Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2014-3620 (GCVE-0-2014-3620)
Vulnerability from cvelistv5 – Published: 2014-11-18 15:00 – Updated: 2024-08-06 10:50- n/a
| URL | Tags | |||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-06T10:50:17.909Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "69742",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/69742"
},
{
"name": "APPLE-SA-2015-08-13-2",
"tags": [
"vendor-advisory",
"x_refsource_APPLE",
"x_transferred"
],
"url": "http://lists.apple.com/archives/security-announce/2015/Aug/msg00001.html"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://curl.haxx.se/docs/adv_20140910B.html"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10743"
},
{
"name": "openSUSE-SU-2014:1139",
"tags": [
"vendor-advisory",
"x_refsource_SUSE",
"x_transferred"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00024.html"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://support.apple.com/kb/HT205031"
},
{
"name": "DSA-3022",
"tags": [
"vendor-advisory",
"x_refsource_DEBIAN",
"x_transferred"
],
"url": "http://www.debian.org/security/2014/dsa-3022"
},
{
"name": "[oss-security] 20220511 [SECURITY ADVISORY] curl: cookie for trailing dot TLD",
"tags": [
"mailing-list",
"x_refsource_MLIST",
"x_transferred"
],
"url": "http://www.openwall.com/lists/oss-security/2022/05/11/2"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2014-09-10T00:00:00.000Z",
"descriptions": [
{
"lang": "en",
"value": "cURL and libcurl before 7.38.0 allow remote attackers to bypass the Same Origin Policy and set cookies for arbitrary sites by setting a cookie for a top-level domain."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2022-05-11T08:06:09.000Z",
"orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
"shortName": "redhat"
},
"references": [
{
"name": "69742",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/69742"
},
{
"name": "APPLE-SA-2015-08-13-2",
"tags": [
"vendor-advisory",
"x_refsource_APPLE"
],
"url": "http://lists.apple.com/archives/security-announce/2015/Aug/msg00001.html"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://curl.haxx.se/docs/adv_20140910B.html"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10743"
},
{
"name": "openSUSE-SU-2014:1139",
"tags": [
"vendor-advisory",
"x_refsource_SUSE"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00024.html"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://support.apple.com/kb/HT205031"
},
{
"name": "DSA-3022",
"tags": [
"vendor-advisory",
"x_refsource_DEBIAN"
],
"url": "http://www.debian.org/security/2014/dsa-3022"
},
{
"name": "[oss-security] 20220511 [SECURITY ADVISORY] curl: cookie for trailing dot TLD",
"tags": [
"mailing-list",
"x_refsource_MLIST"
],
"url": "http://www.openwall.com/lists/oss-security/2022/05/11/2"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2014-3620",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "cURL and libcurl before 7.38.0 allow remote attackers to bypass the Same Origin Policy and set cookies for arbitrary sites by setting a cookie for a top-level domain."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "69742",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/69742"
},
{
"name": "APPLE-SA-2015-08-13-2",
"refsource": "APPLE",
"url": "http://lists.apple.com/archives/security-announce/2015/Aug/msg00001.html"
},
{
"name": "http://curl.haxx.se/docs/adv_20140910B.html",
"refsource": "CONFIRM",
"url": "http://curl.haxx.se/docs/adv_20140910B.html"
},
{
"name": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10743",
"refsource": "CONFIRM",
"url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10743"
},
{
"name": "openSUSE-SU-2014:1139",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00024.html"
},
{
"name": "https://support.apple.com/kb/HT205031",
"refsource": "CONFIRM",
"url": "https://support.apple.com/kb/HT205031"
},
{
"name": "DSA-3022",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2014/dsa-3022"
},
{
"name": "[oss-security] 20220511 [SECURITY ADVISORY] curl: cookie for trailing dot TLD",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2022/05/11/2"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
"assignerShortName": "redhat",
"cveId": "CVE-2014-3620",
"datePublished": "2014-11-18T15:00:00.000Z",
"dateReserved": "2014-05-14T00:00:00.000Z",
"dateUpdated": "2024-08-06T10:50:17.909Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
FKIE_CVE-2014-3620
Vulnerability from fkie_nvd - Published: 2014-11-18 15:59 - Updated: 2025-04-12 10:46| Vendor | Product | Version | |
|---|---|---|---|
| haxx | curl | * | |
| haxx | curl | 7.31.0 | |
| haxx | curl | 7.32.0 | |
| haxx | curl | 7.33.0 | |
| haxx | curl | 7.34.0 | |
| haxx | curl | 7.35.0 | |
| haxx | curl | 7.36.0 | |
| haxx | curl | 7.37.0 | |
| haxx | libcurl | * | |
| haxx | libcurl | 7.31.0 | |
| haxx | libcurl | 7.32.0 | |
| haxx | libcurl | 7.33.0 | |
| haxx | libcurl | 7.34.0 | |
| haxx | libcurl | 7.35.0 | |
| haxx | libcurl | 7.36.0 | |
| haxx | libcurl | 7.37.0 | |
| apple | mac_os_x | * |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:haxx:curl:*:*:*:*:*:*:*:*",
"matchCriteriaId": "B72E7AFD-F700-4EE7-AC64-238AC573CDBA",
"versionEndIncluding": "7.37.1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:haxx:curl:7.31.0:*:*:*:*:*:*:*",
"matchCriteriaId": "5ECABFCB-0D02-4B5B-BB35-C6B3C0896348",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:haxx:curl:7.32.0:*:*:*:*:*:*:*",
"matchCriteriaId": "5A5176F0-E62F-46FF-B536-DC0680696773",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:haxx:curl:7.33.0:*:*:*:*:*:*:*",
"matchCriteriaId": "506A3761-3D24-43DB-88D8-4EB5B9E8BA5C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:haxx:curl:7.34.0:*:*:*:*:*:*:*",
"matchCriteriaId": "0B6EF8B0-0E86-449C-A500-ACD902A78C7F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:haxx:curl:7.35.0:*:*:*:*:*:*:*",
