Show filters
13 Total Results
Displaying 1-10 of 13
Sort by:
Attacker Value
Unknown

CVE-2020-14418

Disclosure Date: January 30, 2021 (last updated February 22, 2025)
A TOCTOU vulnerability exists in madCodeHook before 2020-07-16 that allows local attackers to elevate their privileges to SYSTEM. This occurs because path redirection can occur via vectors involving directory junctions.
Attacker Value
Unknown

Juniper ATP: Password hashing uses DES and a hardcoded salt

Disclosure Date: January 15, 2019 (last updated November 08, 2023)
Juniper ATP uses DES and a hardcoded salt for password hashing, allowing for trivial de-hashing of the password file contents. This issue affects Juniper ATP 5.0 versions prior to 5.0.3.
Attacker Value
Unknown

Juniper ATP: Persistent Cross-Site Scripting vulnerability in Snort Rules confi…

Disclosure Date: January 15, 2019 (last updated November 27, 2024)
A persistent cross-site scripting (XSS) vulnerability in the Snort Rules configuration of Juniper ATP may allow authenticated user to inject arbitrary script and steal sensitive data and credentials from a web administration session, possibly tricking a follow-on administrative user to perform administrative actions on the device. This issue affects Juniper ATP 5.0 versions prior to 5.0.3.
0
Attacker Value
Unknown

Juniper ATP: Two hard coded credentials sharing the same password give an attac…

Disclosure Date: January 15, 2019 (last updated November 27, 2024)
Juniper ATP ships with hard coded credentials in the Cyphort Core instance which gives an attacker the ability to take full control of any installation of the software. Affected releases are Juniper Networks Juniper ATP: 5.0 versions prior to 5.0.3.
0
Attacker Value
Unknown

Juniper ATP: Splunk credentials are in logged in clear text

Disclosure Date: January 15, 2019 (last updated November 27, 2024)
Juniper ATP Series Splunk credentials are logged in a file readable by authenticated local users. Using these credentials an attacker can access the Splunk server. This issue affects Juniper ATP 5.0 versions prior to 5.0.3.
0
Attacker Value
Unknown

Juniper ATP: secret CLI inputs are logged to /var/log/syslog in clear text

Disclosure Date: January 15, 2019 (last updated November 27, 2024)
On Juniper ATP, secret passphrase CLI inputs, such as "set mcm", are logged to /var/log/syslog in clear text, allowing authenticated local user to be able to view these secret information. This issue affects Juniper ATP 5.0 versions prior to 5.0.4.
0
Attacker Value
Unknown

Juniper ATP: Persistent Cross-Site Scripting vulnerability in RADIUS configurat…

Disclosure Date: January 15, 2019 (last updated November 27, 2024)
A persistent cross-site scripting (XSS) vulnerability in RADIUS configuration menu of Juniper ATP may allow authenticated user to inject arbitrary script and steal sensitive data and credentials from a web administration session, possibly tricking a follow-on administrative user to perform administrative actions on the device. This issue affects Juniper ATP 5.0 versions prior to 5.0.3.
0
Attacker Value
Unknown

Juniper ATP: API and device keys are logged in a world-readable permissions file

Disclosure Date: January 15, 2019 (last updated November 27, 2024)
On Juniper ATP, the API key and the device key are logged in a file readable by authenticated local users. These keys are used for performing critical operations on the WebUI interface. This issue affects Juniper ATP 5.0 versions prior to 5.0.3.
Attacker Value
Unknown

Juniper ATP: Hard coded credentials used in Web Collector

Disclosure Date: January 15, 2019 (last updated November 27, 2024)
Juniper ATP ships with hard coded credentials in the Web Collector instance which gives an attacker the ability to take full control of any installation of the software. Affected releases are Juniper Networks Juniper ATP: 5.0 versions prior to 5.0.3.
0
Attacker Value
Unknown

Juniper ATP: Persistent Cross-Site Scripting vulnerability in the Golden VM me…

Disclosure Date: January 15, 2019 (last updated November 27, 2024)
A persistent cross-site scripting (XSS) vulnerability in the Golden VM menu of Juniper ATP may allow authenticated user to inject arbitrary script and steal sensitive data and credentials from a web administration session, possibly tricking a follow-on administrative user to perform administrative actions on the device. This issue affects Juniper ATP 5.0 versions prior to 5.0.3.
0