var-201410-1108
Vulnerability from variot
The Juniper SRX Series devices with Junos 11.4 before 11.4R12-S4, 12.1X44 before 12.1X44-D40, 12.1X45 before 12.1X45-D30, 12.1X46 before 12.1X46-D25, and 12.1X47 before 12.1X47-D10, when an Application Layer Gateway (ALG) is enabled, allows remote attackers to cause a denial of service (flowd crash) via a crafted packet. Juniper Junos is prone to a remote denial-of-service vulnerability. An attacker can exploit this issue to cause an affected device to crash, denying service to legitimate users. Note: This issue affects on SRX series devices. Juniper Networks SRX Series devices with Junos are SRX series devices of Juniper Networks (Juniper Networks) running the Junos operating system. The following versions are affected: Juniper Networks Juniper SRX Series devices with Junos 11.4R12-S4 prior to 11.4, 12.1X44 prior to 12.1X44-D40, 12.1X45 prior to 12.1X45-D30, 12.1X46 prior to 12.1X46-D25, 12.1X47 -D10 before 12.1X47 version
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201410-1108", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "junos", "scope": "eq", "trust": 1.9, "vendor": "juniper", "version": "12.1x47" }, { "model": "junos", "scope": "eq", "trust": 1.9, "vendor": "juniper", "version": "12.1x46" }, { "model": "junos", "scope": "eq", "trust": 1.9, "vendor": "juniper", "version": "12.1x45" }, { "model": "junos", "scope": "eq", "trust": 1.9, "vendor": "juniper", "version": "12.1x44" }, { "model": "junos", "scope": "eq", "trust": 1.6, "vendor": "juniper", "version": "12.1" }, { "model": "junos", "scope": "eq", "trust": 1.6, "vendor": "juniper", "version": "11.4" }, { "model": "srx5800", "scope": "eq", "trust": 1.0, "vendor": "juniper", "version": null }, { "model": "srx550", "scope": "eq", "trust": 1.0, "vendor": "juniper", "version": null }, { "model": "srx110", "scope": "eq", "trust": 1.0, "vendor": "juniper", "version": null }, { "model": "srx5600", "scope": "eq", "trust": 1.0, "vendor": "juniper", "version": null }, { "model": "srx220", "scope": "eq", "trust": 1.0, "vendor": "juniper", "version": null }, { "model": "srx650", "scope": "eq", "trust": 1.0, "vendor": "juniper", "version": null }, { "model": "srx3600", "scope": "eq", "trust": 1.0, "vendor": "juniper", "version": null }, { "model": "srx240", "scope": "eq", "trust": 1.0, "vendor": "juniper", "version": null }, { "model": "srx3400", "scope": "eq", "trust": 1.0, "vendor": "juniper", "version": null }, { "model": "srx1400", "scope": "eq", "trust": 1.0, "vendor": "juniper", "version": null }, { "model": "srx100", "scope": "eq", "trust": 1.0, "vendor": "juniper", "version": null }, { "model": "srx210", "scope": "eq", "trust": 1.0, "vendor": "juniper", "version": null }, { "model": "junos os", "scope": "lt", "trust": 0.8, "vendor": "juniper", "version": "12.1x44" }, { "model": "srx3400", "scope": null, "trust": 0.8, "vendor": "juniper", "version": null }, { "model": "junos os", "scope": "lt", "trust": 0.8, "vendor": "juniper", "version": "11.4" }, { "model": "srx210", "scope": null, "trust": 0.8, "vendor": "juniper", "version": null }, { "model": "srx650", "scope": null, "trust": 0.8, "vendor": "juniper", "version": null }, { "model": "junos os", "scope": "eq", "trust": 0.8, "vendor": "juniper", "version": "11.4r12-s4" }, { "model": "srx550", "scope": null, "trust": 0.8, "vendor": "juniper", "version": null }, { "model": "srx5800", "scope": null, "trust": 0.8, "vendor": "juniper", "version": null }, { "model": "junos os", "scope": "eq", "trust": 0.8, "vendor": "juniper", "version": "12.1x44-d40" }, { "model": "junos os", "scope": "lt", "trust": 0.8, "vendor": "juniper", "version": "12.1x45" }, { "model": "srx100", "scope": null, "trust": 0.8, "vendor": "juniper", "version": null }, { "model": "junos os", "scope": "eq", "trust": 0.8, "vendor": "juniper", "version": "12.1x47-d11" }, { "model": "junos os", "scope": "lt", "trust": 0.8, "vendor": "juniper", "version": "12.1x46" }, { "model": "srx220", "scope": null, "trust": 0.8, "vendor": "juniper", "version": null }, { "model": "srx5600", "scope": null, "trust": 0.8, "vendor": "juniper", "version": null }, { "model": "srx5400", "scope": null, "trust": 0.8, "vendor": "juniper", "version": null }, { "model": "srx110", "scope": null, "trust": 0.8, "vendor": "juniper", "version": null }, { "model": "junos os", "scope": "lt", "trust": 0.8, "vendor": "juniper", "version": "12.1x47" }, { "model": "srx240", "scope": null, "trust": 0.8, "vendor": "juniper", "version": null }, { "model": "junos os", "scope": "eq", "trust": 0.8, "vendor": "juniper", "version": "12.1x46-d25" }, { "model": "srx1400", "scope": null, "trust": 