漏洞信息
尽管我们使用了先进的大模型技术,但其输出仍可能包含不准确或过时的信息。神龙努力确保数据的准确性,但请您根据实际情况进行核实和判断。
漏洞
N/A
漏洞信息
Multiple cross-site scripting (XSS) vulnerabilities in the J-Web interface in Juniper JUNOS 8.5R1.14 allow remote authenticated users to inject arbitrary web script or HTML via (1) the JEXEC_OUTID parameter in a JEXEC_MODE_RELAY_OUTPUT action to the jexec program; the (2) act, (3) refresh-time, or (4) ifid parameter to scripter.php; (5) the revision parameter in a rollback action to the configuration program; the m[] parameter to the (6) monitor, (7) manage, (8) events, (9) configuration, or (10) alarms program; (11) the m[] parameter to the default URI; (12) the m[] parameter in a browse action to the default URI; (13) the wizard-next parameter in an https action to the configuration program; or the (14) Contact Information, (15) System Description, (16) Local Engine ID, (17) System Location, or (18) System Name Override SNMP parameter, related to the configuration program.
漏洞信息
N/A
漏洞
N/A
漏洞
Juniper JUNOS J-Web界面 多个跨站脚本攻击漏洞
漏洞信息
Juniper JUNOS的J-Web界面中存在多个跨站脚本攻击漏洞。远程验证用户借助 (1)对jexec程序的一个JEXEC_MODE_RELAY_OUTPUT操作的JEXEC_OUTid参数;(2) act,(3)refresh-time,或(4)对scripter.php的ifid参数;(5)对设置程序的一个rollback操作的revision程序;对(6)monitor,(7)manage,(8)events,(9)configuration,或(10)alarms program的m[]参数;
漏洞信息
N/A
漏洞
N/A