cve,link,title,description,vendor,products,score,severity,epss,cisa,article,ransomware,exploited,poc,trended,trended_no_1,published,trended_score CVE-2024-39563,https://securityvulnerability.io/vulnerability/CVE-2024-39563,Junos Space Command Injection Vulnerability Allows Remote Command Execution,"A Command Injection vulnerability exists in Juniper Networks' Junos Space, enabling unauthenticated, network-based attackers to send specially crafted requests that result in the execution of arbitrary shell commands on the Junos Space Appliance. The issue arises from inadequate input sanitization in a specific script within the web application, allowing malicious input passed via a GET request. Exploitation of this vulnerability can lead to remote command execution, potentially granting the attacker full control over the affected device. Only Junos Space version 24.1R1 is impacted, while earlier versions remain unaffected.",Juniper Networks,Junos Space,7.3,HIGH,0.0004299999854993075,false,false,false,false,,false,false,2024-10-11T15:21:18.354Z,0 CVE-2021-0220,https://securityvulnerability.io/vulnerability/CVE-2021-0220,Junos Space: Shared secrets stored in recoverable format and directly exposed through the UI,"The Junos Space Network Management Platform has been found to store shared secrets in a recoverable format that can be exposed through the UI. An attacker who is able to execute arbitrary code in the victim browser (for example via XSS) or access cached contents may be able to obtain a copy of credentials managed by Junos Space. The impact of a successful attack includes, but is not limited to, obtaining access to other servers connected to the Junos Space Management Platform. This issue affects Juniper Networks Junos Space versions prior to 20.3R1.",Juniper Networks,Junos Space,6.8,MEDIUM,0.0006799999973736703,false,false,false,true,,false,false,2021-01-15T18:15:00.000Z,0 CVE-2020-1652,https://securityvulnerability.io/vulnerability/CVE-2020-1652,Junos Space: OpenNMS is accessible via port 9443,OpenNMS is accessible via port 9443,Juniper Networks,Junos Space,5.6,MEDIUM,0.002219999907538295,false,false,false,true,,false,false,2020-07-17T19:15:00.000Z,0 CVE-2020-1611,https://securityvulnerability.io/vulnerability/CVE-2020-1611,Junos Space: Malicious HTTP packets sent to Junos Space allow an attacker to view all files on the device.,A Local File Inclusion vulnerability in Juniper Networks Junos Space allows an attacker to view all files on the target when the device receives malicious HTTP packets. This issue affects: Juniper Networks Junos Space versions prior to 19.4R1.,Juniper Networks,Junos Space,6.5,MEDIUM,0.0006200000061653554,false,false,false,true,true,false,false,2020-01-15T09:15:00.000Z,0 CVE-2019-0016,https://securityvulnerability.io/vulnerability/CVE-2019-0016,Junos Space: Authenticated user able to delete devices without delete device privileges,A malicious authenticated user may be able to delete a device from the Junos Space database without the necessary privileges through crafted Ajax interactions obtained from another legitimate delete action performed by another administrative user. Affected releases are Juniper Networks Junos Space versions prior to 18.3R1.,Juniper Networks,Junos Space,6.5,MEDIUM,0.000539999979082495,false,false,false,true,,false,false,2019-01-15T21:29:00.000Z,0 CVE-2019-0017,https://securityvulnerability.io/vulnerability/CVE-2019-0017,Junos Space: Unrestricted file upload vulnerability,"The Junos Space application, which allows Device Image files to be uploaded, has insufficient validity checking which may allow uploading of malicious images or scripts, or other content types. Affected releases are Juniper Networks Junos Space versions prior to 18.3R1.",Juniper Networks,Junos Space,6.5,MEDIUM,0.0010400000028312206,false,false,false,true,,false,false,2019-01-15T21:29:00.000Z,0 