Page 49 of 259 results (0.029 seconds)

CVSS: 7.2EPSS: 0%CPEs: 46EXPL: 0

Juniper Junos 12.1X44 before 12.1X44-D45, 12.1X46 before 12.1X46-D30, 12.1X47 before 12.1X47-D20, 12.3 before 12.3R9, 12.3X48 before 12.3X48-D10, 13.2 before 13.2R6, 13.3 before 13.3R5, 14.1 before 14.1R3, and 14.2 before 14.2R1 allows local users to gain privileges via crafted combinations of CLI commands and arguments. Juniper Junos 12.1X44 anterior a 12.1X44-D45, 12.1X46 anterior a 12.1X46-D30, 12.1X47 anterior a 12.1X47-D20, 12.3 anterior a 12.3R9, 12.3X48 anterior a 12.3X48-D10, 13.2 anterior a 13.2R6, 13.3 anterior a 13.3R5, 14.1 anterior a 14.1R3, y 14.2 anterior a 14.2R1 permite a usuarios locales ganar privilegios a través de combinaciones manipuladas de comandos y argumentos CLI. • http://www.securityfocus.com/bid/74023 http://www.securitytracker.com/id/1032092 https://kb.juniper.net/InfoCenter/index?page=content&id=JSA10674 • CWE-264: Permissions, Privileges, and Access Controls •

CVSS: 5.0EPSS: 6%CPEs: 460EXPL: 3

Embedthis Appweb before 4.6.6 and 5.x before 5.2.1 allows remote attackers to cause a denial of service (NULL pointer dereference) via a Range header with an empty value, as demonstrated by "Range: x=,". Embedthis Appweb anterior a 4.6.6 y 5.x anterior a 5.2.1 permite a atacantes remotos causar una denegación de servicio (referencia a puntero nulo) a través de una cabecera de rango con un valor vacío, tal y como fue demostrado por 'Rango: x=,'. Appweb Web Server suffers from a denial of service vulnerability. • http://packetstormsecurity.com/files/131157/Appweb-Web-Server-Denial-Of-Service.html http://seclists.org/fulldisclosure/2015/Apr/19 http://seclists.org/fulldisclosure/2015/Mar/158 http://www.openwall.com/lists/oss-security/2015/03/28/2 http://www.openwall.com/lists/oss-security/2015/04/06/2 http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html http://www.securityfocus.com/archive/1/535028/100/0/threaded http://www.securityfocus.com/archive/1/archive/1/5 • CWE-476: NULL Pointer Dereference •

CVSS: 6.9EPSS: 0%CPEs: 43EXPL: 0

Juniper Junos 12.1X44 before 12.1X44-D45, 12.1X46 before 12.1X46-D25, 12.1X47 before 12.1X47-D15, 12.3 before 12.3R9, 13.1 before 13.1R4-S3, 13.2 before 13.2R6, 13.3 before 13.3R5, 14.1 before 14.1R3, and 14.2 before 14.2R1 does not properly handle double quotes in authorization attributes in the TACACS+ configuration, which allows local users to bypass the security policy and execute commands via unspecified vectors. Juniper Junos 12.1X44 anterior a 12.1X44-D45, 12.1X46 anterior a 12.1X46-D25, 12.1X47 anterior a 12.1X47-D15, 12.3 anterior a 12.3R9, 13.1 anterior a 13.1R4-S3, 13.2 anterior a 13.2R6, 13.3 anterior a 13.3R5, 14.1anterior a 14.1R3, y 14.2 anterior a 14.2R1 no maneja correctamente las comillas dobles en los atributos de autorización en la configuración TACACS+, lo que permite a usuarios locales evadir la política de seguridad y ejecutar comandos a través de vectores no especificados. • http://www.securityfocus.com/bid/72077 http://www.securitytracker.com/id/1031547 https://kb.juniper.net/InfoCenter/index?page=content&id=JSA10667 • CWE-264: Permissions, Privileges, and Access Controls •

CVSS: 7.8EPSS: 0%CPEs: 38EXPL: 0

Juniper Junos 11.4 before 11.4R8, 12.1X44 before 12.1X44-D35, 12.1X45 before 12.1X45-D25, 12.1X46 before 12.1X46-D20, 12.1X47 before 12.1X47-D10, 12.2 before 12.2R9, 12.3R2 before 12.3R2-S3, 12.3 before 12.3R3, 13.1 before 13.1R4, and 13.2 before 13.2R1 allows remote attackers to cause a denial of service (assertion failure and rpd restart) via a crafted BGP FlowSpec prefix. Juniper Junos 11.4 anterior a 11.4R8, 12.1X44 anterior a 12.1X44-D35, 12.1X45 anterior a 12.1X45-D25, 12.1X46 anterior a 12.1X46-D20, 12.1X47 anterior a 12.1X47-D10, 12.2 anterior a 12.2R9, 12.3R2 anterior a 12.3R2-S3, 12.3 anterior a 12.3R3, 13.1 anterior a 13.1R4, y 13.2 anterior a 13.2R1 permite a atacantes remotos causar una denegación de servicio (fallo de aserción y reinicio de rpd) a través de un prefijo BGP FlowSpec manipulado. • http://www.securityfocus.com/bid/72067 http://www.securitytracker.com/id/1031548 https://kb.juniper.net/InfoCenter/index?page=content&id=JSA10670 • CWE-17: DEPRECATED: Code •

CVSS: 6.1EPSS: 0%CPEs: 65EXPL: 0

Juniper Junos 11.4 before 11.4R13, 12.1X44 before 12.1X44-D45, 12.1X46 before 12.1X46-D30, 12.1X47 before 12.1X47-D15, 12.2 before 12.2R9, 12.3R7 before 12.3R7-S1, 12.3 before 12.3R8, 13.1 before 13.1R5, 13.2 before 13.2R6, 13.3 before 13.3R4, 14.1 before 14.1R2, and 14.2 before 14.2R1 allows remote attackers to cause a denial of service (kernel crash and restart) via a crafted fragmented OSPFv3 packet with an IPsec Authentication Header (AH). Juniper Junos 11.4 anterior a 11.4R13, 12.1X44 anterior a 12.1X44-D45, 12.1X46 anterior a 12.1X46-D30, 12.1X47 anterior a 12.1X47-D15, 12.2 anterior a 12.2R9, 12.3R7 anterior a 12.3R7-S1, 12.3 anterior a 12.3R8, 13.1 anterior a 13.1R5, 13.2 anterior a 13.2R6, 13.3 anterior a 13.3R4, 14.1 anterior a 14.1R2, y 14.2 anterior a 14.2R1 permite a atacantes remotos causar una denegación de servicio (caída del kernel y reinicio) a través de un paquete OSPFv3 fragmentado manipulado con una cabecera de autenticación IPsec. • http://www.securityfocus.com/bid/72072 https://kb.juniper.net/InfoCenter/index?page=content&id=JSA10668 •