Help us improve your experience.

Let us know what you think.

Do you have time for a two-minute survey?




Hierarchy Level


Vulnerability type of attack.

Vulnerabilities are the intersection of three elements: a system susceptibility or flaw, attacker access to the flaw, and attacker capability to exploit the flaw. A security risk is often incorrectly classified as a vulnerability.

Using this field you can perform vulnerability scanning. Vulnerability scanning is an inspection of the potential points of exploit on a network to identify security issues. A vulnerability scan detects and classifies system weaknesses in a networks and predicts the effectiveness of countermeasures.



Values for vulnerability-type field (for example: buffer overflow, injection, use after free, Cross-site scripting (XSS), Remote Code Execution (RCE), and so on. Specifying the vulnerability type for IDP will indicate which applications are weak and therefore can be manipulated. The type of vulnerability is reported for fixing these vulnerabilities.

Required Privilege Level


Release Information

Statement introduced in Junos OS Release 18.2R1.