Логотип exploitDog
bind:CVE-2023-28966
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2023-28966

Количество 3

Количество 3

nvd логотип

CVE-2023-28966

почти 3 года назад

An Incorrect Default Permissions vulnerability in Juniper Networks Junos OS Evolved allows a low-privileged local attacker with shell access to modify existing files or execute commands as root. The issue is caused by improper file and directory permissions on certain system files, allowing an attacker with access to these files and folders to inject CLI commands as root. This issue affects Juniper Networks Junos OS Evolved: All versions prior to 20.4R3-S5-EVO; 21.2 versions prior to 21.2R3-EVO; 21.3 versions prior to 21.3R2-EVO.

CVSS3: 7.8
EPSS: Низкий
github логотип

GHSA-j4j5-7fvq-m4rf

почти 3 года назад

An Incorrect Default Permissions vulnerability in Juniper Networks Junos OS Evolved allows a low-privileged local attacker with shell access to modify existing files or execute commands as root. The issue is caused by improper file and directory permissions on certain system files, allowing an attacker with access to these files and folders to inject CLI commands as root. This issue affects Juniper Networks Junos OS Evolved: All versions prior to 20.4R3-S5-EVO; 21.2 versions prior to 21.2R3-EVO; 21.3 versions prior to 21.3R2-EVO.

CVSS3: 7.8
EPSS: Низкий
fstec логотип

BDU:2023-03031

почти 3 года назад

Уязвимость операционной системы Juniper Networks Junos OS Evolved, связанная с недостатком механизма стандартных разрешений, позволяющая нарушителю изменять существующие файлы или выполнять произвольные команды от имени пользователя

CVSS3: 7.8
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2023-28966

An Incorrect Default Permissions vulnerability in Juniper Networks Junos OS Evolved allows a low-privileged local attacker with shell access to modify existing files or execute commands as root. The issue is caused by improper file and directory permissions on certain system files, allowing an attacker with access to these files and folders to inject CLI commands as root. This issue affects Juniper Networks Junos OS Evolved: All versions prior to 20.4R3-S5-EVO; 21.2 versions prior to 21.2R3-EVO; 21.3 versions prior to 21.3R2-EVO.

CVSS3: 7.8
0%
Низкий
почти 3 года назад
github логотип
GHSA-j4j5-7fvq-m4rf

An Incorrect Default Permissions vulnerability in Juniper Networks Junos OS Evolved allows a low-privileged local attacker with shell access to modify existing files or execute commands as root. The issue is caused by improper file and directory permissions on certain system files, allowing an attacker with access to these files and folders to inject CLI commands as root. This issue affects Juniper Networks Junos OS Evolved: All versions prior to 20.4R3-S5-EVO; 21.2 versions prior to 21.2R3-EVO; 21.3 versions prior to 21.3R2-EVO.

CVSS3: 7.8
0%
Низкий
почти 3 года назад
fstec логотип
BDU:2023-03031

Уязвимость операционной системы Juniper Networks Junos OS Evolved, связанная с недостатком механизма стандартных разрешений, позволяющая нарушителю изменять существующие файлы или выполнять произвольные команды от имени пользователя

CVSS3: 7.8
0%
Низкий
почти 3 года назад

Уязвимостей на страницу