var-202001-0997
Vulnerability from variot
Insufficient Cross-Site Scripting (XSS) protection in J-Web may potentially allow a remote attacker to inject web script or HTML, hijack the target user's J-Web session and perform administrative actions on the Junos device as the targeted user. This issue affects Juniper Networks Junos OS 12.3 versions prior to 12.3R12-S15; 12.3X48 versions prior to 12.3X48-D86, 12.3X48-D90 on SRX Series; 14.1X53 versions prior to 14.1X53-D51 on EX and QFX Series; 15.1F6 versions prior to 15.1F6-S13; 15.1 versions prior to 15.1R7-S5; 15.1X49 versions prior to 15.1X49-D181, 15.1X49-D190 on SRX Series; 15.1X53 versions prior to 15.1X53-D238 on QFX5200/QFX5110 Series; 15.1X53 versions prior to 15.1X53-D592 on EX2300/EX3400 Series; 16.1 versions prior to 16.1R4-S13, 16.1R7-S5; 16.2 versions prior to 16.2R2-S10; 17.1 versions prior to 17.1R2-S11, 17.1R3-S1; 17.2 versions prior to 17.2R1-S9, 17.2R3-S2; 17.3 versions prior to 17.3R2-S5, 17.3R3-S5; 17.4 versions prior to 17.4R2-S6, 17.4R3; 18.1 versions prior to 18.1R3-S7; 18.2 versions prior to 18.2R2-S5, 18.2R3; 18.3 versions prior to 18.3R1-S6, 18.3R2-S1, 18.3R3; 18.4 versions prior to 18.4R1-S5, 18.4R2; 19.1 versions prior to 19.1R1-S2, 19.1R2. Junos OS contains a cross-site scripting vulnerability (CWE-79). Toshitsugu Yoneyama of Mitsui Bussan Secure Directions, Inc. reported this vulnerability to IPA. JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.An arbitrary script may be executed on the user's J-Web screen. Juniper Networks Junos OS is a set of network operating system of Juniper Networks (Juniper Networks) dedicated to the company's hardware equipment. The operating system provides a secure programming interface and Junos SDK. The following products and versions are affected: Juniper Networks Junos OS Release 12.3, Release 12.3X48, Release 14.1X53, Release 15.1, Release 15.1F6, Release 15.1X49, Release 15.1X53, Release 16.1, Release 16.2, Release 17.1, Release 17.2, Release 17.3 Version, version 17.4, version 18.1, version 18.2, version 18.3, version 18.4, version 19.1
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202001-0997", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "junos", "scope": "eq", "trust": 1.0, "vendor": "juniper", "version": "15.1x49" }, { "model": "junos", "scope": "eq", "trust": 1.0, "vendor": "juniper", "version": "15.1x53" }, { "model": "junos", "scope": "eq", "trust": 1.0, "vendor": "juniper", "version": "17.2" }, { "model": "junos", "scope": "eq", "trust": 1.0, "vendor": "juniper", "version": "16.1" }, { "model": "junos", "scope": "eq", "trust": 1.0, "vendor": "juniper", "version": "16.2" }, { "model": "junos", "scope": "eq", "trust": 1.0, "vendor": "juniper", "version": "18.2" }, { "model": "junos", "scope": "eq", "trust": 1.0, "vendor": "juniper", "version": "17.1" }, { "model": "junos", "scope": "eq", "trust": 1.0, "vendor": "juniper", "version": "18.3" }, { "model": "junos", "scope": "eq", "trust": 1.0, "vendor": "juniper", "version": "12.3" }, { "model": "junos", "scope": "eq", "trust": 1.0, "vendor": "juniper", "version": "18.4" }, { "model": "junos", "scope": "eq", "trust": 1.0, "vendor": "juniper", "version": "12.3x48" }, { "model": "junos", "scope": "eq", "trust": 1.0, "vendor": "juniper", "version": "17.3" }, { "model": "junos", "scope": "eq", "trust": 1.0, "vendor": "juniper", "version": "19.1" }, { "model": "junos", "scope": "eq", "trust": 1.0, "vendor": "juniper", "version": "14.1x53" }, { "model": "junos", "scope": "eq", "trust": 1.0, "vendor": "juniper", "version": "17.4" }, { "model": "junos", "scope": "eq", "trust": 1.0, "vendor": "juniper", "version": "18.1" }, { "model": "junos", "scope": "eq", "trust": 1.0, "vendor": "juniper", "version": "15.1" }, { "model": "junos