Page 2 of 16 results (0.004 seconds)

CVSS: 8.4EPSS: 0%CPEs: 24EXPL: 0

A persistent cross site scripting vulnerability in NetScreen WebUI of Juniper Networks Juniper NetScreen Firewall+VPN running ScreenOS allows a user with the 'security' role to inject HTML/JavaScript content into the management session of other users including the administrator. This enables the lower-privileged user to effectively execute commands with the permissions of an administrator. This issue affects Juniper Networks ScreenOS 6.3.0 releases prior to 6.3.0r24 on SSG Series. No other Juniper Networks products or platforms are affected by this issue. Una vulnerabilidad de tipo cross-site-scripting (XSS) persistente en la WebUI de NetScreen de Juniper Networks Juniper NetScreen Firewall+VPN ejecutándose en ScreenOS, permite a un usuario con el rol “security” inyectar contenido HTML/JavaScript en la sesión de administración de otros usuarios, incluyendo el administrador. • http://www.securityfocus.com/bid/99590 http://www.securitytracker.com/id/1038881 https://kb.juniper.net/JSA10782 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 7.8EPSS: 0%CPEs: 1EXPL: 0

The administrative web services interface in Juniper ScreenOS before 6.3.0r21 allows remote attackers to cause a denial of service (reboot) via a crafted SSL packet. La interfaz de servicios web administrativos en Juniper ScreenOS en versiones anteriores a 6.3.0r21 permite a atacantes remotos provocar una denegación de servicio (reinicio) a través de un paquete SSL manipulado. • http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10732 http://www.securitytracker.com/id/1035666 • CWE-20: Improper Input Validation •

CVSS: 9.3EPSS: 5%CPEs: 1EXPL: 0

Juniper ScreenOS before 6.3.0r21, when ssh-pka is configured and enabled, allows remote attackers to cause a denial of service (system crash) or execute arbitrary code via crafted SSH negotiation. Juniper ScreenOS en versiones anteriores a 6.3.0r21, cuando ssh-pka está configurado y habilitado, permite a atacantes remotos causar una denegación de servicio (caída de sistema) o ejecutar código arbitrario a través de una negociación SSH manipulada. • http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10712 http://www.securityfocus.com/bid/79627 http://www.securitytracker.com/id/1034490 • CWE-20: Improper Input Validation •

CVSS: 10.0EPSS: 96%CPEs: 4EXPL: 2

Juniper ScreenOS 6.2.0r15 through 6.2.0r18, 6.3.0r12 before 6.3.0r12b, 6.3.0r13 before 6.3.0r13b, 6.3.0r14 before 6.3.0r14b, 6.3.0r15 before 6.3.0r15b, 6.3.0r16 before 6.3.0r16b, 6.3.0r17 before 6.3.0r17b, 6.3.0r18 before 6.3.0r18b, 6.3.0r19 before 6.3.0r19b, and 6.3.0r20 before 6.3.0r21 allows remote attackers to obtain administrative access by entering an unspecified password during a (1) SSH or (2) TELNET session. Juniper ScreenOS 6.2.0r15 hasta la versión 6.2.0r18, 6.3.0r12 en versiones anteriores a 6.3.0r12b, 6.3.0r13 en versiones anteriores a 6.3.0r13b, 6.3.0r14 en versiones anteriores a 6.3.0r14b, 6.3.0r15 en versiones anteriores a 6.3.0r15b, 6.3.0r16 en versiones anteriores a 6.3.0r16b, 6.3.0r17 en versiones anteriores a 6.3.0r17b, 6.3.0r18 en versiones anteriores a 6.3.0r18b, 6.3.0r19 en versiones anteriores a 6.3.0r19b y 6.3.0r20 en versiones anteriores a 6.3.0r21 permite a atacantes remotos obtener acceso administrativo entrando una contraseña no especificada durante una sesión (1) SSH o (2) TELNET. • https://github.com/cinno/CVE-2015-7755-POC http://arstechnica.com/security/2015/12/unauthorized-code-in-juniper-firewalls-decrypts-encrypted-vpn-traffic http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10713 http://twitter.com/cryptoron/statuses/677900647560253442 http://www.forbes.com/sites/thomasbrewster/2015/12/18/juniper-says-it-didnt-work-with-government-to-add-unauthorized-code-to-network-gear http://www.kb.cert.org/vuls/id/640184 http://www.securityfocus.com/bid/79626 http:/ • CWE-287: Improper Authentication •

CVSS: 5.0EPSS: 2%CPEs: 12EXPL: 0

The encryption implementation in Juniper ScreenOS 6.2.0r15 through 6.2.0r18, 6.3.0r12 before 6.3.0r12b, 6.3.0r13 before 6.3.0r13b, 6.3.0r14 before 6.3.0r14b, 6.3.0r15 before 6.3.0r15b, 6.3.0r16 before 6.3.0r16b, 6.3.0r17 before 6.3.0r17b, 6.3.0r18 before 6.3.0r18b, 6.3.0r19 before 6.3.0r19b, and 6.3.0r20 before 6.3.0r21 makes it easier for remote attackers to discover the plaintext content of VPN sessions by sniffing the network for ciphertext data and conducting an unspecified decryption attack. La implementación de cifrado en Juniper ScreenOS 6.2.0r15 hasta la versión 6.2.0r18, 6.3.0r12 en versiones anteriores a 6.3.0r12b, 6.3.0r13 en versiones anteriores a 6.3.0r13b, 6.3.0r14 en versiones anteriores a 6.3.0r14b, 6.3.0r15 en versiones anteriores a 6.3.0r15b, 6.3.0r16 en versiones anteriores a 6.3.0r16b, 6.3.0r17 en versiones anteriores a 6.3.0r17b, 6.3.0r18 en versiones anteriores a 6.3.0r18b, 6.3.0r19 en versiones anteriores a 6.3.0r19b y 6.3.0r20 en versiones anteriores a 6.3.0r21 facilita a atacantes remotos descubrir en texto plano el contenido de las sesiones VPN mediante el rastreo de la red en busca de datos de texto cifrados y llevar a cabo un ataque de descifrado no especificado. • http://arstechnica.com/security/2015/12/unauthorized-code-in-juniper-firewalls-decrypts-encrypted-vpn-traffic http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10713 http://www.forbes.com/sites/thomasbrewster/2015/12/18/juniper-says-it-didnt-work-with-government-to-add-unauthorized-code-to-network-gear http://www.kb.cert.org/vuls/id/640184 http://www.securitytracker.com/id/1034489 http://www.wired.com/2015/12/juniper-networks-hidden-backdoors-show-the-risk-of-government-backdoors https:/ • CWE-310: Cryptographic Issues •