Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2014-9297 (GCVE-0-2014-9297)
Vulnerability from cvelistv5 – Published: 2015-10-04 20:00 – Updated: 2015-10-04 19:57DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2014-9750, CVE-2014-9751. Reason: this ID was intended for one issue, but was associated with two issues. Notes: All CVE users should consult CVE-2014-9750 and CVE-2014-9751 to identify the ID or IDs of interest. All references and descriptions in this candidate have been removed to prevent accidental usage
Show details on NVD website{
"containers": {
"cna": {
"providerMetadata": {
"dateUpdated": "2015-10-04T19:57:01.000Z",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"rejectedReasons": [
{
"lang": "en",
"value": "DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2014-9750, CVE-2014-9751. Reason: this ID was intended for one issue, but was associated with two issues. Notes: All CVE users should consult CVE-2014-9750 and CVE-2014-9751 to identify the ID or IDs of interest. All references and descriptions in this candidate have been removed to prevent accidental usage"
}
]
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2014-9297",
"datePublished": "2015-10-04T20:00:00.000Z",
"dateRejected": "2015-10-04T19:57:01.000Z",
"dateReserved": "2014-12-05T00:00:00.000Z",
"dateUpdated": "2015-10-04T19:57:01.000Z",
"state": "REJECTED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.0"
}
GSD-2014-9297
Vulnerability from gsd - Updated: 2023-12-13 01:22{
"GSD": {
"alias": "CVE-2014-9297",
"description": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2014-9750, CVE-2014-9751. Reason: this ID was intended for one issue, but was associated with two issues. Notes: All CVE users should consult CVE-2014-9750 and CVE-2014-9751 to identify the ID or IDs of interest. All references and descriptions in this candidate have been removed to prevent accidental usage.",
"id": "GSD-2014-9297",
"references": [
"https://www.suse.com/security/cve/CVE-2014-9297.html",
"https://access.redhat.com/errata/RHSA-2015:2231",
"https://access.redhat.com/errata/RHSA-2015:1459",
"https://ubuntu.com/security/CVE-2014-9297",
"https://advisories.mageia.org/CVE-2014-9297.html",
"https://alas.aws.amazon.com/cve/html/CVE-2014-9297.html",
"https://linux.oracle.com/cve/CVE-2014-9297.html"
]
},
"gsd": {
"metadata": {
"exploitCode": "unknown",
"remediation": "unknown",
"reportConfidence": "confirmed",
"type": "vulnerability"
},
"osvSchema": {
"aliases": [
"CVE-2014-9297"
],
"details": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2014-9750, CVE-2014-9751. Reason: this ID was intended for one issue, but was associated with two issues. Notes: All CVE users should consult CVE-2014-9750 and CVE-2014-9751 to identify the ID or IDs of interest. All references and descriptions in this candidate have been removed to prevent accidental usage.",
"id": "GSD-2014-9297",
"modified": "2023-12-13T01:22:48.462665Z",
"schema_version": "1.4.0"
}
},
"namespaces": {
"cve.org": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2014-9297",
"STATE": "REJECT"
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2014-9750, CVE-2014-9751. Reason: this ID was intended for one issue, but was associated with two issues. Notes: All CVE users should consult CVE-2014-9750 and CVE-2014-9751 to identify the ID or IDs of interest. All references and descriptions in this candidate have been removed to prevent accidental usage."