"matchCriteriaId": "4D558CC2-0146-4887-834E-19FCB1D512A3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:haxx:curl:7.36.0:*:*:*:*:*:*:*",
"matchCriteriaId": "6931764D-16AB-4546-9CE3-5B4E03BC984A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:haxx:curl:7.37.0:*:*:*:*:*:*:*",
"matchCriteriaId": "6FC1313E-8DCB-4B29-A9BC-A27C8CB360E9",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:haxx:libcurl:*:*:*:*:*:*:*:*",
"matchCriteriaId": "F0181855-D18C-49D9-8BC5-2EC16689B7EF",
"versionEndIncluding": "7.37.1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:haxx:libcurl:7.31.0:*:*:*:*:*:*:*",
"matchCriteriaId": "1791BF6D-2C96-4A6E-90D4-2906A73601F6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:haxx:libcurl:7.32.0:*:*:*:*:*:*:*",
"matchCriteriaId": "260DD751-4145-4B75-B892-5FC932C6A305",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:haxx:libcurl:7.33.0:*:*:*:*:*:*:*",
"matchCriteriaId": "EFF4AD0D-2EC5-4CE8-B6B3-2EC8ED2FF118",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:haxx:libcurl:7.34.0:*:*:*:*:*:*:*",
"matchCriteriaId": "3EB1CB85-0A9B-4816-B471-278774EE6D4C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:haxx:libcurl:7.35.0:*:*:*:*:*:*:*",
"matchCriteriaId": "3831AB03-4E7E-476D-9623-58AADC188DFE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:haxx:libcurl:7.36.0:*:*:*:*:*:*:*",
"matchCriteriaId": "ABACE305-2F0C-4B59-BC5C-6DF162B450E4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:haxx:libcurl:7.37.0:*:*:*:*:*:*:*",
"matchCriteriaId": "6FAC1B55-F492-484E-B837-E7745682DE0A",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*",
"matchCriteriaId": "7883E465-932D-4C11-AA54-97E44181F906",
"versionEndIncluding": "10.10.4",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "cURL and libcurl before 7.38.0 allow remote attackers to bypass the Same Origin Policy and set cookies for arbitrary sites by setting a cookie for a top-level domain."
},
{
"lang": "es",
"value": "cURL y libcurl anteriores a 7.38.0 permite a atacantes remotos evadir Same Origin Policy y configurar cookies para sitios arbitrarios mediante la configuraci\u00f3n de una cookie de un dominio de nivel superior."
}
],
"id": "CVE-2014-3620",
"lastModified": "2025-04-12T10:46:40.837",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.0,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
]
},
"published": "2014-11-18T15:59:01.390",
"references": [
{
"source": "secalert@redhat.com",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "http://curl.haxx.se/docs/adv_20140910B.html"
},
{
"source": "secalert@redhat.com",
"url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10743"
},
{
"source": "secalert@redhat.com",
"url": "http://lists.apple.com/archives/security-announce/2015/Aug/msg00001.html"
},
{
"source": "secalert@redhat.com",
"url": "http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00024.html"
},
{
"source": "secalert@redhat.com",
"tags": [
"Vendor Advisory"
],
"url": "http://www.debian.org/security/2014/dsa-3022"
},
{
"source": "secalert@redhat.com",
"url": "http://www.openwall.com/lists/oss-security/2022/05/11/2"
},
{
"source": "secalert@redhat.com",
"url": "http://www.securityfocus.com/bid/69742"
},
{
"source": "secalert@redhat.com",
"tags": [
"Vendor Advisory"
],
"url": "https://support.apple.com/kb/HT205031"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "http://curl.haxx.se/docs/adv_20140910B.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10743"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://lists.apple.com/archives/security-announce/2015/Aug/msg00001.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00024.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://www.debian.org/security/2014/dsa-3022"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.openwall.com/lists/oss-security/2022/05/11/2"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securityfocus.com/bid/69742"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "https://support.apple.com/kb/HT205031"
}
],
"sourceIdentifier": "secalert@redhat.com",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-310"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
GSD-2014-3620
Vulnerability from gsd - Updated: 2023-12-13 01:22{
"GSD": {
"alias": "CVE-2014-3620",
"description": "cURL and libcurl before 7.38.0 allow remote attackers to bypass the Same Origin Policy and set cookies for arbitrary sites by setting a cookie for a top-level domain.",
"id": "GSD-2014-3620",
"references": [
"https://www.suse.com/security/cve/CVE-2014-3620.html",
"https://www.debian.org/security/2014/dsa-3022",
"https://ubuntu.com/security/CVE-2014-3620",
"https://advisories.mageia.org/CVE-2014-3620.html",
"https://alas.aws.amazon.com/cve/html/CVE-2014-3620.html"
]
},
"gsd": {
"metadata": {
"exploitCode": "unknown",
"remediation": "unknown",
"reportConfidence": "confirmed",
"type": "vulnerability"
},
"osvSchema": {
"aliases": [
"CVE-2014-3620"
],
"details": "cURL and libcurl before 7.38.0 allow remote attackers to bypass the Same Origin Policy and set cookies for arbitrary sites by setting a cookie for a top-level domain.",
"id": "GSD-2014-3620",
"modified": "2023-12-13T01:22:53.563339Z",
"schema_version": "1.4.0"
}
},
"namespaces": {
"cve.org": {
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2014-3620",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "cURL and libcurl before 7.38.0 allow remote attackers to bypass the Same Origin Policy and set cookies for arbitrary sites by setting a cookie for a top-level domain."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "69742",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/69742"
},
{
"name": "APPLE-SA-2015-08-13-2",
"refsource": "APPLE",
"url": "http://lists.apple.com/archives/security-announce/2015/Aug/msg00001.html"
},
{
"name": "http://curl.haxx.se/docs/adv_20140910B.html",
"refsource": "CONFIRM",
"url": "http://curl.haxx.se/docs/adv_20140910B.html"
},
{
"name": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10743",
