4.3
CVE-2014-3823
- EPSS 0.24%
- Published 29.09.2014 14:55:08
- Last modified 12.04.2025 10:46:40
- Source cve@mitre.org
- Teams watchlist Login
- Open Login
The Juniper Junos Pulse Secure Access Service (SSL VPN) devices with IVE OS 8.0 before 8.0r1, 7.4 before 7.4r5, and 7.1 before 7.1r18 allows remote attackers to conduct clickjacking attacks via unspecified vectors.
Data is provided by the National Vulnerability Database (NVD)
Juniper ≫ Junos Pulse Secure Access Service Version7.1
Juniper ≫ Junos Pulse Secure Access Service Version7.1r1.1
Juniper ≫ Junos Pulse Secure Access Service Version7.1r2
Juniper ≫ Junos Pulse Secure Access Service Version7.1r3
Juniper ≫ Junos Pulse Secure Access Service Version7.1r4
Juniper ≫ Junos Pulse Secure Access Service Version7.1r5
Juniper ≫ Junos Pulse Secure Access Service Version7.1r6
Juniper ≫ Junos Pulse Secure Access Service Version7.1r7
Juniper ≫ Junos Pulse Secure Access Service Version7.1r8
Juniper ≫ Junos Pulse Secure Access Service Version7.1r9
Juniper ≫ Junos Pulse Secure Access Service Version7.1r10
Juniper ≫ Junos Pulse Secure Access Service Version7.1r11
Juniper ≫ Junos Pulse Secure Access Service Version7.1r12
Juniper ≫ Junos Pulse Secure Access Service Version7.1r13
Juniper ≫ Junos Pulse Secure Access Service Version7.1r14
Juniper ≫ Junos Pulse Secure Access Service Version7.1r15
Juniper ≫ Junos Pulse Secure Access Service Version7.4 Updater1.0
Juniper ≫ Junos Pulse Secure Access Service Version7.4 Updater2.0
Juniper ≫ Junos Pulse Secure Access Service Version7.4 Updater3.0
Juniper ≫ Junos Pulse Secure Access Service Version7.4 Updater4.0
Juniper ≫ Junos Pulse Secure Access Service Version8.0
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Type | Source | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 0.24% | 0.447 |
Source | Base Score | Exploit Score | Impact Score | Vector string |
---|---|---|---|---|
nvd@nist.gov | 4.3 | 8.6 | 2.9 |
AV:N/AC:M/Au:N/C:N/I:P/A:N
|
CWE-20 Improper Input Validation
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.