Vulnerability Information
Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
Vulnerability Title
N/A
Vulnerability Description
Multiple cross-site scripting (XSS) vulnerabilities in the J-Web interface in Juniper JUNOS 8.5R1.14 allow remote authenticated users to inject arbitrary web script or HTML via (1) the JEXEC_OUTID parameter in a JEXEC_MODE_RELAY_OUTPUT action to the jexec program; the (2) act, (3) refresh-time, or (4) ifid parameter to scripter.php; (5) the revision parameter in a rollback action to the configuration program; the m[] parameter to the (6) monitor, (7) manage, (8) events, (9) configuration, or (10) alarms program; (11) the m[] parameter to the default URI; (12) the m[] parameter in a browse action to the default URI; (13) the wizard-next parameter in an https action to the configuration program; or the (14) Contact Information, (15) System Description, (16) Local Engine ID, (17) System Location, or (18) System Name Override SNMP parameter, related to the configuration program.
CVSS Information
N/A
Vulnerability Type
N/A
Vulnerability Title
Juniper JUNOS J-Web界面 多个跨站脚本攻击漏洞
Vulnerability Description
Juniper JUNOS的J-Web界面中存在多个跨站脚本攻击漏洞。远程验证用户借助 (1)对jexec程序的一个JEXEC_MODE_RELAY_OUTPUT操作的JEXEC_OUTid参数;(2) act,(3)refresh-time,或(4)对scripter.php的ifid参数;(5)对设置程序的一个rollback操作的revision程序;对(6)monitor,(7)manage,(8)events,(9)configuration,或(10)alarms program的m[]参数;
CVSS Information
N/A
Vulnerability Type
N/A