Page 89 of 490 results (0.004 seconds)

CVSS: 6.9EPSS: 0%CPEs: 34EXPL: 0

Juniper Junos 12.1X44 before 12.1X44-D45, 12.1X46 before 12.1X46-D30, 12.1X47 before 12.1X47-D15, and 12.3X48 before 12.3X48-D10 on SRX series devices does not properly enforce the log-out-on-disconnect feature when configured in the [system port console] stanza, which allows physically proximate attackers to reconnect to the console port and gain administrative access by leveraging access to the device. Juniper Junos 12.1X44 anterior a 12.1X44-D45, 12.1X46 anterior a 12.1X46-D30, 12.1X47 anterior a 12.1X47-D15, y 12.3X48 anterior a 12.3X48-D10 en los dispositivos de la serie SRX no fuerza correctamente la característica cerrar al desconectar cuando configurada en la estrofa [system port console], lo que permite a atacantes físicamente próximos reconectar con el puerto de la consola y ganar el acceso administrativo mediante el aprovechamiento del acceso al dispositivo. • http://www.securityfocus.com/bid/74019 http://www.securitytracker.com/id/1032091 https://kb.juniper.net/InfoCenter/index?page=content&id=JSA10672 • CWE-17: DEPRECATED: Code •

CVSS: 4.3EPSS: 0%CPEs: 48EXPL: 0

J-Web in Juniper Junos 11.4 before 11.4R12, 12.1X44 before 12.1X44-D35, 12.1X46 before 12.1X46-D25, 12.1X47 before 12.1X47-D10, 12.3X48 before 12.3X48-D10, 12.2 before 12.2R9, 12.3 before 12.3R7, 13.2 before 13.2R6, 13.2X51 before 13.2X51-D20, 13.3 before 13.3R5, 14.1 before 14.1R3, 14.1X53 before 14.1X53-D10, and 14.2 before 14.2R1 allows remote attackers to conduct clickjacking attacks via an X-Frame-Options header. J-Web en Juniper Junos 11.4 anterior a 11.4R12, 12.1X44 anterior a 12.1X44-D35, 12.1X46 anterior a 12.1X46-D25, 12.1X47 anterior a 12.1X47-D10, 12.3X48 anterior a 12.3X48-D10, 12.2 anterior a 12.2R9, 12.3 anterior a 12.3R7, 13.2 anterior a 13.2R6, 13.2X51 anterior a 13.2X51-D20, 13.3 anterior a 13.3R5, 14.1 anterior a 14.1R3, 14.1X53 anterior a 14.1X53-D10, y 14.2 anterior a 14.2R1 permite a atacantes remotos realizar ataques de clickjacking a través de una cabecera X-Frame-Options. • http://www.securityfocus.com/bid/74017 http://www.securitytracker.com/id/1032090 https://kb.juniper.net/InfoCenter/index?page=content&id=JSA10675 • CWE-20: Improper Input Validation •

CVSS: 5.0EPSS: 4%CPEs: 460EXPL: 3

Embedthis Appweb before 4.6.6 and 5.x before 5.2.1 allows remote attackers to cause a denial of service (NULL pointer dereference) via a Range header with an empty value, as demonstrated by "Range: x=,". Embedthis Appweb anterior a 4.6.6 y 5.x anterior a 5.2.1 permite a atacantes remotos causar una denegación de servicio (referencia a puntero nulo) a través de una cabecera de rango con un valor vacío, tal y como fue demostrado por 'Rango: x=,'. Appweb Web Server suffers from a denial of service vulnerability. • http://packetstormsecurity.com/files/131157/Appweb-Web-Server-Denial-Of-Service.html http://seclists.org/fulldisclosure/2015/Apr/19 http://seclists.org/fulldisclosure/2015/Mar/158 http://www.openwall.com/lists/oss-security/2015/03/28/2 http://www.openwall.com/lists/oss-security/2015/04/06/2 http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html http://www.securityfocus.com/archive/1/535028/100/0/threaded http://www.securityfocus.com/archive/1/archive/1/5 • CWE-476: NULL Pointer Dereference •

CVSS: 7.8EPSS: 0%CPEs: 38EXPL: 0

Juniper Junos 11.4 before 11.4R8, 12.1X44 before 12.1X44-D35, 12.1X45 before 12.1X45-D25, 12.1X46 before 12.1X46-D20, 12.1X47 before 12.1X47-D10, 12.2 before 12.2R9, 12.3R2 before 12.3R2-S3, 12.3 before 12.3R3, 13.1 before 13.1R4, and 13.2 before 13.2R1 allows remote attackers to cause a denial of service (assertion failure and rpd restart) via a crafted BGP FlowSpec prefix. Juniper Junos 11.4 anterior a 11.4R8, 12.1X44 anterior a 12.1X44-D35, 12.1X45 anterior a 12.1X45-D25, 12.1X46 anterior a 12.1X46-D20, 12.1X47 anterior a 12.1X47-D10, 12.2 anterior a 12.2R9, 12.3R2 anterior a 12.3R2-S3, 12.3 anterior a 12.3R3, 13.1 anterior a 13.1R4, y 13.2 anterior a 13.2R1 permite a atacantes remotos causar una denegación de servicio (fallo de aserción y reinicio de rpd) a través de un prefijo BGP FlowSpec manipulado. • http://www.securityfocus.com/bid/72067 http://www.securitytracker.com/id/1031548 https://kb.juniper.net/InfoCenter/index?page=content&id=JSA10670 • CWE-17: DEPRECATED: Code •

CVSS: 7.1EPSS: 0%CPEs: 19EXPL: 0

The Juniper MX Series routers with Junos 13.3R3 through 13.3Rx before 13.3R6, 14.1 before 14.1R4, 14.1X50 before 14.1X50-D70, and 14.2 before 14.2R2, when configured as a broadband edge (BBE) router, allows remote attackers to cause a denial of service (jpppd crash and restart) by sending a crafted PAP Authenticate-Request after the PPPoE Discovery and LCP phase are complete. Los routers de la serie Juniper MX Series con Junos 13.3R3 hasta 13.3Rx anterior a 13.3R6, 14.1 anterior a 14.1R4, 14.1X50 anterior a 14.1X50-D70, y 14.2 anterior a 14.2R2, cuando son configurados como un router BBE, permiten a atacantes remotos causar una denegación de servicio (caída de jpppd y reinicio) mediante el envío de una solicitud de autenticación PAP manipulada después de que las fases PPPoE Discovery y LCP estén completadas. • http://www.securityfocus.com/bid/72070 https://kb.juniper.net/InfoCenter/index?page=content&id=JSA10665 • CWE-20: Improper Input Validation •