}
]
}
}
}
}
CERTFR-2016-AVI-148
Vulnerability from certfr_avis - Published: 2016-04-29 - Updated: 2016-04-29
De multiples vulnérabilités ont été corrigées dans les produits Juniper. Certaines d'entre elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur, un déni de service à distance et un contournement de la politique de sécurité.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| Juniper Networks | Junos OS | Juniper Junos OS versions antérieures à 12.1X44-D50, 12.1X46-D35, 12.1X47-D20, 12.3R9, 12.3X48-D15, 13.2R8, 13.3R6, 14.1R5, 14.1X50-D90, 14.1X55-D16 et 14.2R3 | ||
| Juniper Networks | Junos Space | Juniper Junos Space sans le dernier correctif de sécurité |
| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Juniper Junos OS versions ant\u00e9rieures \u00e0 12.1X44-D50, 12.1X46-D35, 12.1X47-D20, 12.3R9, 12.3X48-D15, 13.2R8, 13.3R6, 14.1R5, 14.1X50-D90, 14.1X55-D16 et 14.2R3",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Juniper Junos Space sans le dernier correctif de s\u00e9curit\u00e9",
"product": {
"name": "Junos Space",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2014-9297",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-9297"
},
{
"name": "CVE-2014-9298",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-9298"
},
{
"name": "CVE-2014-9294",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-9294"
},
{
"name": "CVE-2014-9296",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-9296"
},
{
"name": "CVE-2014-9293",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-9293"
},
{
"name": "CVE-2014-9295",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-9295"
}
],
"initial_release_date": "2016-04-29T00:00:00",
"last_revision_date": "2016-04-29T00:00:00",
"links": [],
"reference": "CERTFR-2016-AVI-148",
"revisions": [
{
"description": "version initiale.",
"revision_date": "2016-04-29T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 corrig\u00e9es dans \u003cspan\nclass=\"textit\"\u003eles produits Juniper\u003c/span\u003e. Certaines d\u0027entre elles\npermettent \u00e0 un attaquant de provoquer un probl\u00e8me de s\u00e9curit\u00e9 non\nsp\u00e9cifi\u00e9 par l\u0027\u00e9diteur, un d\u00e9ni de service \u00e0 distance et un\ncontournement de la politique de s\u00e9curit\u00e9.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Juniper",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10663 du 27 avril 2016",
"url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10663\u0026cat=SIRT_1\u0026actp=LIST"
}
]
}
CERTFR-2015-AVI-162
Vulnerability from certfr_avis - Published: 2015-04-15 - Updated: 2015-04-15
De multiples vulnérabilités ont été corrigées dans les produits F5. Elles permettent à un attaquant de provoquer un déni de service à distance et une atteinte à la confidentialité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| F5 | BIG-IQ | F5 BIG-IQ Security versions 4.5.0 et antérieures | ||
| F5 | BIG-IP | F5 BIG-IP WOM versions 10.2.4 et antérieures | ||
| F5 | BIG-IP | F5 BIG-IP Link Controller versions 10.2.4 et antérieures | ||
| F5 | BIG-IP | F5 BIG-IP PSM versions 10.2.4 et antérieures | ||
| F5 | BIG-IP | F5 BIG-IP LTM versions 11.6.0 et antérieures | ||
| F5 | BIG-IQ | F5 BIG-IQ Cloud versions 4.5.0 et antérieures | ||
| F5 | BIG-IP | F5 BIG-IP APM versions 10.2.4 et antérieures | ||
| F5 | BIG-IP | F5 BIG-IP WOM versions 11.3.0 et antérieures | ||
