cve,link,title,description,vendor,products,score,severity,epss,cisa,cisa_published,article,ransomware,exploited,exploited_date,poc,trended,trended_no_1,trended_no_1_date,published,trended_score CVE-2019-0004,https://securityvulnerability.io/vulnerability/CVE-2019-0004,Juniper ATP: API and device keys are logged in a world-readable permissions file,"On Juniper ATP, the API key and the device key are logged in a file readable by authenticated local users. These keys are used for performing critical operations on the WebUI interface. This issue affects Juniper ATP 5.0 versions prior to 5.0.3.",Juniper Networks,Juniper Atp,7.8,HIGH,0.0004199999966658652,false,,false,false,false,,,false,false,,2019-01-15T21:29:00.000Z,0 CVE-2019-0021,https://securityvulnerability.io/vulnerability/CVE-2019-0021,Juniper ATP: secret CLI inputs are logged to /var/log/syslog in clear text,"On Juniper ATP, secret passphrase CLI inputs, such as ""set mcm"", are logged to /var/log/syslog in clear text, allowing authenticated local user to be able to view these secret information. This issue affects Juniper ATP 5.0 versions prior to 5.0.4.",Juniper Networks,Juniper Atp,7.1,HIGH,0.0004199999966658652,false,,false,false,false,,,false,false,,2019-01-15T21:29:00.000Z,0 CVE-2019-0022,https://securityvulnerability.io/vulnerability/CVE-2019-0022,Juniper ATP: Two hard coded credentials sharing the same password give an attacker the ability to take control of any installation of the software.,Juniper ATP ships with hard coded credentials in the Cyphort Core instance which gives an attacker the ability to take full control of any installation of the software. Affected releases are Juniper Networks Juniper ATP: 5.0 versions prior to 5.0.3.,Juniper Networks,Juniper Atp,10,CRITICAL,0.002219999907538295,false,,false,false,true,2024-08-04T18:15:21.000Z,,false,false,,2019-01-15T21:29:00.000Z,0 CVE-2019-0023,https://securityvulnerability.io/vulnerability/CVE-2019-0023,Juniper ATP: Persistent Cross-Site Scripting vulnerability in the Golden VM menu,"A persistent cross-site scripting (XSS) vulnerability in the Golden VM menu of Juniper ATP may allow authenticated user to inject arbitrary script and steal sensitive data and credentials from a web administration session, possibly tricking a follow-on administrative user to perform administrative actions on the device. This issue affects Juniper ATP 5.0 versions prior to 5.0.3.",Juniper Networks,Juniper Atp,5.4,MEDIUM,0.000539999979082495,false,,false,false,true,2024-08-04T18:15:21.000Z,,false,false,,2019-01-15T21:29:00.000Z,0 CVE-2019-0024,https://securityvulnerability.io/vulnerability/CVE-2019-0024,Juniper ATP: Persistent Cross-Site Scripting vulnerability in the Email Collectors menu,"A persistent cross-site scripting (XSS) vulnerability in the Email Collectors menu of Juniper ATP may allow authenticated user to inject arbitrary script and steal sensitive data and credentials from a web administration session, possibly tricking a follow-on administrative user to perform administrative actions on the device. This issue affects Juniper ATP 5.0 versions prior to 5.0.3.",Juniper Networks,Juniper Atp,5.4,MEDIUM,0.000539999979082495,false,,false,false,true,2024-08-04T18:15:21.000Z,,false,false,,2019-01-15T21:29:00.000Z,0 CVE-2019-0025,https://securityvulnerability.io/vulnerability/CVE-2019-0025,Juniper ATP: Persistent Cross-Site Scripting vulnerability in RADIUS configuration menu,"A persistent cross-site scripting (XSS) vulnerability in RADIUS configuration menu of Juniper ATP may allow authenticated user to inject arbitrary script and steal sensitive data and credentials from a web administration session, possibly tricking a follow-on administrative user to perform administrative actions on the device. This issue affects