CVE-2018-0047,https://securityvulnerability.io/vulnerability/CVE-2018-0047,Junos Space Security Director: XSS vulnerability in web administration,A persistent cross-site scripting vulnerability in the UI framework used by Junos Space Security Director may allow authenticated users to inject persistent and malicious scripts. This may allow stealing of information or performing actions as a different user when other users access the Security Director web interface. This issue affects all versions of Juniper Networks Junos Space Security Director prior to 17.2R2.,Juniper Networks,Junos Space Security Director,8,HIGH,0.0004600000102072954,false,false,false,true,,false,false,2018-10-10T00:00:00.000Z,0 CVE-2018-0046,https://securityvulnerability.io/vulnerability/CVE-2018-0046,Junos Space: Reflected Cross-site Scripting vulnerability in OpenNMS,A reflected cross-site scripting vulnerability in OpenNMS included with Juniper Networks Junos Space may allow the stealing of sensitive information or session credentials from Junos Space administrators or perform administrative actions. This issue affects Juniper Networks Junos Space versions prior to 18.2R1.,Juniper Networks,Junos Space,8.8,HIGH,0.0012700000079348683,false,false,false,true,,false,false,2018-10-10T00:00:00.000Z,0 CVE-2018-0013,https://securityvulnerability.io/vulnerability/CVE-2018-0013,Junos Space: Local File Inclusion Vulnerability,A local file inclusion vulnerability in Juniper Networks Junos Space Network Management Platform may allow an authenticated user to retrieve files from the system.,Juniper Networks,Junos Space,6.5,MEDIUM,0.0005600000149570405,false,false,false,false,,false,false,2018-01-10T00:00:00.000Z,0 CVE-2018-0011,https://securityvulnerability.io/vulnerability/CVE-2018-0011,Junos Space: Reflected XSS vulnerability in Junos Space management interface,"A reflected cross site scripting (XSS) vulnerability in Junos Space may potentially allow a remote authenticated user to inject web script or HTML and steal sensitive data and credentials from a session, and to perform administrative actions on the Junos Space network management device.",Juniper Networks,Junos Space,5.4,MEDIUM,0.0005499999970197678,false,false,false,true,,false,false,2018-01-10T00:00:00.000Z,0 CVE-2018-0012,https://securityvulnerability.io/vulnerability/CVE-2018-0012,Junos Space: Local privilege escalation vulnerability in Junos Space,Junos Space is affected by a privilege escalation vulnerability that may allow a local authenticated attacker to gain root privileges.,Juniper Networks,Junos Space,7.8,HIGH,0.0004199999966658652,false,false,false,true,,false,false,2018-01-10T00:00:00.000Z,0 CVE-2017-10622,https://securityvulnerability.io/vulnerability/CVE-2017-10622,Junos Space: Authentication bypass vulnerability,An authentication bypass vulnerability in Juniper Networks Junos Space Network Management Platform may allow a remote unauthenticated network based attacker to login as any privileged user. This issue only affects Junos Space Network Management Platform 17.1R1 without Patch v1 and 16.1 releases prior to 16.1R3. This issue was found by an external security researcher.,Juniper Networks,Junos Space,9.8,CRITICAL,0.004379999823868275,false,false,false,false,,false,false,2017-10-13T17:29:00.000Z,0 CVE-2017-10612,https://securityvulnerability.io/vulnerability/CVE-2017-10612,Junos Space: Persistent Cross site scripting in Junos Space,A persistent site scripting vulnerability in Juniper Networks Junos Space allows users who can change certain configuration to implant malicious Javascript or HTML which may be used to steal information or perform actions as other Junos Space users or administrators. Affected releases are Juniper Networks Junos Space all versions prior to 17.1R1.,Juniper Networks,Junos Space,8,HIGH,0.0008900000248104334,false,false,false,false,,false,false,2017-10-13T17:29:00.000Z,0 CVE-2017-10624,https://securityvulnerability.io/vulnerability/CVE-2017-10624,Junos