Vulnerabilities > Juniper > Junos Space
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2017-10-13 | CVE-2017-10624 | Insufficient Verification of Data Authenticity vulnerability in Juniper Junos Space Insufficient verification of node certificates in Juniper Networks Junos Space may allow a man-in-the-middle type of attacker to make unauthorized modifications to Space database or add nodes. | 7.5 |
2017-10-13 | CVE-2017-10623 | Improper Authentication vulnerability in Juniper Junos Space Lack of authentication and authorization of cluster messages in Juniper Networks Junos Space may allow a man-in-the-middle type of attacker to intercept, inject or disrupt Junos Space cluster operations between two nodes. | 8.1 |
2017-10-13 | CVE-2017-10622 | Improper Authentication vulnerability in Juniper Junos Space 16.1/17.1 An authentication bypass vulnerability in Juniper Networks Junos Space Network Management Platform may allow a remote unauthenticated network based attacker to login as any privileged user. | 9.8 |
2017-10-13 | CVE-2017-10612 | Cross-site Scripting vulnerability in Juniper Junos Space A persistent site scripting vulnerability in Juniper Networks Junos Space allows users who can change certain configuration to implant malicious Javascript or HTML which may be used to steal information or perform actions as other Junos Space users or administrators. | 8.0 |
2017-10-13 | CVE-2016-1265 | Information Exposure vulnerability in Juniper Junos Space A remote unauthenticated network based attacker with access to Junos Space may execute arbitrary code on Junos Space or gain access to devices managed by Junos Space using cross site request forgery (CSRF), default authentication credentials, information leak and command injection attack vectors. | 9.8 |
2017-05-30 | CVE-2017-2311 | Unspecified vulnerability in Juniper Junos Space On Juniper Networks Junos Space versions prior to 16.1R1, an unauthenticated remote attacker with network access to Junos space device can easily create a denial of service condition. | 5.3 |
2017-05-30 | CVE-2017-2310 | Unspecified vulnerability in Juniper Junos Space A firewall bypass vulnerability in the host based firewall of Juniper Networks Junos Space versions prior to 16.1R1 may permit certain crafted packets, representing a network integrity risk. | 5.3 |
2017-05-30 | CVE-2017-2309 | Information Exposure vulnerability in Juniper Junos Space On Juniper Networks Junos Space versions prior to 16.1R1 when certificate based authentication is enabled for the Junos Space cluster, some restricted web services are accessible over the network. | 5.9 |
2017-05-30 | CVE-2017-2308 | XXE vulnerability in Juniper Junos Space An XML External Entity Injection vulnerability in Juniper Networks Junos Space versions prior to 16.1R1 may allow an authenticated user to read arbitrary files on the device. | 6.5 |
2017-05-30 | CVE-2017-2307 | Cross-site Scripting vulnerability in Juniper Junos Space A reflected cross site scripting vulnerability in the administrative interface of Juniper Networks Junos Space versions prior to 16.1R1 may allow remote attackers to steal sensitive information or perform certain administrative actions on Junos Space. | 6.1 |