| F5 | BIG-IP | F5 BIG-IP WebAccelerator versions 11.3.0 et antérieures | ||
| F5 | N/A | F5 Traffix SDC versions 4.1.0 et antérieures | ||
| F5 | BIG-IP | F5 BIG-IP AAM versions 11.6.0 et antérieures | ||
| F5 | BIG-IP | F5 BIG-IP ASM versions 11.6.0 et antérieures | ||
| F5 | BIG-IQ | F5 BIG-IQ ADC versions 4.5.0 et antérieures | ||
| F5 | N/A | F5 Entreprise Manager versions 2.3.0 et antérieures | ||
| F5 | BIG-IP | F5 BIG-IP ASM versions 10.2.4 et antérieures | ||
| F5 | N/A | F5 ARX versions 6.4.0 et antérieures | ||
| F5 | BIG-IP | F5 BIG-IP Link Controller versions 11.6.0 et antérieures | ||
| F5 | BIG-IP | F5 BIG-IP WebAccelerator versions 10.2.4 et antérieures | ||
| F5 | N/A | F5 Traffix SDC versions 3.5.1 et antérieures | ||
| F5 | BIG-IP | F5 BIG-IP Analytics versions 11.6.0 et antérieures | ||
| F5 | BIG-IP | F5 BIG-IP PEM versions 11.6.0 et antérieures | ||
| F5 | BIG-IP | F5 BIG-IP GTM versions 11.6.0 et antérieures | ||
| F5 | BIG-IP | F5 BIG-IP AFM versions 11.6.0 et antérieures | ||
| F5 | BIG-IP | F5 BIG-IP Edge Gateway versions 10.2.4 et antérieures | ||
| F5 | BIG-IP | F5 BIG-IP APM versions 11.6.0 et antérieures | ||
| F5 | BIG-IP | F5 BIG-IP GTM versions 10.2.4 et antérieures | ||
| F5 | BIG-IQ | F5 BIG-IQ Device versions 4.5.0 et antérieures | ||
| F5 | BIG-IP | F5 BIG-IP LTM versions 10.2.4 et antérieures | ||
| F5 | N/A | F5 Entreprise Manager versions 3.1.1 et antérieures | ||
| F5 | BIG-IP | F5 BIG-IP Edge Gateway versions 11.3.0 et antérieures | ||
| F5 | BIG-IP | F5 BIG-IP PSM versions 11.4.1 et antérieures |
| Title | Publication Time | Tags | ||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "F5 BIG-IQ Security versions 4.5.0 et ant\u00e9rieures",
"product": {
"name": "BIG-IQ",
"vendor": {
"name": "F5",
"scada": false
}
}
},
{
"description": "F5 BIG-IP WOM versions 10.2.4 et ant\u00e9rieures",
"product": {
"name": "BIG-IP",
"vendor": {
"name": "F5",
"scada": false
}
}
},
{
"description": "F5 BIG-IP Link Controller versions 10.2.4 et ant\u00e9rieures",
"product": {
"name": "BIG-IP",
"vendor": {
"name": "F5",
"scada": false
}
}
},
{
"description": "F5 BIG-IP PSM versions 10.2.4 et ant\u00e9rieures",
"product": {
"name": "BIG-IP",
"vendor": {
"name": "F5",
"scada": false
}
}
},
{
"description": "F5 BIG-IP LTM versions 11.6.0 et ant\u00e9rieures",
"product": {
"name": "BIG-IP",
"vendor": {
"name": "F5",
"scada": false
}
}
},
{
"description": "F5 BIG-IQ Cloud versions 4.5.0 et ant\u00e9rieures",
"product": {
"name": "BIG-IQ",
"vendor": {
"name": "F5",
"scada": false
}
}
},
{
"description": "F5 BIG-IP APM versions 10.2.4 et ant\u00e9rieures",
"product": {
"name": "BIG-IP",
"vendor": {
"name": "F5",
"scada": false
}
}
},
{
"description": "F5 BIG-IP WOM versions 11.3.0 et ant\u00e9rieures",
"product": {
"name": "BIG-IP",
"vendor": {
"name": "F5",
"scada": false
}
}
},
{
"description": "F5 BIG-IP WebAccelerator versions 11.3.0 et ant\u00e9rieures",
"product": {
"name": "BIG-IP",
"vendor": {
"name": "F5",
"scada": false
}
}
},
{
"description": "F5 Traffix SDC versions 4.1.0 et ant\u00e9rieures",
"product": {
"name": "N/A",
"vendor": {
"name": "F5",
"scada": false
}
}
},
{
"description": "F5 BIG-IP AAM versions 11.6.0 et ant\u00e9rieures",
"product": {
"name": "BIG-IP",
"vendor": {
"name": "F5",
"scada": false
}
}
},
{
"description": "F5 BIG-IP ASM versions 11.6.0 et ant\u00e9rieures",
"product": {
"name": "BIG-IP",
"vendor": {
"name": "F5",
"scada": false
