Vulnerabilities > Juniper > Junos Pulse Secure Access Service > 7.1r5
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2014-09-29 | CVE-2014-3824 | Cross-Site Scripting vulnerability in Juniper Junos Pulse Secure Access Service Cross-site scripting (XSS) vulnerability in the web server in the Juniper Junos Pulse Secure Access Service (SSL VPN) devices with IVE OS 8.0 before 8.0r6, 7.4 before 7.4r13, and 7.1 before 7.1r20 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors. | 4.3 |
2014-09-29 | CVE-2014-3823 | Improper Input Validation vulnerability in Juniper Junos Pulse Secure Access Service The Juniper Junos Pulse Secure Access Service (SSL VPN) devices with IVE OS 8.0 before 8.0r1, 7.4 before 7.4r5, and 7.1 before 7.1r18 allows remote attackers to conduct clickjacking attacks via unspecified vectors. | 4.3 |
2014-09-29 | CVE-2014-3820 | Cross-Site Scripting vulnerability in Juniper products Cross-site scripting (XSS) vulnerability in the SSL VPN/UAC web server in the Juniper Junos Pulse Secure Access Service (SSL VPN) devices with IVE OS 7.1 before 7.1r16, 7.4 before 7.4r3, and 8.0 before 8.0r1 and the Juniper Junos Pulse Access Control Service devices with UAC OS 4.1 before 4.1r8, 4.4 before 4.4r3 and 5.0 before 5.0r1 allows remote administrators to inject arbitrary web script or HTML via unspecified vectors. | 4.3 |
2013-06-13 | CVE-2013-3970 | Cryptographic Issues vulnerability in Juniper products Juniper Junos Pulse Secure Access Service (aka SSL VPN) with IVE OS 7.0r2 through 7.0r8 and 7.1r1 through 7.1r5 and Junos Pulse Access Control Service (aka UAC) with UAC OS 4.1r1 through 4.1r5 include a test Certification Authority (CA) certificate in the Trusted Server CAs list, which makes it easier for man-in-the-middle attackers to spoof SSL servers by leveraging control over that test CA. | 4.3 |