Lucene search

K
githubexploit22BD4550-67DD-5F57-B9D1-DA1A86A945CE
HistoryFeb 03, 2024 - 6:09 a.m.

Exploit for PHP External Variable Modification in Juniper Junos

2024-02-0306:09:30
119
remote code execution
juniper junos
php
variable manipulation
vulnerability
srx firewalls
ex switches
unauthenticated
cve-2023-36845
detection
shodan
upload file
protocol wrapper
command execution
parameter
target file
output file

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

7.6 High

AI Score

Confidence

Low

0.966 High

EPSS

Percentile

99.6%

<h1>CVE-2023-36845</h1>
<p>
<img…

This is an article that belongs to githubexploit private collection.
Please sign in to get more Information.

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

7.6 High

AI Score

Confidence

Low

0.966 High

EPSS

Percentile

99.6%