Juniper ATP 5.0 versions prior to 5.0.3.",Juniper Networks,Juniper Atp,5.4,MEDIUM,0.000539999979082495,false,,false,false,true,2024-08-04T18:15:21.000Z,,false,false,,2019-01-15T21:29:00.000Z,0 CVE-2019-0026,https://securityvulnerability.io/vulnerability/CVE-2019-0026,Juniper ATP: Persistent Cross-Site Scripting vulnerability in Zone configuration,"A persistent cross-site scripting (XSS) vulnerability in the Zone configuration of Juniper ATP may allow authenticated user to inject arbitrary script and steal sensitive data and credentials from a web administration session, possibly tricking a follow-on administrative user to perform administrative actions on the device. This issue affects Juniper ATP 5.0 versions prior to 5.0.3.",Juniper Networks,Juniper Atp,5.4,MEDIUM,0.000539999979082495,false,,false,false,true,2024-08-04T18:15:21.000Z,,false,false,,2019-01-15T21:29:00.000Z,0 CVE-2019-0027,https://securityvulnerability.io/vulnerability/CVE-2019-0027,Juniper ATP: Persistent Cross-Site Scripting vulnerability in Snort Rules configuration,"A persistent cross-site scripting (XSS) vulnerability in the Snort Rules configuration of Juniper ATP may allow authenticated user to inject arbitrary script and steal sensitive data and credentials from a web administration session, possibly tricking a follow-on administrative user to perform administrative actions on the device. This issue affects Juniper ATP 5.0 versions prior to 5.0.3.",Juniper Networks,Juniper Atp,5.4,MEDIUM,0.000539999979082495,false,,false,false,true,2024-08-04T18:15:21.000Z,,false,false,,2019-01-15T21:29:00.000Z,0 CVE-2019-0029,https://securityvulnerability.io/vulnerability/CVE-2019-0029,Juniper ATP: Splunk credentials are in logged in clear text,Juniper ATP Series Splunk credentials are logged in a file readable by authenticated local users. Using these credentials an attacker can access the Splunk server. This issue affects Juniper ATP 5.0 versions prior to 5.0.3.,Juniper Networks,Juniper Atp,8.8,HIGH,0.0004199999966658652,false,,false,false,false,,,false,false,,2019-01-15T21:29:00.000Z,0 CVE-2019-0030,https://securityvulnerability.io/vulnerability/CVE-2019-0030,Juniper ATP: Password hashing uses DES and a hardcoded salt,"Juniper ATP uses DES and a hardcoded salt for password hashing, allowing for trivial de-hashing of the password file contents. This issue affects Juniper ATP 5.0 versions prior to 5.0.3.",Juniper Networks,Juniper Atp,6.7,MEDIUM,0.0010400000028312206,false,,false,false,true,2024-08-04T18:15:21.000Z,,false,false,,2019-01-15T21:29:00.000Z,0 CVE-2019-0018,https://securityvulnerability.io/vulnerability/CVE-2019-0018,Juniper ATP: Persistent Cross-Site Scripting (XSS) vulnerability in file upload menu,"A persistent cross-site scripting (XSS) vulnerability in the file upload menu of Juniper ATP may allow an authenticated user to inject arbitrary scripts and steal sensitive data and credentials from a web administration session, possibly tricking a follow-on administrative user to perform administrative actions on the device. This issue affects Juniper ATP 5.0 versions prior to 5.0.3.",Juniper Networks,Juniper Atp,5.4,MEDIUM,0.000539999979082495,false,,false,false,true,2024-08-04T18:15:21.000Z,,false,false,,2019-01-15T21:29:00.000Z,0 CVE-2019-0020,https://securityvulnerability.io/vulnerability/CVE-2019-0020,Juniper ATP: Hard coded credentials used in Web Collector,Juniper ATP ships with hard coded credentials in the Web Collector instance which gives an attacker the ability to take full control of any installation of the software. Affected releases are Juniper Networks Juniper ATP: 5.0 versions prior to 5.0.3.,Juniper Networks,Juniper Atp,10,CRITICAL,0.002219999907538295,false,,false,false,true,2024-08-04T18:15:21.000Z,,false,false,,2019-01-15T21:29:00.000Z,0