}
}
},
{
"description": "F5 BIG-IQ ADC versions 4.5.0 et ant\u00e9rieures",
"product": {
"name": "BIG-IQ",
"vendor": {
"name": "F5",
"scada": false
}
}
},
{
"description": "F5 Entreprise Manager versions 2.3.0 et ant\u00e9rieures",
"product": {
"name": "N/A",
"vendor": {
"name": "F5",
"scada": false
}
}
},
{
"description": "F5 BIG-IP ASM versions 10.2.4 et ant\u00e9rieures",
"product": {
"name": "BIG-IP",
"vendor": {
"name": "F5",
"scada": false
}
}
},
{
"description": "F5 ARX versions 6.4.0 et ant\u00e9rieures",
"product": {
"name": "N/A",
"vendor": {
"name": "F5",
"scada": false
}
}
},
{
"description": "F5 BIG-IP Link Controller versions 11.6.0 et ant\u00e9rieures",
"product": {
"name": "BIG-IP",
"vendor": {
"name": "F5",
"scada": false
}
}
},
{
"description": "F5 BIG-IP WebAccelerator versions 10.2.4 et ant\u00e9rieures",
"product": {
"name": "BIG-IP",
"vendor": {
"name": "F5",
"scada": false
}
}
},
{
"description": "F5 Traffix SDC versions 3.5.1 et ant\u00e9rieures",
"product": {
"name": "N/A",
"vendor": {
"name": "F5",
"scada": false
}
}
},
{
"description": "F5 BIG-IP Analytics versions 11.6.0 et ant\u00e9rieures",
"product": {
"name": "BIG-IP",
"vendor": {
"name": "F5",
"scada": false
}
}
},
{
"description": "F5 BIG-IP PEM versions 11.6.0 et ant\u00e9rieures",
"product": {
"name": "BIG-IP",
"vendor": {
"name": "F5",
"scada": false
}
}
},
{
"description": "F5 BIG-IP GTM versions 11.6.0 et ant\u00e9rieures",
"product": {
"name": "BIG-IP",
"vendor": {
"name": "F5",
"scada": false
}
}
},
{
"description": "F5 BIG-IP AFM versions 11.6.0 et ant\u00e9rieures",
"product": {
"name": "BIG-IP",
"vendor": {
"name": "F5",
"scada": false
}
}
},
{
"description": "F5 BIG-IP Edge Gateway versions 10.2.4 et ant\u00e9rieures",
"product": {
"name": "BIG-IP",
"vendor": {
"name": "F5",
"scada": false
}
}
},
{
"description": "F5 BIG-IP APM versions 11.6.0 et ant\u00e9rieures",
"product": {
"name": "BIG-IP",
"vendor": {
"name": "F5",
"scada": false
}
}
},
{
"description": "F5 BIG-IP GTM versions 10.2.4 et ant\u00e9rieures",
"product": {
"name": "BIG-IP",
"vendor": {
"name": "F5",
"scada": false
}
}
},
{
"description": "F5 BIG-IQ Device versions 4.5.0 et ant\u00e9rieures",
"product": {
"name": "BIG-IQ",
"vendor": {
"name": "F5",
"scada": false
}
}
},
{
"description": "F5 BIG-IP LTM versions 10.2.4 et ant\u00e9rieures",
"product": {
"name": "BIG-IP",
"vendor": {
"name": "F5",
"scada": false
}
}
},
{
"description": "F5 Entreprise Manager versions 3.1.1 et ant\u00e9rieures",
"product": {
"name": "N/A",
"vendor": {
"name": "F5",
"scada": false
}
}
},
{
"description": "F5 BIG-IP Edge Gateway versions 11.3.0 et ant\u00e9rieures",
"product": {
"name": "BIG-IP",
"vendor": {
"name": "F5",
"scada": false
}
}
},
{
"description": "F5 BIG-IP PSM versions 11.4.1 et ant\u00e9rieures",
"product": {
"name": "BIG-IP",
"vendor": {
"name": "F5",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2014-0227",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-0227"
},
{
"name": "CVE-2014-9297",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-9297"
}
],
"initial_release_date": "2015-04-15T00:00:00",
"last_revision_date": "2015-04-15T00:00:00",
"links": [],
"reference": "CERTFR-2015-AVI-162",
"revisions": [
{
"description": "version initiale.",
