Page 51 of 258 results (0.004 seconds)

CVSS: 4.3EPSS: 0%CPEs: 11EXPL: 0

Cross-site scripting (XSS) vulnerability in J-Web in Juniper Junos before 11.4R11, 11.4X27 before 11.4X27.62 (BBE), 12.1 before 12.1R9, 12.1X44 before 12.1X44-D35, 12.1X45 before 12.1X45-D25, 12.1X46 before 12.1X46-D20, 12.2 before 12.2R7, 12.3 before 12.3R6, 13.1 before 13.1R4, 13.2 before 13.2R3, and 13.3 before 13.3R1 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors. Vulnerabilidad de XSS en J-Web en Juniper Junos en versiones anteriores a 11.4R11, 11.4X27 en versiones anteriores a 11.4X27.62 (BBE), 12.1 en versiones anteriores a 12.1R9, 12.1X44 en versiones anteriores a 12.1X44-D35, 12.1X45 en versiones anteriores a 12.1X45-D25, 12.1X46 en versiones anteriores a 12.1X46-D20, 12.2 en versiones anteriores a 12.2R7, 12.3 en versiones anteriores a 12.3R6, 13.1 en versiones anteriores a 13.1R4, 13.2 en versiones anteriores a 13.2R3 y 13.3 en versiones anteriores a 13.3R1 permite a atacantes remotos inyectar secuencias de comandos web o HTML arbitrarios a través de vectores no especificados. • http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10619 http://www.securityfocus.com/bid/66770 http://www.securitytracker.com/id/1030061 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 7.1EPSS: 0%CPEs: 2EXPL: 0

Juniper Junos 13.2 before 13.2R3 and 13.3 before 13.3R1, when PIM is enabled, allows remote attackers to cause a denial of service (kernel panic and crash) via a large number of crafted IGMP packets. Juniper Junos 13.2 anterior a 13.2R3 y 13.3 anterior a 13.3R1, cuando PIM está habilitado, permite a atacantes remotos causar una denegación de servicio (kernel panic y caída) a través de un número grande de paquetes IGMP manipulados. • http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10618 http://secunia.com/advisories/57819 http://securitytracker.com/id?1030062 http://www.securityfocus.com/bid/66762 •

CVSS: 5.0EPSS: 0%CPEs: 7EXPL: 0

Juniper Junos before 11.4R11, 12.1 before 12.1R9, 12.2 before 12.2R7, 12.3R4 before 12.3R4-S3, 13.1 before 13.1R4, 13.2 before 13.2R2, and 13.3 before 13.3R1, as used in MX Series and T4000 routers, allows remote attackers to cause a denial of service (PFE restart) via a crafted IP packet to certain (1) Trio or (2) Cassis-based Packet Forwarding Engine (PFE) modules. Juniper Junos anterior a 11.4R11, 12.1 anterior a 12.1R9, 12.2 anterior a 12.2R7, 12.3R4 anterior a 12.3R4-S3, 13.1 anterior a 13.1R4, 13.2 anterior a 13.2R2 y 13.3 anterior a 13.3R1, utilizado en routers MX Series y T4000, permite a atacantes remotos causar una denegación de servicio (reinicio de PFE) a través de un paquete IP manipulado hacia ciertos módulos (1) Trio o (2) Cassis-based Packet Forwarding Engine (PFE). • http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10621 http://www.securityfocus.com/bid/66764 •

CVSS: 5.4EPSS: 0%CPEs: 67EXPL: 0

The OSPF implementation in Juniper Junos through 13.x, JunosE, and ScreenOS through 6.3.x does not consider the possibility of duplicate Link State ID values in Link State Advertisement (LSA) packets before performing operations on the LSA database, which allows remote attackers to cause a denial of service (routing disruption) or obtain sensitive packet information via a crafted LSA packet, a related issue to CVE-2013-0149. La implementación de OSPF en Juniper Junos hasta la versión 13.x, JunosE, y ScreenOS hasta la versión 6.3.x no considera la posibilidad de valores Link State ID duplicados en Link State Adverisement (LSA) antes de realizar operaciones en la base de datos LSA, lo que permite a atacantes remotos provocar una denegación de servicio (interrupción de enrutamiento) u obtener información sensible de paquetes a través de un paquete LSA manipulado, una vulnerabilidad relacionada con CVE-2013-0149. • http://www.kb.cert.org/vuls/id/229804 http://www.kb.cert.org/vuls/id/BLUU-97KQ26 •

CVSS: 7.1EPSS: 0%CPEs: 11EXPL: 0

Juniper Junos 10.4 before 10.4R16, 11.4 before 11.4R10, 12.1R before 12.1R8-S2, 12.1X44 before 12.1X44-D30, 12.1X45 before 12.1X45-D20, 12.1X46 before 12.1X46-D10, 12.2 before 12.2R7, 12.3 before 12.3R4-S2, 13.1 before 13.1R3-S1, 13.2 before 13.2R2, and 13.3 before 13.3R1 allows remote attackers to cause a denial of service (rdp crash) via a large BGP UPDATE message which immediately triggers a withdraw message to be sent, as demonstrated by a long AS_PATH and a large number of BGP Communities. Juniper Junos 10.4 anteriores a 10.4R16, 11.4 anteriores a 11.4R10, 12.1R anteriores a 12.1R8-S2, 12.1X44 anteriores a 12.1X44-D30, 12.1X45 anteriores a 12.1X45-D20, 12.1X46 anteriores a 12.1X46-D10, 12.2 anteriores a 12.2R7, 12.3 anteriores a 12.3R4-S2, 13.1 anteriores a 13.1R3-S1, 13.2 anteriores a 13.2R2 y 13.3 anteriores a 13.3R1, permite a atacantes remotos causar denegación de servicio (caída de rdp) a través de un mensaje BGP_UPDATE largo que lanza inmediatamente un envío de retirada de mensaje, como se muestra con un AS_PATH largo y un gran número de "BGP Communities". • http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10609 http://osvdb.org/101868 http://www.securityfocus.com/bid/64766 http://www.securitytracker.com/id/1029582 • CWE-362: Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition') •