Page 2 of 52 results (0.002 seconds)

CVSS: 6.5EPSS: 0%CPEs: 16EXPL: 0

10 Jan 2018 — A vulnerability in the Juniper Networks Junos Space Security Director allows a user who does not have SSH access to a device to reuse the URL that was created for another user to perform SSH access. Affected releases are all versions of Junos Space Security Director prior to 17.2R1. Una vulnerabilidad en Juniper Networks Junos Space Security Director permite a un usuario que no tiene acceso SSH a un dispositivo reutilizar la URL que se había creado para otro usuario para sí tener acceso SSH. Las distribucio... • https://kb.juniper.net/JSA10840 • CWE-269: Improper Privilege Management •

CVSS: 5.4EPSS: 0%CPEs: 15EXPL: 0

10 Jan 2018 — A reflected cross site scripting (XSS) vulnerability in Junos Space may potentially allow a remote authenticated user to inject web script or HTML and steal sensitive data and credentials from a session, and to perform administrative actions on the Junos Space network management device. Una vulnerabilidad Cross-Site Scripting (XSS) reflejado en Junos Space podría permite que un usuario autenticado remoto inyecte script web o HTML, robe datos sensibles y credenciales de una sesión y realice acciones administ... • http://www.securitytracker.com/id/1040189 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 6.5EPSS: 0%CPEs: 1EXPL: 0

10 Jan 2018 — A local file inclusion vulnerability in Juniper Networks Junos Space Network Management Platform may allow an authenticated user to retrieve files from the system. Una vulnerabilidad de inclusión de archivos locales en Juniper Networks Junos Space Network Management Platform podría permitir que un usuario autenticado recupere archivos del sistema. • http://www.securitytracker.com/id/1040189 • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •

CVSS: 9.8EPSS: 1%CPEs: 1EXPL: 0

13 Oct 2017 — A remote unauthenticated network based attacker with access to Junos Space may execute arbitrary code on Junos Space or gain access to devices managed by Junos Space using cross site request forgery (CSRF), default authentication credentials, information leak and command injection attack vectors. All versions of Juniper Networks Junos Space prior to 15.1R3 are affected. Un atacante remoto no autenticado en una red con acceso a Junos Space podría ejecutar código arbitrario en Junos Space u obtener acceso a d... • https://kb.juniper.net/JSA10727 • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor CWE-255: Credentials Management Errors CWE-352: Cross-Site Request Forgery (CSRF) •

CVSS: 8.0EPSS: 0%CPEs: 1EXPL: 0

13 Oct 2017 — A persistent site scripting vulnerability in Juniper Networks Junos Space allows users who can change certain configuration to implant malicious Javascript or HTML which may be used to steal information or perform actions as other Junos Space users or administrators. Affected releases are Juniper Networks Junos Space all versions prior to 17.1R1. Una vulnerabilidad de Site Scripting persistente en Juniper Networks Junos Space permite a los usuarios que pueden cambiar determinadas configuraciones implantar c... • http://www.securityfocus.com/bid/101256 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 10.0EPSS: 33%CPEs: 4EXPL: 0

13 Oct 2017 — An authentication bypass vulnerability in Juniper Networks Junos Space Network Management Platform may allow a remote unauthenticated network based attacker to login as any privileged user. This issue only affects Junos Space Network Management Platform 17.1R1 without Patch v1 and 16.1 releases prior to 16.1R3. This issue was found by an external security researcher. Una vulnerabilidad de omisión de autenticación en Juniper Networks Junos Space Network Management Platform puede permitir a un atacante remoto... • http://www.securityfocus.com/bid/101258 • CWE-287: Improper Authentication •

CVSS: 8.1EPSS: 0%CPEs: 1EXPL: 0

13 Oct 2017 — Lack of authentication and authorization of cluster messages in Juniper Networks Junos Space may allow a man-in-the-middle type of attacker to intercept, inject or disrupt Junos Space cluster operations between two nodes. Affected releases are Juniper Networks Junos Space all versions prior to 17.1R1. Falta de autenticación y autorización de mensajes de clústeres en Juniper Networks Junos Space podría permitir que un tipo de atacante Man-in-the-Middle (MitM) intercepte, inyecte o interrumpa las operaciones ... • https://kb.juniper.net/JSA10826 • CWE-287: Improper Authentication •

CVSS: 7.5EPSS: 0%CPEs: 1EXPL: 0

13 Oct 2017 — Insufficient verification of node certificates in Juniper Networks Junos Space may allow a man-in-the-middle type of attacker to make unauthorized modifications to Space database or add nodes. Affected releases are Juniper Networks Junos Space all versions prior to 17.1R1. Verificación insuficiente de los certificados de los nodos en Juniper Networks Junos Space puede permitir que un tipo de atacante Man-in-the-Middle (MitM) realice modificaciones no autorizadas a la base de datos Space o añada nodos. Las d... • http://www.securityfocus.com/bid/101255 • CWE-345: Insufficient Verification of Data Authenticity •

CVSS: 8.8EPSS: 0%CPEs: 1EXPL: 0

30 May 2017 — On Juniper Networks Junos Space versions prior to 16.1R1, due to an insufficient authorization check, readonly users on the Junos Space administrative web interface can create privileged users, allowing privilege escalation. En versiones de Juniper Networks Junos Space anteriores a 16.1R1, debido a una insuficiente verificación de autorización, los usuarios de sólo lectura en la interfaz web de gestión de Junos Space, pueden crear usuarios privilegiados, lo que permite la escalada de privilegios. • http://www.securityfocus.com/bid/98759 • CWE-863: Incorrect Authorization •

CVSS: 8.8EPSS: 0%CPEs: 1EXPL: 0

30 May 2017 — On Juniper Networks Junos Space versions prior to 16.1R1, due to an insufficient authorization check, readonly users on the Junos Space administrative web interface can execute code on the device. En versiones de Juniper Networks Junos Space anteriores a 16.1R1, debido a una insuficiente verificación de autorización, los usuarios de sólo lectura de la interfaz web de gestión de Junos Space, pueden ejecutar código en el dispositivo. • http://www.securityfocus.com/bid/98772 • CWE-863: Incorrect Authorization •