CVE-2018-0001
10.01.2018, 22:29
A remote, unauthenticated attacker may be able to execute code by exploiting a use-after-free defect found in older versions of PHP through injection of crafted data via specific PHP URLs within the context of the J-Web process. Affected releases are Juniper Networks Junos OS: 12.1X46 versions prior to 12.1X46-D67; 12.3 versions prior to 12.3R12-S5; 12.3X48 versions prior to 12.3X48-D35; 14.1 versions prior to 14.1R8-S5, 14.1R9; 14.1X53 versions prior to 14.1X53-D44, 14.1X53-D50; 14.2 versions prior to 14.2R7-S7, 14.2R8; 15.1 versions prior to 15.1R3; 15.1X49 versions prior to 15.1X49-D30; 15.1X53 versions prior to 15.1X53-D70.Enginsight
Vendor | Product | Version |
---|---|---|
juniper | junos | 12.1x46:x46 |
juniper | junos | 12.1x46:x46 |
juniper | junos | 12.1x46:x46 |
juniper | junos | 12.1x46:x46 |
juniper | junos | 12.1x46:x46 |
juniper | junos | 12.1x46:x46 |
juniper | junos | 12.1x46:x46 |
juniper | junos | 12.1x46:x46 |
juniper | junos | 12.1x46:x46 |
juniper | junos | 12.1x46:x46 |
juniper | junos | 12.1x46:x46 |
juniper | junos | 12.1x46:x46 |
juniper | junos | 12.3x48:x48 |
juniper | junos | 12.3x48:x48 |
juniper | junos | 12.3x48:x48 |
juniper | junos | 12.3x48:x48 |
juniper | junos | 12.3x48:x48 |
juniper | junos | 15.1x49:x49 |
juniper | junos | 15.1x49:x49 |
juniper | junos | 15.1x49:x49 |
juniper | junos | 15.1x53:x53 |
juniper | junos | 15.1x53:x53 |
juniper | junos | 15.1x53:x53 |
juniper | junos | 15.1x53:x53 |
juniper | junos | 15.1x53:x53 |
juniper | junos | 15.1x53:x53 |
juniper | junos | 15.1x53:x53 |
juniper | junos | 15.1x53:x53 |
juniper | junos | 15.1x53:x53 |
juniper | junos | 15.1x53:x53 |
juniper | junos | 15.1x53:x53 |
juniper | junos | 14.1 |
juniper | junos | 14.1:r1 |
juniper | junos | 14.1:r2 |
juniper | junos | 14.1:r3 |
juniper | junos | 14.1:r4 |
juniper | junos | 14.1:r8 |
juniper | junos | 14.1:r9 |
juniper | junos | 14.2:r1 |
juniper | junos | 14.2:r2 |
juniper | junos | 14.2:r3 |
juniper | junos | 14.2:r4 |
juniper | junos | 14.2:r5 |
juniper | junos | 14.2:r7 |
juniper | junos | 14.2:r8 |
juniper | junos | 15.1:r1 |
juniper | junos | 15.1:r2 |
juniper | junos | 12.3 |
juniper | junos | 12.3:r1 |
juniper | junos | 12.3:r10 |
juniper | junos | 12.3:r2 |
juniper | junos | 12.3:r3 |
juniper | junos | 12.3:r4 |
juniper | junos | 12.3:r5 |
juniper | junos | 12.3:r6 |
juniper | junos | 12.3:r7 |
juniper | junos | 12.3:r8 |
juniper | junos | 12.3:r9 |
juniper | junos | 14.1x53:x53 |
juniper | junos | 14.1x53:x53 |
juniper | junos | 14.1x53:x53 |
juniper | junos | 14.1x53:x53 |
juniper | junos | 14.1x53:x53 |
juniper | junos | 14.1x53:x53 |
juniper | junos | 14.1x53:x53 |
juniper | junos | 14.1x53:x53 |
juniper | junos | 14.1x53:x53 |
𝑥
= Vulnerable software versions
Common Weakness Enumeration