0.8, "vendor": "juniper", "version": null }, { "model": "junos os", "scope": "eq", "trust": 0.8, "vendor": "juniper", "version": "12.1x45-d30" }, { "model": "srx3600", "scope": null, "trust": 0.8, "vendor": "juniper", "version": null }, { "model": "junos 12.1x46-d20", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "junos 12.1x46-d10", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "junos 12.1x45-d25", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "junos 12.1x45-d20", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "junos 12.1x45-d10", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "junos d15", "scope": "eq", "trust": 0.3, "vendor": "juniper", "version": "12.1x45-" }, { "model": "junos 12.1x44-d35", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "junos 12.1x44-d34", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "junos 12.1x44-d32", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "junos 12.1x44-d30.4", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "junos 12.1x44-d30", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "junos 12.1x44-d26", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "junos 12.1x44-d20.3", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "junos 12.1x44-d20", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "junos 11.4r12", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "junos 12.1x47-d10", "scope": "ne", "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "junos 12.1x46-d25", "scope": "ne", "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "junos 12.1x45-d30", "scope": "ne", "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "junos 12.1x44-d40", "scope": "ne", "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "junos 11.4r12-s4", "scope": "ne", "trust": 0.3, "vendor": "juniper", "version": null } ], "sources": [ { "db": "BID", "id": "70366" }, { "db": "JVNDB", "id": "JVNDB-2014-004847" }, { "db": "NVD", "id": "CVE-2014-3825" }, { "db": "CNNVD", "id": "CNNVD-201410-259" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:juniper:junos:12.1x47:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:juniper:junos:12.1x44:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:juniper:junos:12.1x45:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:juniper:junos:12.1x46:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:juniper:junos:12.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:juniper:junos:11.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:juniper:srx1400:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:juniper:srx210:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:juniper:srx220:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:juniper:srx240:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:juniper:srx5800:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:juniper:srx650:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:juniper:srx110:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:juniper:srx3400:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:juniper:srx550:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:juniper:srx100:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:juniper:srx3600:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:juniper:srx5600:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2014-3825" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The vendor reported this issue.", "sources": [ { "db": "BID", "id": "70366" } ], "trust": 0.3 }, "cve": "CVE-2014-3825", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 8.6, "impactScore": 6.4, "integrityImpact": "PARTIAL", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Medium", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Partial", "baseScore": 6.8, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "CVE-2014-3825", "impactScore": null, "integrityImpact": "Partial", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 8.6, "id": "VHN-71765", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:M/AU:N/C:P/I:P/A:P", "version": "2.0" } ], "cvssV3": [], "severity": [ { "author": "NVD", "id": "CVE-2014-3825", "trust": 1.8, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-201410-259", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-71765", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-71765" }, { "db": "JVNDB", "id": "JVNDB-2014-004847" }, { "db": "NVD", "id": "CVE-2014-3825" }, { "db": "CNNVD", "id": "CNNVD-201410-259" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The Juniper SRX Series devices with Junos 11.4 before 11.4R12-S4, 