Space: Insufficient verification of node certificates.,Insufficient verification of node certificates in Juniper Networks Junos Space may allow a man-in-the-middle type of attacker to make unauthorized modifications to Space database or add nodes. Affected releases are Juniper Networks Junos Space all versions prior to 17.1R1.,Juniper Networks,Junos Space,7.5,HIGH,0.0012199999764561653,false,false,false,false,,false,false,2017-10-13T17:29:00.000Z,0 CVE-2017-10623,https://securityvulnerability.io/vulnerability/CVE-2017-10623,Junos Space: Insufficient verification of cluster messages,"Lack of authentication and authorization of cluster messages in Juniper Networks Junos Space may allow a man-in-the-middle type of attacker to intercept, inject or disrupt Junos Space cluster operations between two nodes. Affected releases are Juniper Networks Junos Space all versions prior to 17.1R1.",Juniper Networks,Junos Space,7.1,HIGH,0.0015899999998509884,false,false,false,false,,false,false,2017-10-13T17:29:00.000Z,0 CVE-2017-2307,https://securityvulnerability.io/vulnerability/CVE-2017-2307,,A reflected cross site scripting vulnerability in the administrative interface of Juniper Networks Junos Space versions prior to 16.1R1 may allow remote attackers to steal sensitive information or perform certain administrative actions on Junos Space.,Juniper Networks,Junos Space,6.1,MEDIUM,0.0007099999929778278,false,false,false,false,,false,false,2017-05-30T14:00:00.000Z,0 CVE-2017-2306,https://securityvulnerability.io/vulnerability/CVE-2017-2306,,"On Juniper Networks Junos Space versions prior to 16.1R1, due to an insufficient authorization check, readonly users on the Junos Space administrative web interface can execute code on the device.",Juniper Networks,Junos Space,8.8,HIGH,0.0012400000123307109,false,false,false,false,,false,false,2017-05-30T14:00:00.000Z,0 CVE-2017-2305,https://securityvulnerability.io/vulnerability/CVE-2017-2305,,"On Juniper Networks Junos Space versions prior to 16.1R1, due to an insufficient authorization check, readonly users on the Junos Space administrative web interface can create privileged users, allowing privilege escalation.",Juniper Networks,Junos Space,8.8,HIGH,0.0011599999852478504,false,false,false,false,,false,false,2017-05-30T14:00:00.000Z,0 CVE-2017-2310,https://securityvulnerability.io/vulnerability/CVE-2017-2310,,"A firewall bypass vulnerability in the host based firewall of Juniper Networks Junos Space versions prior to 16.1R1 may permit certain crafted packets, representing a network integrity risk.",Juniper Networks,Junos Space,5.3,MEDIUM,0.0007699999841861427,false,false,false,false,,false,false,2017-05-30T14:00:00.000Z,0 CVE-2017-2311,https://securityvulnerability.io/vulnerability/CVE-2017-2311,,"On Juniper Networks Junos Space versions prior to 16.1R1, an unauthenticated remote attacker with network access to Junos space device can easily create a denial of service condition.",Juniper Networks,Junos Space,5.3,MEDIUM,0.0013699999544769526,false,false,false,false,,false,false,2017-05-30T14:00:00.000Z,0 CVE-2017-2309,https://securityvulnerability.io/vulnerability/CVE-2017-2309,,"On Juniper Networks Junos Space versions prior to 16.1R1 when certificate based authentication is enabled for the Junos Space cluster, some restricted web services are accessible over the network. This represents an information leak risk.",Juniper Networks,Junos Space,5.9,MEDIUM,0.0008299999753944576,false,false,false,false,,false,false,2017-05-30T14:00:00.000Z,0 CVE-2017-2308,https://securityvulnerability.io/vulnerability/CVE-2017-2308,,An XML External Entity Injection vulnerability in Juniper Networks Junos Space versions prior to 16.1R1 may allow an authenticated user to read arbitrary files on the device.,Juniper Networks,Junos Space,6.5,MEDIUM,0.0006699999794363976,false,false,false,false,,false,false,2017-05-30T14:00:00.000Z,0