Juniper signatures

Subscribe to Juniper signatures hírcsatorna Juniper signatures
Juniper RSS Feed
Frissítve: 1 óra 39 perc
2019. április 9.

Signature Update #3160

Signature Update #3160

22 new signatures:

HIGH HTTP:STC:EDGE:CVE-2019-0806-MCHTTP: Microsoft Edge Chakra Scripting Engine CVE-2019-0806 Memory CorruptionHIGH HTTP:STC:EDGE:CVE-2019-0861-MCHTTP: Microsoft Scripting Engine CVE-2019-0861 Memory CorruptionHIGH HTTP:STC:IE:CVE-2019-0801-RCEHTTP: Microsoft Office CVE-2019-0801 Remote Code ExecutionHIGH HTTP:STC:IE:CVE-2019-0862-RCEHTTP: Microsoft Windows VBScript Engine CVE-2019-0862 Remote Code ExecutionHIGH HTTP:STC:DL:CVE-2019-0685-EOPHTTP: Microsoft Win32k CVE-2019-0685 Elevation of PrivilegeMEDIUM HTTP:STC:IE:CVE-2019-0840-IDHTTP: Windows Kernel CVE-2019-0840 Information DisclosureHIGH HTTP:STC:DL:CVE-2019-0822-RCEHTTP: Microsoft Office Powerpoint CVE-2019-0822 Remote Code ExecutionHIGH HTTP:DOT-CMS-SHELL-RCEHTTP: dotCMS CVE-2017-11466 Remote Code ExecutionMEDIUM HTTP:INFO:LG-IPCAM-IDHTTP: Smart IP Camera Download Log FilesMEDIUM HTTP:MISC:GREENCMS-IDHTTP: GreenCMS Information DisclosureMEDIUM APP:MISC:CYBERARK-PWVAULT-IDAPP: CyberArk Password Vault Memory DisclosureMEDIUM HTTP:INFO-LEAK:CVE-2019-0844-IDHTTP: Windows Kernel CVE-2019-0844 Information DisclosureHIGH HTTP:STC:EDGE:CVE-2019-0812-MCHTTP: Microsoft Edge Chakra Scripting Engine CVE-2019-0812 Memory CorruptionHIGH HTTP:STC:CVE-2019-0859-PRIV-ELEHTTP: Microsoft Windows win32k Driver CVE-2019-0859 Elevation of privilegeHIGH HTTP:STC:CVE-2019-0803-PRIV-ELEHTTP: Microsoft Windows GDI CVE-2019-0803 Elevation of privilegesHIGH HTTP:STC:CVE-2019-0814-IDHTTP: Microsoft Windows Win32k Driver CVE-2019-0814 Information DisclosureHIGH HTTP:STC:IE:CVE-2019-0794-IN-OVHTTP: Microsoft Internet Explorer CVE-2019-0794 Integer OverflowHIGH HTTP:STC:CVE-2019-0752-CEHTTP: Microsoft Scripting Engine CVE-2019-0752 Remote Code ExecutionHIGH HTTP:STC:IE:CVE-2019-0810-MCHTTP: Chakra Scripting Engine CVE-2019-0810 Memory CorruptionHIGH HTTP:STC:IE:CVE-2019-0753-MCHTTP: Scripting Engine CVE-2019-0753 Memory CorruptionHIGH HTTP:STC:IE:CVE-2019-0860-MCHTTP: Microsoft Chakra Scripting Engine CVE-2019-0860 Memory CorruptionHIGH HTTP:STC:IE:CVE-2019-0829-MCHTTP: Chakra Scripting Engine CVE-2019-0829 Memory Corruption

1 deleted signature:

MEDIUMHTTP:STC:DL:MSDOTNET-FUNC-PTR1 HTTP: Microsoft .NET Framework Improper Execution of Function Pointer1

1 updated signature.

Copyright © 1996-2019 Juniper Networks, Inc.     All rights reserved                                                                                      Update preferences

                   
2019. április 8.

Cloud-Delivered Branch - Simplicity Now Surpasses SD-WAN

Cloud-Delivered Branch - Simplicity Now Surpasses SD-WAN

Juniper Networks’ new SD-WAN as-a-service solution joins the company’s expanding portfolio of cloud-delivered networking products while simultaneously overtaking rival SD-WAN solutions by including branch universal CPE, LAN and Wi-Fi.

