9 results (0.015 seconds)

CVSS: 6.8EPSS: 0%CPEs: 44EXPL: 0

15 Jan 2021 — The Junos Space Network Management Platform has been found to store shared secrets in a recoverable format that can be exposed through the UI. An attacker who is able to execute arbitrary code in the victim browser (for example via XSS) or access cached contents may be able to obtain a copy of credentials managed by Junos Space. The impact of a successful attack includes, but is not limited to, obtaining access to other servers connected to the Junos Space Management Platform. This issue affects Juniper Net... • https://kb.juniper.net/JSA11110 • CWE-257: Storing Passwords in a Recoverable Format CWE-522: Insufficiently Protected Credentials •

CVSS: 6.5EPSS: 3%CPEs: 9EXPL: 1

15 Jan 2020 — A Local File Inclusion vulnerability in Juniper Networks Junos Space allows an attacker to view all files on the target when the device receives malicious HTTP packets. This issue affects: Juniper Networks Junos Space versions prior to 19.4R1. Una vulnerabilidad de Inclusión de Archivo Local en Juniper Networks Junos Space, permite a un atacante visualizar todos los archivos en el destino cuando el dispositivo recibe paquetes HTTP maliciosos. Este problema afecta a: Juniper Networks Junos Space versiones an... • https://github.com/Ibonok/CVE-2020-1611 •

CVSS: 6.5EPSS: 0%CPEs: 23EXPL: 0

15 Jan 2019 — A malicious authenticated user may be able to delete a device from the Junos Space database without the necessary privileges through crafted Ajax interactions obtained from another legitimate delete action performed by another administrative user. Affected releases are Juniper Networks Junos Space versions prior to 18.3R1. Un usuario autenticado malicioso podría ser capaz de eliminar un dispositivo de la base de datos de Junos Space sin los privilegios necesarios mediante interacciones Ajax manipuladas obte... • https://kb.juniper.net/JSA10917 •

CVSS: 8.8EPSS: 0%CPEs: 23EXPL: 0

15 Jan 2019 — The Junos Space application, which allows Device Image files to be uploaded, has insufficient validity checking which may allow uploading of malicious images or scripts, or other content types. Affected releases are Juniper Networks Junos Space versions prior to 18.3R1. La aplicación de Junos Space, que permite que los archivos Device Image se suban, tiene una comprobación de validez insuficiente, lo que podría permitir la subida de imágenes o scripts, así como otros tipos de contenido. Las distribuciones a... • https://kb.juniper.net/JSA10917 • CWE-434: Unrestricted Upload of File with Dangerous Type •

CVSS: 8.0EPSS: 0%CPEs: 16EXPL: 0

10 Oct 2018 — A persistent cross-site scripting vulnerability in the UI framework used by Junos Space Security Director may allow authenticated users to inject persistent and malicious scripts. This may allow stealing of information or performing actions as a different user when other users access the Security Director web interface. This issue affects all versions of Juniper Networks Junos Space Security Director prior to 17.2R2. Una vulnerabilidad Cross-Site Scripting (XSS) persistente en el la interfaz del framework e... • http://www.securitytracker.com/id/1041863 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 7.8EPSS: 0%CPEs: 1EXPL: 0

10 Jan 2018 — Junos Space is affected by a privilege escalation vulnerability that may allow a local authenticated attacker to gain root privileges. Junos Space se ve afectado por una vulnerabilidad de escalado de privilegios que podría permitir que un atacante local autenticado obtenga privilegios root. • http://www.securitytracker.com/id/1040189 •

CVSS: 6.5EPSS: 0%CPEs: 16EXPL: 0

10 Jan 2018 — A vulnerability in the Juniper Networks Junos Space Security Director allows a user who does not have SSH access to a device to reuse the URL that was created for another user to perform SSH access. Affected releases are all versions of Junos Space Security Director prior to 17.2R1. Una vulnerabilidad en Juniper Networks Junos Space Security Director permite a un usuario que no tiene acceso SSH a un dispositivo reutilizar la URL que se había creado para otro usuario para sí tener acceso SSH. Las distribucio... • https://kb.juniper.net/JSA10840 • CWE-269: Improper Privilege Management •

CVSS: 5.4EPSS: 0%CPEs: 15EXPL: 0

10 Jan 2018 — A reflected cross site scripting (XSS) vulnerability in Junos Space may potentially allow a remote authenticated user to inject web script or HTML and steal sensitive data and credentials from a session, and to perform administrative actions on the Junos Space network management device. Una vulnerabilidad Cross-Site Scripting (XSS) reflejado en Junos Space podría permite que un usuario autenticado remoto inyecte script web o HTML, robe datos sensibles y credenciales de una sesión y realice acciones administ... • http://www.securitytracker.com/id/1040189 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 10.0EPSS: 33%CPEs: 4EXPL: 0

13 Oct 2017 — An authentication bypass vulnerability in Juniper Networks Junos Space Network Management Platform may allow a remote unauthenticated network based attacker to login as any privileged user. This issue only affects Junos Space Network Management Platform 17.1R1 without Patch v1 and 16.1 releases prior to 16.1R3. This issue was found by an external security researcher. Una vulnerabilidad de omisión de autenticación en Juniper Networks Junos Space Network Management Platform puede permitir a un atacante remoto... • http://www.securityfocus.com/bid/101258 • CWE-287: Improper Authentication •