Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2014-6379

EPSS 0.53% · P67
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2014-6379

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Description
Juniper Junos 11.4 before R12, 12.1 before R10, 12.1X44 before D35, 12.1X45 before D25, 12.1X46 before D20, 12.1X47 before D10, 12.2 before R8, 12.2X50 before D70, 12.3 before R6, 13.1 before R4-S3, 13.1X49 before D55, 13.1X50 before D30, 13.2 before R4, 13.2X50 before D20, 13.2X51 before D26 and D30, 13.2X52 before D15, 13.3 before R2, and 14.1 before R1, when a RADIUS accounting server is configured as [system accounting destination radius], creates an entry in /var/etc/pam_radius.conf, which might allow remote attackers to bypass authentication via unspecified vectors.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Title
Juniper Networks Juniper Junos 安全绕过漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Juniper Junos是美国瞻博网络(Juniper Networks)公司的一套专用于该公司的硬件系统的网络操作系统。该操作系统提供了安全编程接口和Junos SDK。 Juniper Networks Juniper Junos中存在安全漏洞。当RADIUS accounting服务器配置为‘system accounting destination radius’并在/var/etc/pam_radius.conf中创建条目时,远程攻击者可利用该漏洞绕过身份验证。以下版本受到影响:Juniper
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
-n/a n/a -

II. Public POCs for CVE-2014-6379

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2014-6379

登录查看更多情报信息。

Same Patch Batch · n/a · 2014-10-14 · 11 CVEs total

CVE-2014-3818Juniper Networks Juniper Junos OS 拒绝服务漏洞
CVE-2014-3825Juniper Networks Juniper SRX Series devices with Junos 拒绝服务漏洞
CVE-2014-6313WordPress WooCommerce‘rang’参数跨站脚本漏洞
CVE-2014-6377Juniper Networks Juniper JunosE 拒绝服务漏洞
CVE-2014-6378Juniper Networks Juniper Junos 拒绝服务漏洞
CVE-2014-6380Juniper Networks Juniper Junos 拒绝服务漏洞
CVE-2014-8069YOOtheme Pagekit CMS 跨站脚本漏洞
CVE-2014-8070YOOtheme Pagekit CMS 开放重定向漏洞
CVE-2014-8765Drupal Project Issue File Review模块跨站脚本漏洞
CVE-2014-8766Allomani Weblinks SQL注入漏洞

IV. Related Vulnerabilities

V. Comments for CVE-2014-6379

No comments yet


Leave a comment