"revision_date": "2015-04-15T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 corrig\u00e9es dans les produits \u003cspan\nclass=\"textit\"\u003eF5\u003c/span\u003e. Elles permettent \u00e0 un attaquant de provoquer\nun d\u00e9ni de service \u00e0 distance et une atteinte \u00e0 la confidentialit\u00e9 des\ndonn\u00e9es.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits F5",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 F5 sol16392 du 09 avril 2015",
"url": "https://support.f5.com/kb/en-us/solutions/public/16000/300/sol16392.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 F5 sol16344 du 09 avril 2015",
"url": "https://support.f5.com/kb/en-us/solutions/public/16000/300/sol16344.html"
}
]
}
CERTFR-2015-AVI-169
Vulnerability from certfr_avis - Published: 2015-04-15 - Updated: 2015-04-15
De multiples vulnérabilités ont été corrigées dans Oracle Solaris. Elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Oracle Solaris versions 11.2 et ant\u00e9rieures",
"product": {
"name": "N/A",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "Oracle Solaris versions 10 et ant\u00e9rieures",
"product": {
"name": "N/A",
"vendor": {
"name": "Oracle",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2015-1803",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-1803"
},
{
"name": "CVE-2015-0208",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-0208"
},
{
"name": "CVE-2015-2188",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2188"
},
{
"name": "CVE-2014-3566",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-3566"
},
{
"name": "CVE-2015-0292",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-0292"
},
{
"name": "CVE-2015-0286",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-0286"
},
{
"name": "CVE-2014-9297",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-9297"
},
{
"name": "CVE-2014-0339",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-0339"
},
{
"name": "CVE-2015-0255",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-0255"
},
{
"name": "CVE-2015-1804",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-1804"
},
{
"name": "CVE-2015-0288",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-0288"
},
{
"name": "CVE-2015-2190",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2190"
},
{
"name": "CVE-2014-3884",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-3884"
},
{
"name": "CVE-2014-9623",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-9623"
},
{
"name": "CVE-2015-0290",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-0290"
},
{
"name": "CVE-2015-1802",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-1802"
},
{
"name": "CVE-2015-0207",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-0207"
},
{
"name": "CVE-2015-0285",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-0285"
},
{
"name": "CVE-2014-3924",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-3924"
},
{
"name": "CVE-2015-0204",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-0204"
},
{
"name": "CVE-2015-0293",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-0293"
},
{
"name": "CVE-2015-0287",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-0287"
},
{
"name": "CVE-2015-1787",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-1787"
},
{
"name": "CVE-2014-3886",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-3886"
},
{
"name": "CVE-2015-0209",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-0209"
},
{
"name": "CVE-2015-2189",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2189"
},
{