Copyright © 1996-2019 Juniper Networks, Inc.     All rights reserved                                                                                      Update preferences

                   
2019. április 4.

Signature Update #3159

Signature Update #3159

4 new signatures:

MEDIUM HTTP:DIR:DOTNETNUKE-DNNA-DIRHTTP: DotNetNuke DNNarticle Module Directory TraversalMEDIUM HTTP:PHP:COBUB-RAZOR-IDHTTP: Cobub Razor Physical path LeakageHIGH HTTP:STC:IE:USERDATA-MCHTTP: Internet Explorer UserData setAttribute Remote Code ExecutionMEDIUM HTTP:DOS:MOXA-MXVIEW-DOSHTTP: Moxa MXview Denial of Service

6 deleted signatures:

HIGHHTTP:STC:DL:SWF-ACTIONPUSH1 HTTP: Adobe Flash Player ActionScript ActionPush Memory Corruption 1HIGHHTTP:STC:MOZILLA:FF-ADDR-SPOOF1 HTTP: Mozilla Firefox Address Bar URI Spoofing 1HIGHHTTP:STC:CLSID:ACTIVEX:NESSCAN1 HTTP: Nessus Vulnerability Scanner 3.0.6 ActiveX Vulnerability1HIGHHTTP:MUL-EK-SILVERLIGHT-DL HTTP: Multiple Exploit Kit Silverlight Exploit DownloadHIGHHTTP:INFO-LEAK:WFCHAT10 HTTP: WFChat Information Disclosure10HIGHHTTP:ORACLE:SOAP-ACCESS1 HTTP: Oracle Application Server SOAP Access1

6 updated signatures.

Copyright © 1996-2019 Juniper Networks, Inc.     All rights reserved                                                                                      Update preferences

                   
2019. április 4.

Smart Ambulance Demo at MWC Showcases Critical 5G / SD-WAN Use Case

Smart Ambulance Demo at MWC Showcases Critical 5G / SD-WAN Use Case

In a medical emergency, every second counts. The more paramedics can do on the scene, the better it is for the patient. A more stable patient also means less need to race through traffic or for emergency handovers at the hospital, all of which impact the chance of a successful outcome.

Copyright © 1996-2019 Juniper Networks, Inc.     All rights reserved                                                                                      Update preferences

                   
2019. április 2.

Signature Update #3158

Signature Update #3158

6 new signatures:

MEDIUM HTTP:INFO:SYNOLOGY-DSM-IDHTTP: Synology DiskStation Manager User EnumerationMEDIUM HTTP:INFO:LEXMARK-SNF-IDHTTP: Lexmark Scan To Network Information DisclosureINFO HTTP:TUNNEL:PSIPHON-HANDSHAKEHTTP: PSIPHON Tunneling Application HandshakeHIGH HTTP:MISC:DATALUST-BYPASSHTTP: Datalust Seq CVE-2018-8096 Authentication BypassINFO HTTP:TUNNEL:PSIPHON-TUNNEL-1HTTP: Psiphon Tunneling ToolMEDIUM HTTP:FIBERHOME-ADSL-AN-IARHTTP: FiberHome ADSL AN1020-25 Improper Access Restrictions

2 updated signatures.

Copyright © 1996-2019 Juniper Networks, Inc.     All rights reserved                                                                                      Update preferences

                   
2019. április 2.

Juniper Networks Completes Agreement to Acquire Mist Systems to Serve Enterprises End-to-End

Juniper Networks Completes Agreement to Acquire Mist Systems to Serve Enterprises End-to-End

I am thrilled to announce that Juniper Networks’ acquisition of Mist Systems is now complete! Mist has a highly differentiated wireless solution that will strengthen and complement Juniper’s existing software-defined enterprise portfolio.

Copyright © 1996-2019 Juniper Networks, Inc.     All rights reserved                                                                                      Update preferences

                   
2019. március 28.