os", "scope": "eq", "trust": 0.8, "vendor": "juniper", "version": "12.3 prior to 12.3r12-s15 on ex and qfx series" }, { "model": "junos os", "scope": "eq", "trust": 0.8, "vendor": "juniper", "version": "12.3x48 prior to 12.3x48-d86, 12.3x48-d90 on srx series" }, { "model": "junos os", "scope": "eq", "trust": 0.8, "vendor": "juniper", "version": "14.1x53 prior to 14.1x53-d51 on ex and qfx series" }, { "model": "junos os", "scope": "eq", "trust": 0.8, "vendor": "juniper", "version": "15.1 prior to 15.1r7-s5" }, { "model": "junos os", "scope": "eq", "trust": 0.8, "vendor": "juniper", "version": "15.1f6 prior to 15.1f6-s13" }, { "model": "junos os", "scope": "eq", "trust": 0.8, "vendor": "juniper", "version": "15.1x49 prior to 15.1x49-d181, 15.1x49-d190 on srx series" }, { "model": "junos os", "scope": "eq", "trust": 0.8, "vendor": "juniper", "version": "15.1x53 prior to 15.1x53-d238 on qfx5200/qfx5110 series" }, { "model": "junos os", "scope": "eq", "trust": 0.8, "vendor": "juniper", "version": "15.1x53 prior to 15.1x53-d592 on ex2300/ex3400 series" }, { "model": "junos os", "scope": "eq", "trust": 0.8, "vendor": "juniper", "version": "16.1 prior to 16.1r4-s13, 16.1r7-s5" }, { "model": "junos os", "scope": "eq", "trust": 0.8, "vendor": "juniper", "version": "16.2 prior to 16.2r2-s10" }, { "model": "junos os", "scope": "eq", "trust": 0.8, "vendor": "juniper", "version": "17.1 prior to 17.1r2-s11, 17.1r3-s1" }, { "model": "junos os", "scope": "eq", "trust": 0.8, "vendor": "juniper", "version": "17.2 prior to 17.2r1-s9, 17.2r3-s2" }, { "model": "junos os", "scope": "eq", "trust": 0.8, "vendor": "juniper", "version": "17.3 prior to 17.3r2-s5, 17.3r3-s5" }, { "model": "junos os", "scope": "eq", "trust": 0.8, "vendor": "juniper", "version": "17.4 prior to 17.4r2-s6, 17.4r3" }, { "model": "junos os", "scope": "eq", "trust": 0.8, "vendor": "juniper", "version": "18.1 prior to 18.1r3-s7" }, { "model": "junos os", "scope": "eq", "trust": 0.8, "vendor": "juniper", "version": "18.2 prior to 18.2r2-s5, 18.2r3" }, { "model": "junos os", "scope": "eq", "trust": 0.8, "vendor": "juniper", "version": "18.3 prior to 18.3r1-s6, 18.3r2-s1, 18.3r3" }, { "model": "junos os", "scope": "eq", "trust": 0.8, "vendor": "juniper", "version": "18.4 prior to 18.4r1-s5, 18.4r2" }, { "model": "junos os", "scope": "eq", "trust": 0.8, "vendor": "juniper", "version": "19.1 prior to 19.1r1-s2, 19.1r2" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2020-000003" }, { "db": "NVD", "id": "CVE-2020-1607" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/o:juniper:junos", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2020-000003" } ] }, "cve": "CVE-2020-1607", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "exploitabilityScore": 8.6, "id": "CVE-2020-1607", "impactScore": 2.9, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 1.0, "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "High", "accessVector": "Network", "authentication": "None", "author": "IPA", "availabilityImpact": "None", "baseScore": 2.6, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "JVNDB-2020-000003", "impactScore": null, "integrityImpact": "Partial", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Low", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:H/Au:N/C:N/I:P/A:N", "version": "2.0" }, { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "exploitabilityScore": 8.6, "id": "VHN-169111", "impactScore": 2.9, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:M/AU:N/C:N/I:P/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "exploitabilityScore": 2.8, "id": "CVE-2020-1607", "impactScore": 2.7, "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "trust": 