"refsource": "CONFIRM",
"url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10743"
},
{
"name": "openSUSE-SU-2014:1139",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00024.html"
},
{
"name": "https://support.apple.com/kb/HT205031",
"refsource": "CONFIRM",
"url": "https://support.apple.com/kb/HT205031"
},
{
"name": "DSA-3022",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2014/dsa-3022"
},
{
"name": "[oss-security] 20220511 [SECURITY ADVISORY] curl: cookie for trailing dot TLD",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2022/05/11/2"
}
]
}
},
"nvd.nist.gov": {
"configurations": {
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:haxx:curl:7.35.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:haxx:curl:7.32.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:haxx:curl:7.33.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:haxx:curl:7.36.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:haxx:curl:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "7.37.1",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:haxx:curl:7.31.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:haxx:curl:7.34.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:haxx:curl:7.37.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:haxx:libcurl:7.37.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:haxx:libcurl:7.33.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:haxx:libcurl:7.36.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:haxx:libcurl:7.34.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:haxx:libcurl:7.31.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:haxx:libcurl:7.35.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:haxx:libcurl:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "7.37.1",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:haxx:libcurl:7.32.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "10.10.4",
"vulnerable": true
}
],
"operator": "OR"
}
]
},
"cve": {
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2014-3620"
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "en",
"value": "cURL and libcurl before 7.38.0 allow remote attackers to bypass the Same Origin Policy and set cookies for arbitrary sites by setting a cookie for a top-level domain."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "en",
"value": "CWE-310"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "DSA-3022",
"refsource": "DEBIAN",
"tags": [
"Vendor Advisory"
],
"url": "http://www.debian.org/security/2014/dsa-3022"
},
{
"name": "openSUSE-SU-2014:1139",
"refsource": "SUSE",
"tags": [],
"url": "http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00024.html"
},
{
"name": "http://curl.haxx.se/docs/adv_20140910B.html",
"refsource": "CONFIRM",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "http://curl.haxx.se/docs/adv_20140910B.html"
},
{
"name": "APPLE-SA-2015-08-13-2",
"refsource": "APPLE",
"tags": [],
"url": "http://lists.apple.com/archives/security-announce/2015/Aug/msg00001.html"
},
{
"name": "https://support.apple.com/kb/HT205031",
"refsource": "CONFIRM",
"tags": [
"Vendor Advisory"
],
"url": "https://support.apple.com/kb/HT205031"
},
{
"name": "69742",
"refsource": "BID",
"tags": [],
"url": "http://www.securityfocus.com/bid/69742"
},
{
"name": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10743",
"refsource": "CONFIRM",
"tags": [],
"url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10743"
},
{
"name": "[oss-security] 20220511 [SECURITY ADVISORY] curl: cookie for trailing dot TLD",
"refsource": "MLIST",
"tags": [],
"url": "http://www.openwall.com/lists/oss-security/2022/05/11/2"
}
]
}
},
"impact": {
"baseMetricV2": {
"cvssV2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.0,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "MEDIUM",
"userInteractionRequired": false
}
},
"lastModifiedDate": "2022-05-11T09:15Z",
"publishedDate": "2014-11-18T15:59Z"
}
}
}
CERTFR-2015-AVI-355
Vulnerability from certfr_avis - Published: 2015-08-14 - Updated: 2015-08-14
De multiples vulnérabilités ont été corrigées dans Apple OS X. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service à distance et une atteinte à l'intégrité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "OS X Mavericks versions ant\u00e9rieures \u00e0 10.9.5",
"product": {
"name": "N/A",
"vendor": {
"name": "Apple",
"scada": false
}
}
},
{
"description": "OS X Mountain Lion versions ant\u00e9rieures \u00e0 10.8.5",
"product": {
"name": "N/A",
"vendor": {
"name": "Apple",
"scada": false
}
}
},
{
"description": "OS X Yosemite versions ant\u00e9rieures \u00e0 10.10.5",
"product": {
"name": "N/A",
"vendor": {
"name": "Apple",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2015-4024",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4024"
},
{
"name": "CVE-2015-3768",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-3768"
},
{
"name": "CVE-2015-3799",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-3799"
},
{
"name": "CVE-2015-3307",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-3307"
},
{
"name": "CVE-2015-3153",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-3153"
},
{
"name": "CVE-2015-4148",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4148"
},
{
"name": "CVE-2015-3789",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-3789"
},
{
"name": "CVE-2015-4026",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4026"
},
{
"name": "CVE-2015-5600",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-5600"
},
{
"name": "CVE-2015-3757",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-3757"
},
{
"name": "CVE-2015-5782",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-5782"
},
{
"name": "CVE-2015-3773",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-3773"
},
{
"name": "CVE-2014-0191",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-0191"
},
{
"name": "CVE-2013-7040",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-7040"
