| CVE-2017-10622 | Cri | 0.65 | 9.8 | 0.22 | | Oct 13, 2017 | An authentication bypass vulnerability in Juniper Networks Junos Space Network Management Platform may allow a remote unauthenticated network based attacker to login as any privileged user. This issue only affects Junos Space Network Management Platform 17.1R1 without Patch v1 and 16.1 releases prior to 16.1R3. This issue was found by an external security researcher. |
| CVE-2016-4926 | Cri | 0.64 | 9.8 | 0.03 | | Mar 20, 2017 | Insufficient authentication vulnerability in Junos Space before 15.2R2 allows remote network based users with access to Junos Space web interface to perform certain administrative tasks without authentication. |
| CVE-2017-2306 | Hig | 0.57 | 8.8 | 0.01 | | May 30, 2017 | On Juniper Networks Junos Space versions prior to 16.1R1, due to an insufficient authorization check, readonly users on the Junos Space administrative web interface can execute code on the device. |
| CVE-2017-2305 | Hig | 0.57 | 8.8 | 0.00 | | May 30, 2017 | On Juniper Networks Junos Space versions prior to 16.1R1, due to an insufficient authorization check, readonly users on the Junos Space administrative web interface can create privileged users, allowing privilege escalation. |
| CVE-2016-4929 | Hig | 0.57 | 8.8 | 0.02 | | Mar 20, 2017 | Command injection vulnerability in Junos Space before 15.2R2 allows attackers to execute arbitrary code as a root user. |
| CVE-2016-4928 | Hig | 0.57 | 8.8 | 0.00 | | Mar 20, 2017 | Cross site request forgery vulnerability in Junos Space before 15.2R2 allows remote attackers to perform certain administrative actions on Junos Space. |
| CVE-2016-4927 | Hig | 0.53 | 8.1 | 0.00 | | Mar 20, 2017 | Insufficient validation of SSH keys in Junos Space before 15.2R2 allows man-in-the-middle (MITM) type of attacks while a Space device is communicating with managed devices. |
| CVE-2017-10612 | Hig | 0.52 | 8.0 | 0.00 | | Oct 13, 2017 | A persistent site scripting vulnerability in Juniper Networks Junos Space allows users who can change certain configuration to implant malicious Javascript or HTML which may be used to steal information or perform actions as other Junos Space users or administrators. Affected releases are Juniper Networks Junos Space all versions prior to 17.1R1. |
| CVE-2017-10624 | Hig | 0.49 | 7.5 | 0.00 | | Oct 13, 2017 | Insufficient verification of node certificates in Juniper Networks Junos Space may allow a man-in-the-middle type of attacker to make unauthorized modifications to Space database or add nodes. Affected releases are Juniper Networks Junos Space all versions prior to 17.1R1. |
| CVE-2017-10623 | Hig | 0.46 | 7.1 | 0.00 | | Oct 13, 2017 | Lack of authentication and authorization of cluster messages in Juniper Networks Junos Space may allow a man-in-the-middle type of attacker to intercept, inject or disrupt Junos Space cluster operations between two nodes. Affected releases are Juniper Networks Junos Space all versions prior to 17.1R1. |
| CVE-2017-2308 | Med | 0.42 | 6.5 | 0.00 | | May 30, 2017 | An XML External Entity Injection vulnerability in Juniper Networks Junos Space versions prior to 16.1R1 may allow an authenticated user to read arbitrary files on the device. |
| CVE-2016-4931 | Med | 0.42 | 6.5 | 0.00 | | Mar 20, 2017 | XML entity injection in Junos Space before 15.2R2 allows attackers to cause a denial of service. |
| CVE-2017-2307 | Med | 0.40 | 6.1 | 0.00 | | May 30, 2017 | A reflected cross site scripting vulnerability in the administrative interface of Juniper Networks Junos Space versions prior to 16.1R1 may allow remote attackers to steal sensitive information or perform certain administrative actions on Junos Space. |
| CVE-2016-4930 | Med | 0.40 | 6.1 | 0.00 | | Mar 20, 2017 | Cross-site scripting (XSS) vulnerability in Junos Space before 15.2R2 allows remote attackers to steal sensitive information or perform certain administrative actions. |
| CVE-2017-2309 | Med | 0.38 | 5.9 | 0.00 | | May 30, 2017 | On Juniper Networks Junos Space versions prior to 16.1R1 when certificate based authentication is enabled for the Junos Space cluster, some restricted web services are accessible over the network. This represents an information leak risk. |
| CVE-2017-2311 | Med | 0.34 | 5.3 | 0.00 | | May 30, 2017 | On Juniper Networks Junos Space versions prior to 16.1R1, an unauthenticated remote attacker with network access to Junos space device can easily create a denial of service condition. |
| CVE-2017-2310 | Med | 0.34 | 5.3 | 0.00 | | May 30, 2017 | A firewall bypass vulnerability in the host based firewall of Juniper Networks Junos Space versions prior to 16.1R1 may permit certain crafted packets, representing a network integrity risk. |
| CVE-2015-3209 | | 0.01 | — | 0.18 | | Jun 15, 2015 | Heap-based buffer overflow in the PCNET controller in QEMU allows remote attackers to execute arbitrary code by sending a packet with TXSTATUS_STARTPACKET set and then a crafted packet with TXSTATUS_DEVICEOWNS set. |
| CVE-2014-2421 | | 0.01 | — | 0.07 | | Apr 16, 2014 | Unspecified vulnerability in Oracle Java SE 5.0u61, 6u71, 7u51, and 8; JavaFX 2.2.51; and Java SE Embedded 7u51 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D. |
| CVE-2014-0457 | | 0.01 | — | 0.18 | | Apr 16, 2014 | Unspecified vulnerability in Oracle Java SE 5.0u61, SE 6u71, 7u51, and 8; JRockit R27.8.1 and R28.3.1; and Java SE Embedded 7u51 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Libraries. |