5 results (0.010 seconds)

CVSS: 4.3EPSS: 0%CPEs: 22EXPL: 0

Cross-site scripting (XSS) vulnerability in the web server in the Juniper Junos Pulse Secure Access Service (SSL VPN) devices with IVE OS 8.0 before 8.0r6, 7.4 before 7.4r13, and 7.1 before 7.1r20 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors. Vulnerabilidad de XSS en el servidor web en los dispositivos Juniper Junos Pulse Secure Access Service (SSL VPN) con IVE OS 8.0 anterior a 8.0r6, 7.4 anterior a 7.4r13, y 7.1 anterior a 7.1r20 permite a atacantes remotos inyectar secuencias de comandos web o HTML arbitrarios a través de vectores no especificados. • http://www.securityfocus.com/bid/69804 https://kb.juniper.net/InfoCenter/index?page=content&id=JSA10646 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 4.3EPSS: 0%CPEs: 32EXPL: 0

Cross-site scripting (XSS) vulnerability in the SSL VPN/UAC web server in the Juniper Junos Pulse Secure Access Service (SSL VPN) devices with IVE OS 7.1 before 7.1r16, 7.4 before 7.4r3, and 8.0 before 8.0r1 and the Juniper Junos Pulse Access Control Service devices with UAC OS 4.1 before 4.1r8, 4.4 before 4.4r3 and 5.0 before 5.0r1 allows remote administrators to inject arbitrary web script or HTML via unspecified vectors. Vulnerabilidad de XSS en el servidor web SSL VPN/UAC en los dispositivos Juniper Junos Pulse Secure Access Service (SSL VPN) con IVE OS 7.1 anterior a 7.1r16, 7.4 anterior a 7.4r3, y 8.0 anterior a 8.0r1 y los dispositivos Juniper Junos Pulse Access Control Service con UAC OS 4.1 anterior a 4.1r8, 4.4 anterior a 4.4r3 y 5.0 anterior a 5.0r1 permite a administradores remotos inyectar secuencias de comandos web o HTML arbitrarios a través de vectores no especificados. • http://www.securitytracker.com/id/1030852 https://kb.juniper.net/InfoCenter/index?page=content&id=JSA10645 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 4.3EPSS: 0%CPEs: 21EXPL: 0

The Juniper Junos Pulse Secure Access Service (SSL VPN) devices with IVE OS 8.0 before 8.0r1, 7.4 before 7.4r5, and 7.1 before 7.1r18 allows remote attackers to conduct clickjacking attacks via unspecified vectors. Los dispositivos Juniper Junos Pulse Secure Access Service (SSL VPN) con IVE OS 8.0 anterior a 8.0r1, 7.4 anterior a 7.4r5, y 7.1 anterior a 7.1r18 permiten a atacantes remotos realizar ataques de clickjacking a través de vectores no especificados. • https://kb.juniper.net/InfoCenter/index?page=content&id=JSA10647 • CWE-20: Improper Input Validation •

CVSS: 5.4EPSS: 0%CPEs: 8EXPL: 0

Junos Pulse Secure Access Service (IVE) 7.1 before 7.1r5, 7.2 before 7.2r10, 7.3 before 7.3r6, and 7.4 before 7.4r3 and Junos Pulse Access Control Service (UAC) 4.1 before 4.1r8.1, 4.2 before 4.2r5, 4.3 before 4.3r6 and 4.4 before 4.4r3, when a hardware SSL acceleration card is enabled, allows remote attackers to cause a denial of service (device hang) via a crafted packet. Junos Pulse Secure Access Service (IVE) 7.1 anterior a 7.1r5, 7.2 anterior a 7.2r10, 7.3 anterior a 7.3r6, and 7.4 anterior a 7.4r3 y Junos Pulse Access Control Service (UAC) 4.1 anterior a 4.1r8.1, 4.2 anterior a 4.2r5, 4.3 anterior a 4.3r6 y 4.4 anterior a 4.4r3, cuando una tarjeta hardware de aceleración SSL esta habilitada, permite a atacantes remotos provocar una denegación de servicio (cuelgue del dispositivo) a través de un paquete manipulado. • http://osvdb.org/97241 http://secunia.com/advisories/54776 https://exchange.xforce.ibmcloud.com/vulnerabilities/87063 https://kb.juniper.net/InfoCenter/index?cmid=no&page=content&id=JSA10590 • CWE-20: Improper Input Validation •

CVSS: 4.3EPSS: 0%CPEs: 20EXPL: 0

Juniper Junos Pulse Secure Access Service (aka SSL VPN) with IVE OS 7.0r2 through 7.0r8 and 7.1r1 through 7.1r5 and Junos Pulse Access Control Service (aka UAC) with UAC OS 4.1r1 through 4.1r5 include a test Certification Authority (CA) certificate in the Trusted Server CAs list, which makes it easier for man-in-the-middle attackers to spoof SSL servers by leveraging control over that test CA. Juniper Junos Pulse Secure Access Service (también conocido como SSL VPN) con IVE OS v7.0r2 hasta v7.0r8 y v7.1r1 hasta v7.1r5 y Junos Pulse Access Control Service (también conocido como UAC) con UAC OS v4.1r1 hasta v4.1r5 incluyen un certificado de prueba en la lista Trusted Server CAs, que hace más fácil a atacantes man-in-the-middle burlar servidores SSL aprovechando el control de esa prueba CA. • http://kb.juniper.net/JSA10571 • CWE-310: Cryptographic Issues •