},
{
"name": "CVE-2015-3183",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-3183"
},
{
"name": "CVE-2015-1791",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-1791"
},
{
"name": "CVE-2014-3583",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-3583"
},
{
"name": "CVE-2015-3782",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-3782"
},
{
"name": "CVE-2014-3581",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-3581"
},
{
"name": "CVE-2015-3805",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-3805"
},
{
"name": "CVE-2015-3765",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-3765"
},
{
"name": "CVE-2015-5779",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-5779"
},
{
"name": "CVE-2009-5078",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-5078"
},
{
"name": "CVE-2015-3766",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-3766"
},
{
"name": "CVE-2015-3148",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-3148"
},
{
"name": "CVE-2014-3613",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-3613"
},
{
"name": "CVE-2015-3807",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-3807"
},
{
"name": "CVE-2015-3796",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-3796"
},
{
"name": "CVE-2013-1775",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-1775"
},
{
"name": "CVE-2014-7185",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-7185"
},
{
"name": "CVE-2014-0067",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-0067"
},
{
"name": "CVE-2012-6685",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-6685"
},
{
"name": "CVE-2015-2787",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2787"
},
{
"name": "CVE-2015-3804",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-3804"
},
{
"name": "CVE-2015-3764",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-3764"
},
{
"name": "CVE-2015-5757",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-5757"
},
{
"name": "CVE-2015-4025",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4025"
},
{
"name": "CVE-2015-5753",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-5753"
},
{
"name": "CVE-2014-7844",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-7844"
},
{
"name": "CVE-2015-5748",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-5748"
},
{
"name": "CVE-2013-7422",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-7422"
},
{
"name": "CVE-2015-0241",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-0241"
},
{
"name": "CVE-2015-3800",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-3800"
},
{
"name": "CVE-2014-8151",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-8151"
},
{
"name": "CVE-2015-3185",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-3185"
},
{
"name": "CVE-2015-0243",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-0243"
},
{
"name": "CVE-2015-1789",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-1789"
},
{
"name": "CVE-2015-0244",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-0244"
},
{
"name": "CVE-2014-8150",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-8150"
},
{
"name": "CVE-2014-9140",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-9140"
},
{
"name": "CVE-2015-3330",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-3330"
},
{
"name": "CVE-2014-3707",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-3707"
},
{
"name": "CVE-2015-3776",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-3776"
},
{
"name": "CVE-2009-5044",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-5044"
},
{
"name": "CVE-2015-3143",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-3143"
},
{
"name": "CVE-2014-0106",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-0106"
},
{
"name": "CVE-2015-5750",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-5750"
},
{
"name": "CVE-2015-3787",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-3787"
},
{
"name": "CVE-2015-5751",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-5751"
},
{
"name": "CVE-2015-3780",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-3780"
},
{
"name": "CVE-2015-3802",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-3802"
},
{
"name": "CVE-2013-7338",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-7338"
},
{
"name": "CVE-2015-5781",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-5781"
},
{
"name": "CVE-2014-9680",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-9680"
},
{
"name": "CVE-2015-4022",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4022"
},
{
"name": "CVE-2015-3771",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-3771"
},
{
"name": "CVE-2015-3806",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-3806"
},
{
"name": "CVE-2015-3329",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-3329"
},
{
"name": "CVE-2015-1788",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-1788"
},
{
"name": "CVE-2015-3788",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-3788"
},
{
"name": "CVE-2015-1792",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-1792"
},
{
"name": "CVE-2015-5778",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-5778"
},
{
"name": "CVE-2015-3803",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-3803"
},
{
"name": "CVE-2015-3772",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-3772"
},
{
"name": "CVE-2015-3762",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-3762"
},
{
"name": "CVE-2015-3769",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-3769"
},
{
"name": "CVE-2013-2776",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-2776"
},
{
"name": "CVE-2015-3774",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-3774"
},
{
"name": "CVE-2015-5758",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-5758"
},
{
"name": "CVE-2015-5756",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-5756"
},
{
