漏洞信息
尽管我们使用了先进的大模型技术,但其输出仍可能包含不准确或过时的信息。神龙努力确保数据的准确性,但请您根据实际情况进行核实和判断。
漏洞
Junos: Unauthenticated Remote Code Execution through J-Web interface
漏洞信息
A remote, unauthenticated attacker may be able to execute code by exploiting a use-after-free defect found in older versions of PHP through injection of crafted data via specific PHP URLs within the context of the J-Web process. Affected releases are Juniper Networks Junos OS: 12.1X46 versions prior to 12.1X46-D67; 12.3 versions prior to 12.3R12-S5; 12.3X48 versions prior to 12.3X48-D35; 14.1 versions prior to 14.1R8-S5, 14.1R9; 14.1X53 versions prior to 14.1X53-D44, 14.1X53-D50; 14.2 versions prior to 14.2R7-S7, 14.2R8; 15.1 versions prior to 15.1R3; 15.1X49 versions prior to 15.1X49-D30; 15.1X53 versions prior to 15.1X53-D70.
漏洞信息
N/A
漏洞
N/A
漏洞
Juniper Junos OS 安全漏洞
漏洞信息
Juniper Junos OS是美国瞻博网络(Juniper Networks)公司的一套专用于该公司的硬件系统的网络操作系统。该操作系统提供了安全编程接口和Junos SDK。 Juniper Junos OS中存在释放后重用漏洞。远程攻击者可借助特定的PHP URLs利用该漏洞执行代码。以下版本受到影响:Juniper Junos OS 12.1X46-D67之前的12.1X46版本,12.3R12-S5之前的12.3版本,12.3X48-D35之前的12.3X48版本,14.1R8-S5和14.1
漏洞信息
N/A
漏洞
N/A