Juniper JUNOS SPACE 17.1 R1

CPE Details

Juniper JUNOS SPACE 17.1 R1
17.1
2017-11-01
16h20 +00:00
2021-04-15
13h05 +00:00
Alerte pour un CPE
Restez informé de toutes modifications pour un CPE spécifique.
Gestion des notifications

CPE Name: cpe:2.3:o:juniper:junos_space:17.1:r1:*:*:*:*:*:*

Informations

Vendor

juniper

Product

junos_space

Version

17.1

Update

r1

Related CVE

Open and find in CVE List

CVE ID Publié Description Score Gravité
CVE-2020-1611 2020-01-15 08h40 +00:00 A Local File Inclusion vulnerability in Juniper Networks Junos Space allows an attacker to view all files on the target when the device receives malicious HTTP packets. This issue affects: Juniper Networks Junos Space versions prior to 19.4R1.
6.5
Moyen
CVE-2018-0047 2018-10-10 18h00 +00:00 A persistent cross-site scripting vulnerability in the UI framework used by Junos Space Security Director may allow authenticated users to inject persistent and malicious scripts. This may allow stealing of information or performing actions as a different user when other users access the Security Director web interface. This issue affects all versions of Juniper Networks Junos Space Security Director prior to 17.2R2.
8
Haute
CVE-2018-0012 2018-01-10 22h00 +00:00 Junos Space is affected by a privilege escalation vulnerability that may allow a local authenticated attacker to gain root privileges.
7.8
Haute
CVE-2018-0010 2018-01-10 21h00 +00:00 A vulnerability in the Juniper Networks Junos Space Security Director allows a user who does not have SSH access to a device to reuse the URL that was created for another user to perform SSH access. Affected releases are all versions of Junos Space Security Director prior to 17.2R1.
6.5
Moyen
CVE-2017-10622 2017-10-13 17h00 +00:00 An authentication bypass vulnerability in Juniper Networks Junos Space Network Management Platform may allow a remote unauthenticated network based attacker to login as any privileged user. This issue only affects Junos Space Network Management Platform 17.1R1 without Patch v1 and 16.1 releases prior to 16.1R3. This issue was found by an external security researcher.
9.8
Critique