"name": "CVE-2015-5761",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-5761"
},
{
"name": "CVE-2015-5763",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-5763"
},
{
"name": "CVE-2015-3770",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-3770"
},
{
"name": "CVE-2015-3781",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-3781"
},
{
"name": "CVE-2015-3145",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-3145"
},
{
"name": "CVE-2013-1776",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-1776"
},
{
"name": "CVE-2015-0228",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-0228"
},
{
"name": "CVE-2015-3144",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-3144"
},
{
"name": "CVE-2015-5783",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-5783"
},
{
"name": "CVE-2015-5771",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-5771"
},
{
"name": "CVE-2015-3775",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-3775"
},
{
"name": "CVE-2015-3760",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-3760"
},
{
"name": "CVE-2014-8161",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-8161"
},
{
"name": "CVE-2015-3795",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-3795"
},
{
"name": "CVE-2015-0242",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-0242"
},
{
"name": "CVE-2014-8769",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-8769"
},
{
"name": "CVE-2014-9365",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-9365"
},
{
"name": "CVE-2015-4021",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4021"
},
{
"name": "CVE-2015-5755",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-5755"
},
{
"name": "CVE-2015-3761",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-3761"
},
{
"name": "CVE-2015-2783",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2783"
},
{
"name": "CVE-2015-3791",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-3791"
},
{
"name": "CVE-2015-5772",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-5772"
},
{
"name": "CVE-2015-5747",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-5747"
},
{
"name": "CVE-2014-3620",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-3620"
},
{
"name": "CVE-2015-3784",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-3784"
},
{
"name": "CVE-2015-5774",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-5774"
},
{
"name": "CVE-2015-0253",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-0253"
},
{
"name": "CVE-2015-3786",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-3786"
},
{
"name": "CVE-2015-3792",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-3792"
},
{
"name": "CVE-2015-5776",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-5776"
},
{
"name": "CVE-2015-5784",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-5784"
},
{
"name": "CVE-2015-5775",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-5775"
},
{
"name": "CVE-2015-4147",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4147"
},
{
"name": "CVE-2015-5754",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-5754"
},
{
"name": "CVE-2014-8109",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-8109"
},
{
"name": "CVE-2014-3660",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-3660"
},
{
"name": "CVE-2015-5777",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-5777"
},
{
"name": "CVE-2013-2777",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-2777"
},
{
"name": "CVE-2015-3783",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-3783"
},
{
"name": "CVE-2015-5773",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-5773"
},
{
"name": "CVE-2015-3794",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-3794"
},
{
"name": "CVE-2015-3777",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-3777"
},
{
"name": "CVE-2015-3797",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-3797"
},
{
"name": "CVE-2014-1912",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-1912"
},
{
"name": "CVE-2014-8767",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-8767"
},
{
"name": "CVE-2015-3767",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-3767"
},
{
"name": "CVE-2015-3790",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-3790"
},
{
"name": "CVE-2015-3779",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-3779"
},
{
"name": "CVE-2015-5768",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-5768"
},
{
"name": "CVE-2015-3778",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-3778"
},
{
"name": "CVE-2015-3798",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-3798"
},
{
"name": "CVE-2015-1790",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-1790"
}
],
"initial_release_date": "2015-08-14T00:00:00",
"last_revision_date": "2015-08-14T00:00:00",
"links": [],
"reference": "CERTFR-2015-AVI-355",
"revisions": [
{
"description": "version initiale.",
"revision_date": "2015-08-14T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 corrig\u00e9es dans \u003cspan\nclass=\"textit\"\u003eApple OS X\u003c/span\u003e. Certaines d\u0027entre elles permettent \u00e0\nun attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance,\nun d\u00e9ni de service \u00e0 distance et une atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans Apple OS X",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Apple HT205031 du 13 ao\u00fbt 2015",
"url": "https://support.apple.com/en-us/HT205031"
}
]
}
CERTFR-2016-AVI-128
Vulnerability from certfr_avis - Published: 2016-04-14 - Updated: 2016-04-14
De multiples vulnérabilités ont été corrigées dans les produits Juniper. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service à distance et un contournement de la politique de sécurité.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| Juniper Networks | Junos OS | Junos OS versions antérieures à 12.3X48-D30 | ||
| Juniper Networks | Junos OS | Junos OS versions antérieures à 12.1X44-D60 | ||
