Page 37 of 186 results (0.023 seconds)

CVSS: 4.3EPSS: 0%CPEs: 5EXPL: 0

Cross-site scripting (XSS) vulnerability in SRX Web Authentication (webauth) in Juniper Junos 11.4 before 11.4R11, 12.1X44 before 12.1X44-D34, 12.1X45 before 12.1X45-D25, 12.1X46 before 12.1X46-D20, and 12.1X47 before 12.1X47-D10 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors. Vulnerabilidad de XSS en SRX Web Authentication (webauth) en Juniper Junos 11.4 anterior a 11.4R11, 12.1X44 anterior a 12.1X44-D34, 12.1X45 anterior a 12.1X45-D25, 12.1X46 anterior a 12.1X46-D20 y 12.1X47 anterior a 12.1X47-D10 permite a atacantes remotos inyectar secuencias de comandos web o HTML arbitrarios a través de vectores no especificados. Juniper JunOS version 9.x suffers from a html injection vulnerability that allows for cross site scripting attacks. • http://www.securityfocus.com/bid/68548 http://www.securitytracker.com/id/1030563 https://kb.juniper.net/InfoCenter/index?page=content&id=JSA10640 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 5.0EPSS: 0%CPEs: 8EXPL: 0

Juniper Junos 10.4 before 10.4S13, 11.4 before 11.4R7-S1, 12.1 before 12.1R5-S3, 12.1X44 before 12.1X44-D20, and 12.1X45 before 12.1X45-D10 on the SRX1400, SRX3400, and SRX3600 does not properly initialize memory locations used during padding of Ethernet packets, which allows remote attackers to obtain sensitive information by reading packet data, aka PR 829536, a related issue to CVE-2003-0001. Juniper Junos v10.4 antes de v10.4S13, v11.4 antes de v11.4R7-S1, v12.1 antes de v12.1R5-S3, v12.1X44 antes de v12.1X44-D20, y v12.1X45 antes de v12.1X45-D10 en SRX1400, SRX3400, y SRX3600 no inicializa correctamente partes de memoria usadas con paquetes Ethernet manipulados, lo que permite a atacantes remotos obtener información sensible leyendo paquetes de datos, también conocido como PR 829536, un incidente relacionado con CVE-2003-0001. • http://kb.juniper.net/JSA10579 http://osvdb.org/95112 http://www.securityfocus.com/bid/61123 https://exchange.xforce.ibmcloud.com/vulnerabilities/85627 • CWE-399: Resource Management Errors •

CVSS: 7.8EPSS: 0%CPEs: 16EXPL: 0

flowd in Juniper Junos 10.4 before 10.4S14, 11.2 and 11.4 before 11.4R6-S2, and 12.1 before 12.1R6 on SRX devices, when certain Application Layer Gateways (ALGs) are enabled, allows remote attackers to cause a denial of service (daemon crash) via crafted TCP packets, aka PRs 727980, 806269, and 835593. flowd en Juniper Junos v10.4 antes de v10.4S14, v11.2 y v11.4 antes de v11.4R6-S2, y v12.1 antes de v12.1R6 para dispositivos SRX, cuando Application Layer Gateways (ALGs) están habilitados , permite a atacantes remotos causar una denegación de servicios (caída del demonio) a través de paquetes TCP, también conocido como PRs 727980, 806269, y 835593. • http://kb.juniper.net/JSA10577 http://www.securityfocus.com/bid/61122 •

CVSS: 10.0EPSS: 2%CPEs: 16EXPL: 0

Buffer overflow in flowd in Juniper Junos 10.4 before 10.4S14, 11.4 before 11.4R7, 12.1 before 12.1R6, and 12.1X44 before 12.1X44-D15 on SRX devices, when Captive Portal is enabled with the UAC enforcer role, allows remote attackers to execute arbitrary code via crafted HTTP requests, aka PR 849100. Desbordamiento de búfer en flowd en Juniper Junos v10.4 antes de v10.4S14, v11.4 antes de v11.4R7, v12.1 antes de v12.1R6, y v12.1X44 antes de v12.1X44-D15 para dispositivos SRX, cuando Captive Portal está habilitado con el rol forzado, permite a atacantes remotos ejecutar código arbitrario a través de peticiones HTTP manipuladas, también conocido como PR 849100. • http://kb.juniper.net/JSA10574 http://osvdb.org/95108 http://www.securityfocus.com/bid/61125 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 7.1EPSS: 0%CPEs: 7EXPL: 0

The kernel in Juniper Junos 10.4 before 10.4R14, 11.4 before 11.4R8, 11.4X27 before 11.4X27.43, 12.1 before 12.1R6, 12.1X44 before 12.1X44-D20, 12.2 before 12.2R4, and 12.3 before 12.3R2, in certain VLAN configurations with unrestricted arp-resp and proxy-arp settings, allows remote attackers to cause a denial of service (device crash) via a crafted ARP request, aka PR 842091. El kernel en Juniper Junos v10.4 antes de v10.4R14, v11.4 antes de v11.4R8, v11.4X27 antes de v11.4X27.43, v12.1 antes de v12.1R6, v12.1X44 antes de v12.1X44-D20, v12.2 antes de v12.2R4, y v12.3 antes de v12.3R2, en ciertas configuraciones VLAN con configuraciones arp-resp y proxy-arp sin restringir, permite a atacantes remotos causar una denegación de servicio (caída del dispositivo) a través de peticiones ARP, también conocido como PR 842091 • http://kb.juniper.net/JSA10576 http://secunia.com/advisories/54119 http://www.securityfocus.com/bid/61126 •