNNVD",
"id": "CNNVD-201409-996",
"trust": 0.7
},
{
"db": "VULHUB",
"id": "VHN-71763",
"trust": 0.1
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-71763"
},
{
"db": "BID",
"id": "69800"
},
{
"db": "JVNDB",
"id": "JVNDB-2014-004483"
},
{
"db": "NVD",
"id": "CVE-2014-3823"
},
{
"db": "CNNVD",
"id": "CNNVD-201409-996"
}
]
},
"id": "VAR-201409-0549",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "VULHUB",
"id": "VHN-71763"
}
],
"trust": 0.01
},
"last_update_date": "2023-12-18T13:57:42.786000Z",
"patch": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/patch#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"title": "JSA10647",
"trust": 0.8,
"url": "https://kb.juniper.net/infocenter/index?page=content\u0026id=jsa10647"
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2014-004483"
}
]
},
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "CWE-20",
"trust": 1.9
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-71763"
},
{
"db": "JVNDB",
"id": "JVNDB-2014-004483"
},
{
"db": "NVD",
"id": "CVE-2014-3823"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 1.6,
"url": "https://kb.juniper.net/infocenter/index?page=content\u0026id=jsa10647"
},
{
"trust": 0.8,
"url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-3823"
},
{
"trust": 0.8,
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2014-3823"
},
{
"trust": 0.6,
"url": "http://www.securityfocus.com/bid/69800"
},
{
"trust": 0.3,
"url": "http://www.juniper.net/"
},
{
"trust": 0.1,
"url": "https://kb.juniper.net/infocenter/index?page=content\u0026amp;id=jsa10647"
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-71763"
},
{
"db": "BID",
"id": "69800"
},
{
"db": "JVNDB",
"id": "JVNDB-2014-004483"
},
{
"db": "NVD",
"id": "CVE-2014-3823"
},
{
"db": "CNNVD",
"id": "CNNVD-201409-996"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "VULHUB",
"id": "VHN-71763"
},
{
"db": "BID",
"id": "69800"
},
{
"db": "JVNDB",
"id": "JVNDB-2014-004483"
},
{
"db": "NVD",
"id": "CVE-2014-3823"
},
{
"db": "CNNVD",
"id": "CNNVD-201409-996"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2014-09-29T00:00:00",
"db": "VULHUB",
"id": "VHN-71763"
},
{
"date": "2014-09-15T00:00:00",
"db": "BID",
"id": "69800"
},
{
"date": "2014-10-02T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2014-004483"
},
{
"date": "2014-09-29T14:55:08.767000",
"db": "NVD",
"id": "CVE-2014-3823"
},
{
"date": "2014-09-28T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201409-996"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2014-10-01T00:00:00",
"db": "VULHUB",
"id": "VHN-71763"
},
{
"date": "2014-09-15T00:00:00",
"db": "BID",
"id": "69800"
},
{
"date": "2014-10-02T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2014-004483"
},
{
"date": "2014-10-01T03:30:36.487000",
"db": "NVD",
"id": "CVE-2014-3823"
},
{
"date": "2014-10-08T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201409-996"
}
]
},
"threat_type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/threat_type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "remote",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201409-996"
}
],
"trust": 0.6
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "IVE OS of Juniper Junos Pulse Secure Access Service Vulnerabilities that can cause clickjacking attacks on devices",
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2014-004483"
}
],
"trust": 0.8
},
"type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "input validation",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201409-996"
}
],
"trust": 0.6
}
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…