| Juniper Networks | Junos OS | Junos OS versions antérieures à 15.1F2 | ||
| Juniper Networks | Junos OS | Junos OS versions antérieures à 14.1R6 | ||
| Juniper Networks | Junos OS | Junos OS versions antérieures à 13.2R7 | ||
| Juniper Networks | Junos OS | Junos OS versions antérieures à 14.2R3-S4 | ||
| Juniper Networks | Junos OS | Junos OS versions antérieures à 15.1X49-D10 | ||
| Juniper Networks | Junos OS | Junos OS versions antérieures à 13.3R9 | ||
| Juniper Networks | Junos OS | Junos OS versions antérieures à 14.1X53-D30 | ||
| Juniper Networks | Junos OS | Junos OS versions antérieures à 12.1X47-D35 | ||
| Juniper Networks | Junos OS | Junos OS versions antérieures à 15.1R2 | ||
| Juniper Networks | Junos OS | Junos OS versions antérieures à 14.2R2 | ||
| Juniper Networks | Junos OS | Junos OS versions antérieures à 12.1X47-D30 | ||
| Juniper Networks | Junos OS | Junos OS versions antérieures à 15.1X49-D20 | ||
| Juniper Networks | Junos OS | Junos OS versions antérieures à 13.2X51-D39 | ||
| Juniper Networks | Junos OS | Junos OS versions antérieures à 15.1R1 | ||
| Juniper Networks | N/A | CTPOS versions antérieures à 7.2R1 | ||
| Juniper Networks | Junos OS | Junos OS versions antérieures à 13.3R7 | ||
| Juniper Networks | Junos OS | Junos OS versions antérieures à 15.1X49-D30 | ||
| Juniper Networks | Junos OS | Junos OS versions antérieures à 12.3R11 | ||
| Juniper Networks | Junos OS | Junos OS versions antérieures à 13.2X51-D40 | ||
| Juniper Networks | Junos OS | Junos OS versions antérieures à 14.2R4 | ||
| Juniper Networks | Junos Space | Junos Space versions antérieures à 15.2R1 | ||
| Juniper Networks | N/A | ScreenOS versions antérieures à 6.3.0r22 | ||
| Juniper Networks | Junos OS | Junos OS versions antérieures à 15.1F5 | ||
| Juniper Networks | Junos OS | Junos OS versions antérieures à 14.2R4-S1 | ||
| Juniper Networks | Junos OS | Junos OS versions antérieures à 12.3R9 | ||
| Juniper Networks | Junos OS | Junos OS versions antérieures à 12.3X48-D20 | ||
| Juniper Networks | Junos OS | Junos OS versions antérieures à 15.1R3 | ||
| Juniper Networks | Junos OS | Junos OS versions antérieures à 14.2R6 | ||
| Juniper Networks | Junos OS | Junos OS versions antérieures à 14.1R7 | ||
| Juniper Networks | N/A | CTPOS versions antérieures à 7.1R2 | ||
| Juniper Networks | Junos OS | Junos OS versions antérieures à 12.1X46-D45 | ||
| Juniper Networks | Junos OS | Junos OS versions antérieures à 15.1X49-D40 | ||
| Juniper Networks | Junos OS | Junos OS versions antérieures à 14.2R3 | ||
| Juniper Networks | Junos OS | Junos OS versions antérieures à 16.1R1 | ||
| Juniper Networks | Junos OS | Junos OS versions antérieures à 12.1X46-D40 | ||
| Juniper Networks | Junos OS | Junos OS versions antérieures à 12.1X47-D25 | ||
| Juniper Networks | Junos OS | Junos OS versions antérieures à 13.3R8 | ||
| Juniper Networks | Junos OS | Junos OS versions antérieures à 14.2R5 | ||
| Juniper Networks | Junos OS | Junos OS versions antérieures à 13.2X52-D30 | ||
| Juniper Networks | Junos OS | Junos OS versions antérieures à 12.1X44-D55 | ||
| Juniper Networks | Junos OS | Junos OS versions antérieures à 12.3X50-D50 | ||
| Juniper Networks | Junos OS | Junos OS versions antérieures à 14.1R4 | ||
| Juniper Networks | Junos OS | Junos OS versions antérieures à 13.3R6 | ||
| Juniper Networks | Junos OS | Junos OS versions antérieures à 13.2R8 | ||
| Juniper Networks | Junos OS | Junos OS versions antérieures à 12.3X48-D25 | ||
| Juniper Networks | Junos OS | Junos OS versions antérieures à 12.3R12 | ||
| Juniper Networks | Junos OS | Junos OS versions antérieures à 15.1X53-D20 | ||
| Juniper Networks | Junos OS | Junos OS versions antérieures à 15.1X49-D15 | ||
| Juniper Networks | Junos OS | Junos OS versions antérieures à 13.2R9 |
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Junos OS versions ant\u00e9rieures \u00e0 12.3X48-D30",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions ant\u00e9rieures \u00e0 12.1X44-D60",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions ant\u00e9rieures \u00e0 15.1F2",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions ant\u00e9rieures \u00e0 14.1R6",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions ant\u00e9rieures \u00e0 13.2R7",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions ant\u00e9rieures \u00e0 14.2R3-S4",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions ant\u00e9rieures \u00e0 15.1X49-D10",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions ant\u00e9rieures \u00e0 13.3R9",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions ant\u00e9rieures \u00e0 14.1X53-D30",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions ant\u00e9rieures \u00e0 12.1X47-D35",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions ant\u00e9rieures \u00e0 15.1R2",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions ant\u00e9rieures \u00e0 14.2R2",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions ant\u00e9rieures \u00e0 12.1X47-D30",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions ant\u00e9rieures \u00e0 15.1X49-D20",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions ant\u00e9rieures \u00e0 13.2X51-D39",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions ant\u00e9rieures \u00e0 15.1R1",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "CTPOS versions ant\u00e9rieures \u00e0 7.2R1",
"product": {
"name": "N/A",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions ant\u00e9rieures \u00e0 13.3R7",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions ant\u00e9rieures \u00e0 15.1X49-D30",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions ant\u00e9rieures \u00e0 12.3R11",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions ant\u00e9rieures \u00e0 13.2X51-D40",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions ant\u00e9rieures \u00e0 14.2R4",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos Space versions ant\u00e9rieures \u00e0 15.2R1",
