Show plain JSON{"configurations": [{"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:o:juniper:junos:10.4:*:*:*:*:*:*:*", "matchCriteriaId": "45C2DA1E-12A7-4018-92CE-7621FC278025", "vulnerable": true}, {"criteria": "cpe:2.3:o:juniper:junos:11.4:*:*:*:*:*:*:*", "matchCriteriaId": "41543223-0FA9-4CBE-8DEC-717CE5FFED79", "vulnerable": true}, {"criteria": "cpe:2.3:o:juniper:junos:12.1r:*:*:*:*:*:*:*", "matchCriteriaId": "ECE31A7E-657C-49FC-B3F8-5654B0C6087E", "vulnerable": true}, {"criteria": "cpe:2.3:o:juniper:junos:12.1x44:*:*:*:*:*:*:*", "matchCriteriaId": "1B307477-C5F2-4D98-AF4C-640D326164C7", "vulnerable": true}, {"criteria": "cpe:2.3:o:juniper:junos:12.1x45:*:*:*:*:*:*:*", "matchCriteriaId": "8E747970-4C27-4B46-9163-964252CB98F6", "vulnerable": true}], "negate": false, "operator": "OR"}, {"cpeMatch": [{"criteria": "cpe:2.3:h:juniper:srx100:-:*:*:*:*:*:*:*", "matchCriteriaId": "561C1113-3D59-4DD9-ADA7-3C9ECC4632EC", "vulnerable": true}, {"criteria": "cpe:2.3:h:juniper:srx110:-:*:*:*:*:*:*:*", "matchCriteriaId": "78C6D8A0-92D3-4FD3-BCC1-CC7C87B76317", "vulnerable": true}, {"criteria": "cpe:2.3:h:juniper:srx1400:-:*:*:*:*:*:*:*", "matchCriteriaId": "927EAB8B-EC3B-4B12-85B9-5517EBA49A30", "vulnerable": true}, {"criteria": "cpe:2.3:h:juniper:srx210:-:*:*:*:*:*:*:*", "matchCriteriaId": "CD647C15-A686-4C8F-A766-BC29404C0FED", "vulnerable": true}, {"criteria": "cpe:2.3:h:juniper:srx220:-:*:*:*:*:*:*:*", "matchCriteriaId": "45AB1622-1AED-4CD7-98F1-67779CDFC321", "vulnerable": true}, {"criteria": "cpe:2.3:h:juniper:srx240:-:*:*:*:*:*:*:*", "matchCriteriaId": "89276D88-3B8D-4168-A2CD-0920297485F2", "vulnerable": true}, {"criteria": "cpe:2.3:h:juniper:srx3400:-:*:*:*:*:*:*:*", "matchCriteriaId": "746C3882-2A5B-4215-B259-EB1FD60C513D", "vulnerable": true}, {"criteria": "cpe:2.3:h:juniper:srx3600:-:*:*:*:*:*:*:*", "matchCriteriaId": "DDE64EC0-7E42-43AF-A8FA-1A233BD3E3BC", "vulnerable": true}, {"criteria": "cpe:2.3:h:juniper:srx550:-:*:*:*:*:*:*:*", "matchCriteriaId": "62FC145A-D477-4C86-89E7-F70F52773801", "vulnerable": true}, {"criteria": "cpe:2.3:h:juniper:srx5600:-:*:*:*:*:*:*:*", "matchCriteriaId": "68CA098D-CBE4-4E62-9EC0-43E1B6098710", "vulnerable": true}, {"criteria": "cpe:2.3:h:juniper:srx5800:-:*:*:*:*:*:*:*", "matchCriteriaId": "66F474D4-79B6-4525-983C-9A9011BD958B", "vulnerable": true}, {"criteria": "cpe:2.3:h:juniper:srx650:-:*:*:*:*:*:*:*", "matchCriteriaId": "8AA424D4-4DBF-4E8C-96B8-E37741B5403E", "vulnerable": true}], "negate": false, "operator": "OR"}], "operator": "AND"}], "descriptions": [{"lang": "en", "value": "Juniper Junos before 10.4 before 10.4R16, 11.4 before 11.4R8, 12.1R before 12.1R7, 12.1X44 before 12.1X44-D20, and 12.1X45 before 12.1X45-D10 on SRX Series service gateways, when used as a UAC enforcer and captive portal is enabled, allows remote attackers to cause a denial of service (flowd crash) via a crafted HTTP message."}, {"lang": "es", "value": "Juniper Junos anterior a la versi\u00f3n 10.4 anterior a 10.4R16, 11.4 anterior a la versi\u00f3n 11.4R8, 12.1R anterior a 12.1R7, 12.1X44 anterior a la versi\u00f3n 12.1X44-D20, y 12.1X45 anterior a 12.1X45-D10 en pasarelas de servicio SRX Series, cuando se usa como un agente UAC y el portal cautivo est\u00e1 activado, permite a atacantes remotos provocar una denegaci\u00f3n de servicio (cuelgue flowd) a trav\u00e9s de un mensaje HTTP manipulado."}], "id": "CVE-2014-0618", "lastModified": "2024-11-21T02:02:30.550", "metrics": {"cvssMetricV2": [{"acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": {"accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0"}, "exploitabilityScore": 10.0, "impactScore": 6.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false}]}, "published": "2014-01-11T04:44:42.617", "references": [{"source": "cve@mitre.org", "url": "http://osvdb.org/101864"}, {"source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/64769"}, {"source": "cve@mitre.org", "url": "http://www.securitytracker.com/id/1029584"}, {"source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/90238"}, {"source": "cve@mitre.org", "tags": ["Vendor Advisory"], "url": "https://kb.juniper.net/InfoCenter/index?page=content&id=JSA10611"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://osvdb.org/101864"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/64769"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id/1029584"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/90238"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Vendor Advisory"], "url": "https://kb.juniper.net/InfoCenter/index?page=content&id=JSA10611"}], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [{"description": [{"lang": "en", "value": "NVD-CWE-noinfo"}], "source": "nvd@nist.gov", "type": "Primary"}]}