1.0, "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, { "attackComplexity": "HIGH", "attackVector": "NETWORK", "author": "sirt@juniper.net", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 1.6, "id": "CVE-2020-1607", "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "IPA", "availabilityImpact": "None", "baseScore": 6.1, "baseSeverity": "Medium", "confidentialityImpact": "Low", "exploitabilityScore": null, "id": "JVNDB-2020-000003", "impactScore": null, "integrityImpact": "Low", "privilegesRequired": "None", "scope": "Changed", "trust": 0.8, "userInteraction": "Required", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2020-1607", "trust": 1.0, "value": "MEDIUM" }, { "author": "sirt@juniper.net", "id": "CVE-2020-1607", "trust": 1.0, "value": "HIGH" }, { "author": "IPA", "id": "JVNDB-2020-000003", "trust": 0.8, "value": "Medium" }, { "author": "CNNVD", "id": "CNNVD-202001-301", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-169111", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-169111" }, { "db": "JVNDB", "id": "JVNDB-2020-000003" }, { "db": "CNNVD", "id": "CNNVD-202001-301" }, { "db": "NVD", "id": "CVE-2020-1607" }, { "db": "NVD", "id": "CVE-2020-1607" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Insufficient Cross-Site Scripting (XSS) protection in J-Web may potentially allow a remote attacker to inject web script or HTML, hijack the target user\u0027s J-Web session and perform administrative actions on the Junos device as the targeted user. This issue affects Juniper Networks Junos OS 12.3 versions prior to 12.3R12-S15; 12.3X48 versions prior to 12.3X48-D86, 12.3X48-D90 on SRX Series; 14.1X53 versions prior to 14.1X53-D51 on EX and QFX Series; 15.1F6 versions prior to 15.1F6-S13; 15.1 versions prior to 15.1R7-S5; 15.1X49 versions prior to 15.1X49-D181, 15.1X49-D190 on SRX Series; 15.1X53 versions prior to 15.1X53-D238 on QFX5200/QFX5110 Series; 15.1X53 versions prior to 15.1X53-D592 on EX2300/EX3400 Series; 16.1 versions prior to 16.1R4-S13, 16.1R7-S5; 16.2 versions prior to 16.2R2-S10; 17.1 versions prior to 17.1R2-S11, 17.1R3-S1; 17.2 versions prior to 17.2R1-S9, 17.2R3-S2; 17.3 versions prior to 17.3R2-S5, 17.3R3-S5; 17.4 versions prior to 17.4R2-S6, 17.4R3; 18.1 versions prior to 18.1R3-S7; 18.2 versions prior to 18.2R2-S5, 18.2R3; 18.3 versions prior to 18.3R1-S6, 18.3R2-S1, 18.3R3; 18.4 versions prior to 18.4R1-S5, 18.4R2; 19.1 versions prior to 19.1R1-S2, 19.1R2. Junos OS contains a cross-site scripting vulnerability (CWE-79). Toshitsugu Yoneyama of Mitsui Bussan Secure Directions, Inc. reported this vulnerability to IPA. JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.An arbitrary script may be executed on the user\u0027s J-Web screen. Juniper Networks Junos OS is a set of network operating system of Juniper Networks (Juniper Networks) dedicated to the company\u0027s hardware equipment. The operating system provides a secure programming interface and Junos SDK. The following products and versions are affected: Juniper Networks Junos OS Release 12.3, Release 12.3X48, Release 14.1X53, Release 15.1, Release 15.1F6, Release 15.1X49, Release 15.1X53, Release 16.1, Release 16.2, Release 17.1, Release 17.2, Release 17.3 Version, version 17.4, version 18.1, version 18.2, version 18.3, version 18.4, version 19.1", "sources": [ { "db": "NVD", "id": "CVE-2020-1607" }, { "db": "JVNDB", "id": "JVNDB-2020-000003" }, { "db": "VULHUB", "id": "VHN-169111" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2020-1607", "trust": 2.5 }, { "db": "JUNIPER", "id": "JSA10986", "trust": 1.7 }, { "db": "JVN", "id": "JVN21753370", "trust": 1.4 }, { "db": "JVNDB", "id": "JVNDB-2020-000003", "trust": 1.4 }, { "db": "CNNVD", "id": "CNNVD-202001-301", "trust": 0.7 }, { "db": "AUSCERT", "id": "ESB-2020.0082", "trust": 0.6 }, { "db": "JUNIPER", "id": "JSA10979", "trust": 0.6 }, { "db": "JUNIPER", "id": "JSA10980", "trust": 0.6 }, { "db": "JUNIPER", "id": "JSA10985", "trust": 0.6 }, { "db": "JUNIPER", "id": "JSA10982", "trust": 0.6 }, { "db": "CNVD", "id": "CNVD-2020-03713", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-169111", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-169111" }, { "db": "JVNDB", "id": "JVNDB-2020-000003" }, { "db": "CNNVD", "id": "CNNVD-202001-301" }, { "db": "NVD", "id": "CVE-2020-1607" } ] }, "id": "VAR-202001-0997", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-169111" } ], "trust": 0.01 }, "last_update_date": "2024-11-23T22:05:50.533000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "2020-01 Security Bulletin: Junos OS: Cross-Site Scripting (XSS) in J-Web (CVE-2020-1607)", "trust": 0.8, "url": "https://kb.juniper.net/JSA10986" }, { "title": "Juniper Networks Junos OS Fixes for cross-site scripting vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=108388" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2020-000003" }, { "db": "CNNVD", "id": "CNNVD-202001-301" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-79", "trust": 1.9 } ], "sources": [ { "db": "VULHUB", "id": "VHN-169111" }, { "db": "JVNDB", "id": "JVNDB-2020-000003" }, { "db": "NVD", "id": "CVE-2020-1607" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://kb.juniper.net/jsa10986" }, { "trust": 1.4, "url": "https://jvn.jp/en/jp/jvn21753370/index.html" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2020-1607" }, { "trust": 0.6, "url": "http://kb.juniper.net/infocenter/index?page=content\u0026id=jsa10986" }, { "trust": 0.6, "url": "http://kb.juniper.net/infocenter/index?page=content\u0026id=jsa10985" }, { "trust": 0.6, "url": "http://kb.juniper.net/infocenter/index?page=content\u0026id=jsa10982" }, { "trust": 0.6, "url": "http://kb.juniper.net/infocenter/index?page=content\u0026id=jsa10980" }, { "trust": 0.6, "url": "http://kb.juniper.net/infocenter/index?page=content\u0026id=jsa10979" }, { "trust": 0.6, "url": "https://vigilance.fr/vulnerability/junos-os-cross-site-scripting-via-j-web-31280" }, { "trust": 0.6, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-1607" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2020.0082/" }, { "trust": 0.6, "url": "https://jvndb.jvn.jp/en/contents/2020/jvndb-2020-000003.html" } ], "sources": [ { "db": "VULHUB", "id": "VHN-169111" }, { "db": "JVNDB", "id": "JVNDB-2020-000003" }, { "db": "CNNVD", "id": "CNNVD-202001-301" }, { "db": "NVD", "id": "CVE-2020-1607" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-169111" }, { "db": "JVNDB", "id": "JVNDB-2020-000003" }, { "db": "CNNVD", "id": "CNNVD-202001-301" }, { "db": "NVD", "id": "CVE-2020-1607" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2020-01-15T00:00:00", "db": "VULHUB", "id": "VHN-169111" }, { "date": "2020-01-10T00:00:00", "db": "JVNDB", "id": "JVNDB-2020-000003" }, { "date": "2020-01-09T00:00:00", "db": "CNNVD", "id": "CNNVD-202001-301" }, { "date": "2020-01-15T09:15:12.560000", "db": "NVD", "id": "CVE-2020-1607" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2020-01-24T00:00:00", "db": "VULHUB", "id": "VHN-169111" }, { "date": "2020-01-10T00:00:00", "db": "JVNDB", "id": "JVNDB-2020-000003" }, { "date": "2020-05-19T00:00:00", "db": "CNNVD", "id": "CNNVD-202001-301" }, { "date": "2024-11-21T05:10:57.287000", "db": "NVD", "id": "CVE-2020-1607" } ] }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Junos OS vulnerable to cross-site scripting", "sources": [ { "db": "JVNDB", "id": "JVNDB-2020-000003" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "XSS", "sources": [ { "db": "CNNVD", "id": "CNNVD-202001-301" } ], "trust": 0.6 } }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.