"product": {
"name": "Junos Space",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "ScreenOS versions ant\u00e9rieures \u00e0 6.3.0r22",
"product": {
"name": "N/A",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions ant\u00e9rieures \u00e0 15.1F5",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions ant\u00e9rieures \u00e0 14.2R4-S1",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions ant\u00e9rieures \u00e0 12.3R9",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions ant\u00e9rieures \u00e0 12.3X48-D20",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions ant\u00e9rieures \u00e0 15.1R3",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions ant\u00e9rieures \u00e0 14.2R6",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions ant\u00e9rieures \u00e0 14.1R7",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "CTPOS versions ant\u00e9rieures \u00e0 7.1R2",
"product": {
"name": "N/A",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions ant\u00e9rieures \u00e0 12.1X46-D45",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions ant\u00e9rieures \u00e0 15.1X49-D40",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions ant\u00e9rieures \u00e0 14.2R3",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions ant\u00e9rieures \u00e0 16.1R1",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions ant\u00e9rieures \u00e0 12.1X46-D40",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions ant\u00e9rieures \u00e0 12.1X47-D25",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions ant\u00e9rieures \u00e0 13.3R8",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions ant\u00e9rieures \u00e0 14.2R5",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions ant\u00e9rieures \u00e0 13.2X52-D30",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions ant\u00e9rieures \u00e0 12.1X44-D55",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions ant\u00e9rieures \u00e0 12.3X50-D50",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions ant\u00e9rieures \u00e0 14.1R4",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions ant\u00e9rieures \u00e0 13.3R6",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions ant\u00e9rieures \u00e0 13.2R8",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions ant\u00e9rieures \u00e0 12.3X48-D25",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions ant\u00e9rieures \u00e0 12.3R12",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions ant\u00e9rieures \u00e0 15.1X53-D20",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions ant\u00e9rieures \u00e0 15.1X49-D15",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions ant\u00e9rieures \u00e0 13.2R9",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2016-1270",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1270"
},
{
"name": "CVE-2015-3153",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-3153"
},
{
"name": "CVE-2013-1667",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-1667"
},
{
"name": "CVE-2016-1269",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1269"
},
{
"name": "CVE-2015-3183",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-3183"
},
{
"name": "CVE-2015-1791",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-1791"
},
{
"name": "CVE-2012-5526",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-5526"
},
{
"name": "CVE-2015-3195",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-3195"
},
{
"name": "CVE-2016-0777",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-0777"
},
{
"name": "CVE-2015-2613",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2613"
},
{
"name": "CVE-2015-4749",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4749"
},
{
"name": "CVE-2016-1268",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1268"
},
{
"name": "CVE-2015-2808",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2808"
},
{
"name": "CVE-2015-3148",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-3148"
},
{
"name": "CVE-2014-3613",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-3613"
},
{
"name": "CVE-2008-2827",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-2827"
},
{
"name": "CVE-2016-1273",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1273"
},
{
"name": "CVE-2010-1168",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-1168"
},
{
"name": "CVE-2014-8151",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-8151"
},
{
"name": "CVE-2015-4000",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4000"
},
{
"name": "CVE-2016-1261",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1261"
},
{
"name": "CVE-2015-1789",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-1789"
},
{
"name": "CVE-2014-8150",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-8150"
},
{
"name": "CVE-2005-0448",
"url": "https://www.cve.org/CVERecord?id=CVE-2005-0448"
},
{
"name": "CVE-2014-3707",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-3707"
},
{
"name": "CVE-2015-3143",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-3143"
},
{
"name": "CVE-2010-2761",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-2761"
},
{
"name": "CVE-2012-5195",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-5195"
},
{
"name": "CVE-2010-3172",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-3172"
},
{
"name": "CVE-2012-6329",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-6329"
},
{
"name": "CVE-2004-0452",
"url": "https://www.cve.org/CVERecord?id=CVE-2004-0452"
},
{
"name": "CVE-2008-5302",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-5302"
},
{
"name": "CVE-2013-4449",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-4449"
},
{
"name": "CVE-2010-4410",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-4410"
},
{
"name": "CVE-2016-1271",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1271"
},
{
