Analysis and contextual insights are available on OpenCVE Cloud.
Vendor Workaround
There are no viable workarounds for this issue. It is good security practice to limit the exploitable attack surface of critical infrastructure networking equipment. Use access lists or firewall filters to limit access to the device from trusted, administrative networks or hosts.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2017-2259 | A persistent site scripting vulnerability in Juniper Networks Junos Space allows users who can change certain configuration to implant malicious Javascript or HTML which may be used to steal information or perform actions as other Junos Space users or administrators. Affected releases are Juniper Networks Junos Space all versions prior to 17.1R1. |
No history.
Status: PUBLISHED
Assigner: juniper
Published:
Updated: 2024-09-17T02:26:17.415Z
Reserved: 2017-06-28T00:00:00.000Z
Link: CVE-2017-10612
No data.
Status : Modified
Published: 2017-10-13T17:29:00.643
Modified: 2026-05-13T00:24:29.033
Link: CVE-2017-10612
No data.
OpenCVE Enrichment
No data.
EUVD