Lucene search

K
githubexploitC33844FD-4BF9-5B39-92C7-E2F9E3DC40AC
HistoryFeb 14, 2024 - 12:47 p.m.

Exploit for PHP External Variable Modification in Juniper Junos

2024-02-1412:47:21
142
juniper networks junos os
j-web
remote modification
phprc variable
potential code injection
vulnerability
python
requests library
installation
ip addresses
concurrent exploitation

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

7.6 High

AI Score

Confidence

Low

0.966 High

EPSS

Percentile

99.6%

CVE-2023-36845

This script provides an automated Proof of C…

This is an article that belongs to githubexploit private collection.
Please sign in to get more Information.

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

7.6 High

AI Score

Confidence

Low

0.966 High

EPSS

Percentile

99.6%