12.1X44 before 12.1X44-D40, 12.1X45 before 12.1X45-D30, 12.1X46 before 12.1X46-D25, and 12.1X47 before 12.1X47-D10, when an Application Layer Gateway (ALG) is enabled, allows remote attackers to cause a denial of service (flowd crash) via a crafted packet. Juniper Junos is prone to a remote denial-of-service vulnerability. \nAn attacker can exploit this issue to cause an affected device to crash, denying service to legitimate users. \nNote: This issue affects on SRX series devices. Juniper Networks SRX Series devices with Junos are SRX series devices of Juniper Networks (Juniper Networks) running the Junos operating system. The following versions are affected: Juniper Networks Juniper SRX Series devices with Junos 11.4R12-S4 prior to 11.4, 12.1X44 prior to 12.1X44-D40, 12.1X45 prior to 12.1X45-D30, 12.1X46 prior to 12.1X46-D25, 12.1X47 -D10 before 12.1X47 version", "sources": [ { "db": "NVD", "id": "CVE-2014-3825" }, { "db": "JVNDB", "id": "JVNDB-2014-004847" }, { "db": "BID", "id": "70366" }, { "db": "VULHUB", "id": "VHN-71765" } ], "trust": 1.98 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2014-3825", "trust": 2.8 }, { "db": "JUNIPER", "id": "JSA10650", "trust": 2.0 }, { "db": "SECTRACK", "id": "1031007", "trust": 1.1 }, { "db": "JVNDB", "id": "JVNDB-2014-004847", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201410-259", "trust": 0.7 }, { "db": "BID", "id": "70366", "trust": 0.4 }, { "db": "VULHUB", "id": "VHN-71765", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-71765" }, { "db": "BID", "id": "70366" }, { "db": "JVNDB", "id": "JVNDB-2014-004847" }, { "db": "NVD", "id": "CVE-2014-3825" }, { "db": "CNNVD", "id": "CNNVD-201410-259" } ] }, "id": "VAR-201410-1108", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-71765" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T12:51:50.531000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "JSA10650", "trust": 0.8, "url": "https://kb.juniper.net/infocenter/index?page=content\u0026id=jsa10650" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2014-004847" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-20", "trust": 1.9 } ], "sources": [ { "db": "VULHUB", "id": "VHN-71765" }, { "db": "JVNDB", "id": "JVNDB-2014-004847" }, { "db": "NVD", "id": "CVE-2014-3825" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.6, "url": "https://kb.juniper.net/infocenter/index?page=content\u0026id=jsa10650" }, { "trust": 1.1, "url": "http://www.securitytracker.com/id/1031007" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-3825" }, { "trust": 0.8, "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2014-3825" }, { "trust": 0.3, "url": "http://www.juniper.net/" }, { "trust": 0.3, "url": "http://kb.juniper.net/infocenter/index?page=content\u0026id=jsa10650\u0026cat=sirt_1\u0026actp=list" }, { "trust": 0.1, "url": "https://kb.juniper.net/infocenter/index?page=content\u0026amp;id=jsa10650" } ], "sources": [ { "db": "VULHUB", "id": "VHN-71765" }, { "db": "BID", "id": "70366" }, { "db": "JVNDB", "id": "JVNDB-2014-004847" }, { "db": "NVD", "id": "CVE-2014-3825" }, { "db": "CNNVD", "id": "CNNVD-201410-259" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-71765" }, { "db": "BID", "id": "70366" }, { "db": "JVNDB", "id": "JVNDB-2014-004847" }, { "db": "NVD", "id": "CVE-2014-3825" }, { "db": "CNNVD", "id": "CNNVD-201410-259" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2014-10-14T00:00:00", "db": "VULHUB", "id": "VHN-71765" }, { "date": "2014-10-08T00:00:00", "db": "BID", "id": "70366" }, { "date": "2014-10-20T00:00:00", "db": "JVNDB", "id": "JVNDB-2014-004847" }, { "date": "2014-10-14T14:55:05.070000", "db": "NVD", "id": "CVE-2014-3825" }, { "date": "2014-10-15T00:00:00", "db": "CNNVD", "id": "CNNVD-201410-259" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2015-11-05T00:00:00", "db": "VULHUB", "id": "VHN-71765" }, { "date": "2014-10-08T00:00:00", "db": "BID", "id": "70366" }, { "date": "2015-12-02T00:00:00", "db": "JVNDB", "id": "JVNDB-2014-004847" }, { "date": "2015-11-05T16:22:04.987000", "db": "NVD", "id": "CVE-2014-3825" }, { "date": "2014-10-16T00:00:00", "db": "CNNVD", "id": "CNNVD-201410-259" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201410-259" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Junos of Juniper SRX Service operation interruption in series drivers (DoS) Vulnerabilities", "sources": [ { "db": "JVNDB", "id": "JVNDB-2014-004847" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "input validation", "sources": [ { "db": "CNNVD", "id": "CNNVD-201410-259" } ], "trust": 0.6 } }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.