Page 23 of 186 results (0.011 seconds)

CVSS: 8.0EPSS: 0%CPEs: 86EXPL: 0

Insufficient cross site scripting protection in J-Web component in Juniper Networks Junos OS may potentially allow a remote unauthenticated user to inject web script or HTML and steal sensitive data and credentials from a J-Web session and to perform administrative actions on the Junos device. Juniper SIRT is not aware of any malicious exploitation of this vulnerability. Affected releases are Juniper Networks Junos OS 11.4 prior to 11.4R13-S3; 12.1X44 prior to 12.1X44-D60; 12.1X46 prior to 12.1X46-D40; 12.1X47 prior to 12.1X47-D30; 12.3 prior to 12.3R11; 12.3X48 prior to 12.3X48-D20; 13.2X51 prior to 13.2X51-D39, 13.2X51-D40; 13.3 prior to 13.3R9; 14.1 prior to 14.1R6; 14.2 prior to 14.2R6; 15.1 prior to 15.1R3; 15.1X49 prior to 15.1X49-D20; 15.1X53 prior to 15.1X53-D57. Protección insuficiente contra Cross-Site Scripting (XSS) en el componente J-Web en Juniper Networks Junos OS podría permitir que un usuario remoto no autenticado inyecte scripts web o HTML, robe datos sensibles y credenciales de una sesión J-Web y realice acciones administrativos en el dispositivos Junos. Juniper SIRT no conoce ninguna explotación maliciosa de esta vulnerabilidad. • http://www.securityfocus.com/bid/93529 https://kb.juniper.net/JSA10764 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 8.8EPSS: 0%CPEs: 74EXPL: 0

J-Web does not validate certain input that may lead to cross-site request forgery (CSRF) issues or cause a denial of J-Web service (DoS). J-Web no valida ciertas entradas que pueden pueden provocar problemas de Cross-Site Request Forgery (CSRF) o una denegación del servicio J-Web (DoS). • https://kb.juniper.net/JSA10723 • CWE-352: Cross-Site Request Forgery (CSRF) •

CVSS: 7.8EPSS: 0%CPEs: 71EXPL: 0

By flooding a Juniper Networks router running Junos OS with specially crafted IPv6 traffic, all available resources can be consumed, leading to the inability to store next hop information for legitimate traffic. In extreme cases, the crafted IPv6 traffic may result in a total resource exhaustion and kernel panic. The issue is triggered by traffic destined to the router. Transit traffic does not trigger the vulnerability. This issue only affects devices with IPv6 enabled and configured. • http://www.securityfocus.com/bid/93532 http://www.securitytracker.com/id/1037014 https://kb.juniper.net/JSA10762 • CWE-399: Resource Management Errors •

CVSS: 7.5EPSS: 0%CPEs: 80EXPL: 0

Any Juniper Networks SRX series device with one or more ALGs enabled may experience a flowd crash when traffic is processed by the Sun/MS-RPC ALGs. This vulnerability in the Sun/MS-RPC ALG services component of Junos OS allows an attacker to cause a repeated denial of service against the target. Repeated traffic in a cluster may cause repeated flip-flop failure operations or full failure to the flowd daemon halting traffic on all nodes. Only IPv6 traffic is affected by this issue. IPv4 traffic is unaffected. • https://kb.juniper.net/JSA10811 • CWE-400: Uncontrolled Resource Consumption •

CVSS: 9.9EPSS: 0%CPEs: 35EXPL: 0

A command injection vulnerability in the IDP feature of Juniper Networks Junos OS on SRX series devices potentially allows a user with login access to the device to execute shell commands and elevate privileges. Affected releases are Juniper Networks Junos OS 12.1X44 prior to 12.1X44-D60; 12.1X46 prior to 12.1X46-D50; 12.1X47 prior to 12.1X47-D30, 12.1X47-D35; 12.3X48 prior to 12.3X48-D20, 12.3X48-D30; 15.1X49 prior to 15.1X49-D20, 15.1X49-D30. Una vulnerabilidad de inyección de comandos en la función IDP de Juniper Networks Junos OS en dispositivos de la serie SRX potencialmente permite a un usuario con acceso de inicio de sesión al dispositivo ejecutar comandos shell y elevar privilegios. Las versiones afectadas son Juniper Networks Junos OS versión 12.1X44 anterior a 12.1X44-D60; versión 12.1X46 anterior a 12.1X46-D50; versión 12.1X47 anterior a 12.1X47-D30, 12.1X47-D35; versión 12.3X48 anterior a 12.3X48-D20, 12.3X48-D30; versión 15.1X49 anterior a 15.1X49-D20, 15.1X49-D30. • http://www.securitytracker.com/id/1038898 https://kb.juniper.net/JSA10801 • CWE-77: Improper Neutralization of Special Elements used in a Command ('Command Injection') •