"name": "CVE-2015-0291",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-0291"
},
{
"name": "CVE-2015-0289",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-0289"
},
{
"name": "CVE-2014-5353",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-5353"
}
],
"initial_release_date": "2015-04-15T00:00:00",
"last_revision_date": "2015-04-15T00:00:00",
"links": [],
"reference": "CERTFR-2015-AVI-169",
"revisions": [
{
"description": "version initiale.",
"revision_date": "2015-04-15T00:00:00.000000"
}
],
"risks": [
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 corrig\u00e9es dans \u003cspan\nclass=\"textit\"\u003eOracle Solaris\u003c/span\u003e. Elles permettent \u00e0 un attaquant de\nprovoquer un probl\u00e8me de s\u00e9curit\u00e9 non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans Oracle Solaris",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Oracle du 14 avril 2015",
"url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html"
}
]
}
CNVD-2015-01157
Vulnerability from cnvd - Published: 2015-02-14用户可以联系供应商获得补丁信息: http://support.ntp.org
| Name | Ntp Ntp |
|---|
{
"bids": {
"bid": {
"bidNumber": "72583"
}
},
"cves": {
"cve": {
"cveNumber": "CVE-2014-9297"
}
},
"description": "NTP\u662f\u7528\u6765\u4f7f\u8ba1\u7b97\u673a\u65f6\u95f4\u540c\u6b65\u5316\u7684\u4e00\u79cd\u534f\u8bae\u3002 \r\n\r\nNTP \u0027ntp_crypto.c\u0027\u5b58\u5728\u4fe1\u606f\u6cc4\u9732\u6f0f\u6d1e\uff0c\u653b\u51fb\u8005\u53ef\u4ee5\u5229\u7528\u6b64\u6f0f\u6d1e\u83b7\u53d6\u654f\u611f\u4fe1\u606f\u3002",
"discovererName": "Harlan Stenn",
"formalWay": "\u7528\u6237\u53ef\u4ee5\u8054\u7cfb\u4f9b\u5e94\u5546\u83b7\u5f97\u8865\u4e01\u4fe1\u606f\uff1a\r\nhttp://support.ntp.org",
"isEvent": "\u901a\u7528\u8f6f\u786c\u4ef6\u6f0f\u6d1e",
"number": "CNVD-2015-01157",
"openTime": "2015-02-14",
"patchDescription": "NTP\u662f\u7528\u6765\u4f7f\u8ba1\u7b97\u673a\u65f6\u95f4\u540c\u6b65\u5316\u7684\u4e00\u79cd\u534f\u8bae\u3002 \r\n\r\nNTP \u0027ntp_crypto.c\u0027\u5b58\u5728\u4fe1\u606f\u6cc4\u9732\u6f0f\u6d1e\uff0c\u653b\u51fb\u8005\u53ef\u4ee5\u5229\u7528\u6b64\u6f0f\u6d1e\u83b7\u53d6\u654f\u611f\u4fe1\u606f\u3002\u76ee\u524d\uff0c\u4f9b\u5e94\u5546\u53d1\u5e03\u4e86\u5b89\u5168\u516c\u544a\u53ca\u76f8\u5173\u8865\u4e01\u4fe1\u606f\uff0c\u4fee\u590d\u4e86\u6b64\u6f0f\u6d1e\u3002",
"patchName": "NTP \u0027ntp_crypto.c\u0027\u4fe1\u606f\u6cc4\u9732\u6f0f\u6d1e\u7684\u8865\u4e01",
"products": {
"product": "Ntp Ntp"
},
"referenceLink": "http://www.securityfocus.com/bid/72583/info",
"serverity": "\u4e2d",
"submitTime": "2015-02-13",
"title": "NTP \u0027ntp_crypto.c\u0027\u4fe1\u606f\u6cc4\u9732\u6f0f\u6d1e"
}
FKIE_CVE-2014-9297
Vulnerability from fkie_nvd - Published: 2015-10-06 01:59 - Updated: 2023-11-07 02:23| URL | Tags |
|---|
| Vendor | Product | Version |
|---|
{
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2014-9750, CVE-2014-9751. Reason: this ID was intended for one issue, but was associated with two issues. Notes: All CVE users should consult CVE-2014-9750 and CVE-2014-9751 to identify the ID or IDs of interest. All references and descriptions in this candidate have been removed to prevent accidental usage"
}
],
"id": "CVE-2014-9297",
"lastModified": "2023-11-07T02:23:03.483",
"metrics": {},
"published": "2015-10-06T01:59:00.127",
"references": [],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Rejected"
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.