Help us improve your experience.

Let us know what you think.

Do you have time for a two-minute survey?

 
 

vulnerability-type

Syntax

Hierarchy Level

Description

Vulnerability type of attack.

Vulnerabilities are the intersection of three elements: a system susceptibility or flaw, attacker access to the flaw, and attacker capability to exploit the flaw. A security risk is often incorrectly classified as a vulnerability.

Using this field you can perform vulnerability scanning. Vulnerability scanning is an inspection of the potential points of exploit on a network to identify security issues. A vulnerability scan detects and classifies system weaknesses in a networks and predicts the effectiveness of countermeasures.

Options

values

Values for vulnerability-type field (for example: buffer overflow, injection, use after free, Cross-site scripting (XSS), Remote Code Execution (RCE), and so on. Specifying the vulnerability type for IDP will indicate which applications are weak and therefore can be manipulated. The type of vulnerability is reported for fixing these vulnerabilities.

Required Privilege Level

security

Release Information

Statement introduced in Junos OS Release 18.2R1.