"name": "CVE-2015-3145",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-3145"
},
{
"name": "CVE-2015-3144",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-3144"
},
{
"name": "CVE-2015-2625",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2625"
},
{
"name": "CVE-2008-5303",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-5303"
},
{
"name": "CVE-2014-3620",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-3620"
},
{
"name": "CVE-2011-3597",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3597"
},
{
"name": "CVE-2015-2659",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2659"
},
{
"name": "CVE-2010-0212",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-0212"
},
{
"name": "CVE-2016-1274",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1274"
},
{
"name": "CVE-2011-1024",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-1024"
},
{
"name": "CVE-2016-1267",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1267"
},
{
"name": "CVE-2015-2601",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2601"
},
{
"name": "CVE-2016-1264",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1264"
},
{
"name": "CVE-2015-4748",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4748"
},
{
"name": "CVE-2014-0015",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-0015"
},
{
"name": "CVE-2015-1790",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-1790"
},
{
"name": "CVE-2016-0778",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-0778"
}
],
"initial_release_date": "2016-04-14T00:00:00",
"last_revision_date": "2016-04-14T00:00:00",
"links": [],
"reference": "CERTFR-2016-AVI-128",
"revisions": [
{
"description": "version initiale.",
"revision_date": "2016-04-14T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Injection de requ\u00eates ill\u00e9gitimes par rebond (CSRF)"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Injection de code indirecte \u00e0 distance"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 corrig\u00e9es dans \u003cspan\nclass=\"textit\"\u003eles produits Juniper\u003c/span\u003e. Certaines d\u0027entre elles\npermettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire\n\u00e0 distance, un d\u00e9ni de service \u00e0 distance et un contournement de la\npolitique de s\u00e9curit\u00e9.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Juniper",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10732 du 13 avril 2016",
"url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10732\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10733 du 13 avril 2016",
"url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10733\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10747 du 13 avril 2016",
"url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10747\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10739 du 13 avril 2016",
"url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10739\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10734 du 13 avril 2016",
"url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10734\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10743 du 13 avril 2016",
"url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10743\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10725 du 13 avril 2016",
"url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10725\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10746 du 13 avril 2016",
"url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10746\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10736 du 13 avril 2016",
"url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10736\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10730 du 13 avril 2016",
"url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10730\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10737 du 13 avril 2016",
"url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10737\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10735 du 13 avril 2016",
"url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10735\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10723 du 13 avril 2016",
"url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10723\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10727 du 13 avril 2016",
"url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10727\u0026cat=SIRT_1\u0026actp=LIST"
}
]
}
GHSA-JCJC-GX52-C9Q4
Vulnerability from github – Published: 2022-05-12 00:02 – Updated: 2022-05-12 00:02cURL and libcurl before 7.38.0 allow remote attackers to bypass the Same Origin Policy and set cookies for arbitrary sites by setting a cookie for a top-level domain.
{
"affected": [],
"aliases": [
"CVE-2014-3620"
],
"database_specific": {
"cwe_ids": [],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2014-11-18T15:59:00Z",
"severity": "MODERATE"
},
"details": "cURL and libcurl before 7.38.0 allow remote attackers to bypass the Same Origin Policy and set cookies for arbitrary sites by setting a cookie for a top-level domain.",
"id": "GHSA-jcjc-gx52-c9q4",
"modified": "2022-05-12T00:02:08Z",
"published": "2022-05-12T00:02:08Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2014-3620"
},
{
"type": "WEB",
"url": "https://support.apple.com/kb/HT205031"
},
{
"type": "WEB",
"url": "http://curl.haxx.se/docs/adv_20140910B.html"
},
{
"type": "WEB",
"url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10743"
},
{
"type": "WEB",
"url": "http://lists.apple.com/archives/security-announce/2015/Aug/msg00001.html"
},
{
"type": "WEB",
"url": "http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00024.html"
},
{
"type": "WEB",
"url": "http://www.debian.org/security/2014/dsa-3022"
},
{
"type": "WEB",
"url": "http://www.openwall.com/lists/oss-security/2022/05/11/2"
},
{
"type": "WEB",
"url": "http://www.securityfocus.com/bid/69742"
}
],
"schema_version": "1.4.0",
"severity": []
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.