
CVE-2013-6618 – Juniper Junos J-Web - Privilege Escalation
https://notcve.org/view.php?id=CVE-2013-6618
05 Nov 2013 — jsdm/ajax/port.php in J-Web in Juniper Junos before 10.4R13, 11.4 before 11.4R7, 12.1 before 12.1R5, 12.2 before 12.2R3, and 12.3 before 12.3R1 allows remote authenticated users to execute arbitrary commands via the rsargs parameter in an exec action. jsdm / ajax / port.php de J-Web en Juniper Junos anterior 10.4R13, 11.4 anterior a 11.4R, 12,.1 anterior a 12.1R5 anterior a 12.2R3 y 12.3 antes 12.3R1 permite a usuarios remotos autenticados ejecutar comandos arbitrarios a través del parámetro rsargs en una a... • https://www.exploit-db.com/exploits/29544 • CWE-20: Improper Input Validation •

CVE-2013-6015
https://notcve.org/view.php?id=CVE-2013-6015
17 Oct 2013 — Juniper Junos before 10.4S14, 11.4 before 11.4R5-S2, 12.1R before 12.1R3, 12.1X44 before 12.1X44-D20, and 12.1X45 before 12.1X45-D15 on SRX Series services gateways, when a plugin using TCP proxy is configured, allows remote attackers to cause a denial of service (flow daemon crash) via an unspecified sequence of TCP packets. Juniper Junos en versiones anteriores a 10.4S14, 11.4 en versiones anteriores a 11.4R5-S2, 12.1R en versiones anteriores a 12.1R3, 12.1X44 en versiones anteriores a 12.1X44-D20 y 12.1X... • http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10596 • CWE-20: Improper Input Validation •

CVE-2013-4689
https://notcve.org/view.php?id=CVE-2013-4689
17 Oct 2013 — J-Web in Juniper Junos before 10.4R13, 11.4 before 11.4R7, 12.1R before 12.1R6, 12.1X44 before 12.1X44-D15, 12.1x45 before 12.1X45-D10, 12.2 before 12.2R3, 12.3 before 12.3R2, and 13.1 before 13.1R3 allow remote attackers to bypass the cross-site request forgery (CSRF) protection mechanism and hijack the authentication of administrators for requests that (1) create new administrator accounts or (2) have other unspecified impacts. J-Web in Juniper Junos anterior a la versión 10.4R13, 11.4 anterior a 11.4R7, ... • http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10597 • CWE-352: Cross-Site Request Forgery (CSRF) •

CVE-2013-6013
https://notcve.org/view.php?id=CVE-2013-6013
17 Oct 2013 — Buffer overflow in the flow daemon (flowd) in Juniper Junos 10.4 before 10.4S14, 11.4 before 11.4R7-S2, 12.1.X44 before 12.1X44-D15, 12.1X45 before 12.1X45-D10 on SRX devices, when using telnet pass-through authentication on the firewall, might allow remote attackers to execute arbitrary code via a crafted telnet message. Desbordamiento de búfer en el demonio de flujo (flowd) de Juniper Junos anterior 10.4S14 10.4, 11.4 anterior 11.4R7-S2, 12.1.X44 anterior 12.1X44-D15, anterior 12.1X45 12.1X45-D10 en dispo... • http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10594 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVE-2013-5650
https://notcve.org/view.php?id=CVE-2013-5650
16 Sep 2013 — Junos Pulse Secure Access Service (IVE) 7.1 before 7.1r5, 7.2 before 7.2r10, 7.3 before 7.3r6, and 7.4 before 7.4r3 and Junos Pulse Access Control Service (UAC) 4.1 before 4.1r8.1, 4.2 before 4.2r5, 4.3 before 4.3r6 and 4.4 before 4.4r3, when a hardware SSL acceleration card is enabled, allows remote attackers to cause a denial of service (device hang) via a crafted packet. Junos Pulse Secure Access Service (IVE) 7.1 anterior a 7.1r5, 7.2 anterior a 7.2r10, 7.3 anterior a 7.3r6, and 7.4 anterior a 7.4r3 y J... • http://osvdb.org/97241 • CWE-20: Improper Input Validation •

CVE-2006-3529
https://notcve.org/view.php?id=CVE-2006-3529
12 Jul 2006 — Memory leak in Juniper JUNOS 6.4 through 8.0, built before May 10, 2006, allows remote attackers to cause a denial of service (kernel packet memory consumption and crash) via crafted IPv6 packets whose buffers are not released after they are processed. Fuga de memoria en Juniper JUNOS de 6.4 a 8.0, construidos antes del 10 de mayo de 2006, permite a atacantes remotos provocar una denegación de servicio (agotamiento del paquete de memoria del núcleo y caída) a través de paquetes IPv6 manipulados cuyos búfers... • http://secunia.com/advisories/21003 •