mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-07-29 05:56:59 +00:00
113 lines
4.2 KiB
JSON
113 lines
4.2 KiB
JSON
{
|
|
"CVE_data_meta" : {
|
|
"ASSIGNER" : "cve@mitre.org",
|
|
"ID" : "CVE-2015-7755",
|
|
"STATE" : "PUBLIC"
|
|
},
|
|
"affects" : {
|
|
"vendor" : {
|
|
"vendor_data" : [
|
|
{
|
|
"product" : {
|
|
"product_data" : [
|
|
{
|
|
"product_name" : "n/a",
|
|
"version" : {
|
|
"version_data" : [
|
|
{
|
|
"version_value" : "n/a"
|
|
}
|
|
]
|
|
}
|
|
}
|
|
]
|
|
},
|
|
"vendor_name" : "n/a"
|
|
}
|
|
]
|
|
}
|
|
},
|
|
"data_format" : "MITRE",
|
|
"data_type" : "CVE",
|
|
"data_version" : "4.0",
|
|
"description" : {
|
|
"description_data" : [
|
|
{
|
|
"lang" : "eng",
|
|
"value" : "Juniper ScreenOS 6.2.0r15 through 6.2.0r18, 6.3.0r12 before 6.3.0r12b, 6.3.0r13 before 6.3.0r13b, 6.3.0r14 before 6.3.0r14b, 6.3.0r15 before 6.3.0r15b, 6.3.0r16 before 6.3.0r16b, 6.3.0r17 before 6.3.0r17b, 6.3.0r18 before 6.3.0r18b, 6.3.0r19 before 6.3.0r19b, and 6.3.0r20 before 6.3.0r21 allows remote attackers to obtain administrative access by entering an unspecified password during a (1) SSH or (2) TELNET session."
|
|
}
|
|
]
|
|
},
|
|
"problemtype" : {
|
|
"problemtype_data" : [
|
|
{
|
|
"description" : [
|
|
{
|
|
"lang" : "eng",
|
|
"value" : "n/a"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
"references" : {
|
|
"reference_data" : [
|
|
{
|
|
"name" : "http://arstechnica.com/security/2015/12/unauthorized-code-in-juniper-firewalls-decrypts-encrypted-vpn-traffic/",
|
|
"refsource" : "MISC",
|
|
"url" : "http://arstechnica.com/security/2015/12/unauthorized-code-in-juniper-firewalls-decrypts-encrypted-vpn-traffic/"
|
|
},
|
|
{
|
|
"name" : "http://twitter.com/cryptoron/statuses/677900647560253442",
|
|
"refsource" : "MISC",
|
|
"url" : "http://twitter.com/cryptoron/statuses/677900647560253442"
|
|
},
|
|
{
|
|
"name" : "http://www.forbes.com/sites/thomasbrewster/2015/12/18/juniper-says-it-didnt-work-with-government-to-add-unauthorized-code-to-network-gear/",
|
|
"refsource" : "MISC",
|
|
"url" : "http://www.forbes.com/sites/thomasbrewster/2015/12/18/juniper-says-it-didnt-work-with-government-to-add-unauthorized-code-to-network-gear/"
|
|
},
|
|
{
|
|
"name" : "http://www.wired.com/2015/12/juniper-networks-hidden-backdoors-show-the-risk-of-government-backdoors/",
|
|
"refsource" : "MISC",
|
|
"url" : "http://www.wired.com/2015/12/juniper-networks-hidden-backdoors-show-the-risk-of-government-backdoors/"
|
|
},
|
|
{
|
|
"name" : "https://adamcaudill.com/2015/12/17/much-ado-about-juniper/",
|
|
"refsource" : "MISC",
|
|
"url" : "https://adamcaudill.com/2015/12/17/much-ado-about-juniper/"
|
|
},
|
|
{
|
|
"name" : "https://github.com/hdm/juniper-cve-2015-7755",
|
|
"refsource" : "MISC",
|
|
"url" : "https://github.com/hdm/juniper-cve-2015-7755"
|
|
},
|
|
{
|
|
"name" : "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10713",
|
|
"refsource" : "CONFIRM",
|
|
"url" : "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10713"
|
|
},
|
|
{
|
|
"name" : "https://forums.juniper.net/t5/Security-Incident-Response/Important-Announcement-about-ScreenOS/ba-p/285554",
|
|
"refsource" : "CONFIRM",
|
|
"url" : "https://forums.juniper.net/t5/Security-Incident-Response/Important-Announcement-about-ScreenOS/ba-p/285554"
|
|
},
|
|
{
|
|
"name" : "VU#640184",
|
|
"refsource" : "CERT-VN",
|
|
"url" : "http://www.kb.cert.org/vuls/id/640184"
|
|
},
|
|
{
|
|
"name" : "79626",
|
|
"refsource" : "BID",
|
|
"url" : "http://www.securityfocus.com/bid/79626"
|
|
},
|
|
{
|
|
"name" : "1034489",
|
|
"refsource" : "SECTRACK",
|
|
"url" : "http://www.securitytracker.com/id/1034489"
|
|
}
|
|
]
|
|
}
|
|
}
|