Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2014-6380

EPSS 0.85% · P75
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2014-6380

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Description
Juniper Junos 11.4 before R11, 12.1 before R9, 12.1X44 before D30, 12.1X45 before D20, 12.1X46 before D15, 12.1X47 before D10, 12.2 before R8, 12.2X50 before D70, 12.3 before R6, 13.1 before R4, 13.1X49 before D55, 13.1X50 before D30, 13.2 before R4, 13.2X50 before D20, 13.2X51 before D15, 13.2X52 before D15, 13.3 before R1, when using an em interface to connect to a certain internal network, allows remote attackers to cause a denial of service (em driver bock and FPC reset or "go offline") via a series of crafted (1) CLNP fragmented packets, when clns-routing or ESIS is configured, or (2) IPv4 or (3) IPv6 fragmented packets.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Title
Juniper Networks Juniper Junos 拒绝服务漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Juniper Junos是美国瞻博网络(Juniper Networks)公司的一套专用于该公司的硬件系统的网络操作系统。该操作系统提供了安全编程接口和Junos SDK。 Juniper Networks Juniper Junos中存在安全漏洞。当程序使用em接口连接特定的内部网络时,远程攻击者可借助一系列特制的CLNP(程序配置clns-routing或ESIS时使用)、IPv4或IPv6分段数据包利用该漏洞造成拒绝服务(em driver bock和FPC重置或脱机)。以下版本受到影响:Juni
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
-n/a n/a -

II. Public POCs for CVE-2014-6380

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2014-6380

登录查看更多情报信息。

Same Patch Batch · n/a · 2014-10-14 · 11 CVEs total

CVE-2014-3818Juniper Networks Juniper Junos OS 拒绝服务漏洞
CVE-2014-3825Juniper Networks Juniper SRX Series devices with Junos 拒绝服务漏洞
CVE-2014-6313WordPress WooCommerce‘rang’参数跨站脚本漏洞
CVE-2014-6377Juniper Networks Juniper JunosE 拒绝服务漏洞
CVE-2014-6378Juniper Networks Juniper Junos 拒绝服务漏洞
CVE-2014-6379Juniper Networks Juniper Junos 安全绕过漏洞
CVE-2014-8069YOOtheme Pagekit CMS 跨站脚本漏洞
CVE-2014-8070YOOtheme Pagekit CMS 开放重定向漏洞
CVE-2014-8765Drupal Project Issue File Review模块跨站脚本漏洞
CVE-2014-8766Allomani Weblinks SQL注入漏洞

IV. Related Vulnerabilities

V. Comments for CVE-2014-6380

No comments yet


Leave a comment