Description
Multiple serious vulnerabilities have been found in Juniper Junos. Malicious users can exploit these vulnerabilities to gainprivileges, execute arbitrary code orspoof user interface.
Below is a complete list of vulnerabilities
- XSS vulnerability can be exploited remotely via unspecified vectors;
- Unknown vulnerability can be exploited remotely via a specially designed header or CLI commands;
- Lack of log-out-on-disconnect enforcement can be exploited remotely via devica access manipulations.
Original advisories
Related products
CVE list
- CVE-2015-3005 warning
- CVE-2015-3004 warning
- CVE-2015-3002 high
- CVE-2015-3003 high
Read more
Find out the statistics of the vulnerabilities spreading in your region on statistics.securelist.com
Found an inaccuracy in the description of this vulnerability? Let us know!