Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2015-7751

EPSS 0.04% · P13
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2015-7751

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Description
Juniper Junos OS before 12.1X44-D50, 12.1X46 before 12.1X46-D35, 12.1X47 before 12.1X47-D25, 12.3 before 12.3R9, 12.3X48 before 12.3X48-D15, 13.2 before 13.2R7, 13.2X51 before 13.2X51-D35, 13.3 before 13.3R6, 14.1 before 14.1R5, 14.1X50 before 14.1X50-D105, 14.1X51 before 14.1X51-D70, 14.1X53 before 14.1X53-D25, 14.1X55 before 14.1X55-D20, 14.2 before 14.2R1, 15.1 before 15.1F2 or 15.1R1, and 15.1X49 before 15.1X49-D10 does not require a password for the root user when pam.conf is "corrupted," which allows local users to gain root privileges by modifying the file.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Title
Juniper Networks Junos OS 安全漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Juniper Junos OS是美国瞻博网络(Juniper Networks)公司的一套专用于该公司的硬件系统的网络操作系统。该操作系统提供了安全编程接口和Junos SDK。 Juniper Networks Junos OS中存在安全漏洞,该漏洞源于pam.conf文件损坏时,程序没有要求root用户的密码。本地攻击者可通过修改文件利用该漏洞获取root权限。以下版本受到影响:Juniper Networks Junos OS 12.1X44-D50之前版本,12.1X46-D35之前12.1X4
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
-n/a n/a -

II. Public POCs for CVE-2015-7751

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2015-7751

Please Login to view more intelligence information

Same Patch Batch · n/a · 2015-10-19 · 18 CVEs total

CVE-2015-0275Linux kernel‘fs/ext4/extents.c’代码注入漏洞
CVE-2015-7833Red Hat Enterprise Linux kernel usbvision驱动程序拒绝服务漏洞
CVE-2015-7799Linux kernel 拒绝服务漏洞
CVE-2015-7613Linux kernel IPC对象实现竞争条件漏洞
CVE-2015-6937Linux kernel 拒绝服务漏洞
CVE-2015-6252Linux kernel 资源管理错误漏洞
CVE-2015-5707Linux kernel‘/scsi/sg.c’数字错误漏洞
CVE-2015-5283Linux kernel 缓冲区错误漏洞
CVE-2015-5156Linux kernel 缓冲区错误漏洞
CVE-2015-7748Juniper Networks Trio Chipset 拒绝服务漏洞
CVE-2015-7863Persistent Systems Accelerite Radia Client Automation 安全漏洞
CVE-2015-7862Persistent Systems Accelerite Radia Client Automation 安全漏洞
CVE-2015-7861Persistent Systems Accelerite Radia Client Automation 权限许可和访问控制漏洞
CVE-2015-7860Persistent Systems Accelerite Radia Client Automation 基于栈的缓冲区溢出漏洞
CVE-2015-7752Juniper Networks Junos OS SSH服务器资源管理错误漏洞
CVE-2015-7750Juniper Networks Netscreen and ScreenOS Firewall 拒绝服务漏洞
CVE-2015-7749Juniper Networks vSRX virtual防火墙拒绝服务漏洞

IV. Related Vulnerabilities

V. Comments for CVE-2015-7751

No comments yet


Leave a comment