vulnerability-type
Syntax
vulnerability-type { values [ values ]; }
Hierarchy Level
[edit security idp (Security) dynamic-attack-group name filters]
Description
Vulnerability type of attack.
Vulnerabilities are the intersection of three elements: a system susceptibility or flaw, attacker access to the flaw, and attacker capability to exploit the flaw. A security risk is often incorrectly classified as a vulnerability.
Using this field you can perform vulnerability scanning. Vulnerability scanning is an inspection of the potential points of exploit on a network to identify security issues. A vulnerability scan detects and classifies system weaknesses in a networks and predicts the effectiveness of countermeasures.
Options
values | Values for vulnerability-type field (for example: buffer overflow, injection, use after free, Cross-site scripting (XSS), Remote Code Execution (RCE), and so on. Specifying the vulnerability type for IDP will indicate which applications are weak and therefore can be manipulated. The type of vulnerability is reported for fixing these vulnerabilities. |
Required Privilege Level
security
Release Information
Statement introduced in Junos OS Release 18.2R1.