Signature Update #3157

Signature Update #3157

10 new signatures:

MEDIUM HTTP:MISC:ASUS-DSL-PWRESETHTTP: ASUS DSL Router Change Administrator PasswordMEDIUM HTTP:INFO:SAP-SOLMAN-IDHTTP: SAP Solman Information DisclosureMEDIUM HTTP:INFO:GEUTEBRUECK-RE-IDHTTP: Geutebrueck re_porter Credential DisclosureMEDIUM HTTP:INFO:CIRCARLIFE-SCADA-IDHTTP: CirCarLife SCADA Credential DisclosureHIGH HTTP:MISC:CLAYDIP-AIRBNB-CLONEHTTP: Claydip Airbnb Clone CVE-2017-14704 File Upload/DownloadMEDIUM HTTP:INFO-LEAK:OTRS-INSTALLHTTP: OTRS Information DisclosureMEDIUM HTTP:MISC:PUPPET-WEB-OPENRDRHTTP: Puppet Enterprise Open RedirectionHIGH HTTP:SQL:INJ:REST-BILLR-SQL-INJHTTP: Restaurant biller SQL InjectionMEDIUM HTTP:MISC:SITEFINITY-RET-ORDRHTTP: Progress Sitefinity ReturnUrl Open RedirectMEDIUM DOS:APPLICATION:DISKBOSS-EN-DOSDOS: DiskBoss Enterprise Denial of Service

6 updated signatures.

Copyright © 1996-2019 Juniper Networks, Inc.     All rights reserved                                                                                      Update preferences

                   
2019. március 27.

Signature Update #3156

Signature Update #3156

7 new signatures:

HIGH HTTP:SQL:INJ:VANGUARD-SQL-INJHTTP: Vanguard 1.4 CVE-2017-17873 SQL InjectionHIGH APP:MISC:CLOUDME-RCEAPP: CloudMe CVE-2018-6892 Remote Code ExecutionHIGH HTTP:MISC:ASUSTOR-ADM-CEHTTP: ASUSTOR ADM Remote Command ExecutionHIGH HTTP:SQL:INJ:CACTI-SQL-INJHTTP: Cacti CVE-2015-8604 SQL InjectionHIGH HTTP:STC:ADOBE:CVE-2019-7069-CEHTTP: Adobe CVE-2019-7069 Remote Code ExecutionMEDIUM HTTP:XSS:MYBB-VEDITOR-SVGHTTP: MyBB Visual Editor Video MyCode Cross Site ScriptingHIGH HTTP:STC:ADOBE:CVE-2019-7044-CEHTTP: Adobe Pdf CVE-2019-7044 Remote Code Execution

6 updated signatures.

1 renamed application2 signature.

Copyright © 1996-2019 Juniper Networks, Inc.     All rights reserved                                                                                      Update preferences

                   
2019. március 25.

Move Fast and Be Open With SONiC

Move Fast and Be Open With SONiC

At the Open Compute Project (OCP) Global Summit in San Jose, CA earlier this month Juniper further demonstrated its commitment to open programmability with integrations with Software for Open Networking in the Cloud (SONiC) and Switch Abstraction Interface (SAI) on Juniper single and multi-PFE platforms.

 

Copyright © 1996-2019 Juniper Networks, Inc.     All rights reserved                                                                                      Update preferences

                   
2019. március 21.

Signature Update #3155

Signature Update #3155

8 new signatures:

HIGH HTTP:ORACLE:EBS-OPENRDRHTTP: Oracle E-Business Suite Open RedirectMEDIUM HTTP:INFO-LEAK:CITRIX-CC-IDHTTP: Citrix Command Center Information DisclosureMEDIUM HTTP:DIR:SEGATE-MEDIA-LFIHTTP: Seagate Media Server Path TraversalMEDIUM HTTP:INFO-LEAK:DT-DT80DEX-IDHTTP: DataTaker DT80 dEX Sensitive Configurations ExposureMEDIUM HTTP:INFO-LEAK:PENTAHO-BAPDI-IDHTTP: Pentaho BA Suite PDI Information DisclosureMEDIUM HTTP:INFO:SPLUNK-IDHTTP: Splunk Information DisclosureMEDIUM HTTP:MISC:DELL-EMC-ACCESSHTTP: Dell EMC Avamar and Integrated DPA Installation Manager Information DisclosureMEDIUM HTTP:MISC:FAT-FREE-CRM-CSRFHTTP: Fat Free CRM Cross Site Request Forgery

2 updated signatures.

Copyright © 1996-2019 Juniper Networks, Inc.     All rights reserved                                                                                      Update preferences

                   
2019. március 19.

Signature Update #3154

Signature Update #3154

6 new signatures:

MEDIUM HTTP:PHP:JOOMLA-SIMPLEFILEUPLDHTTP: Joomla mod simplefileupload Arbitrary File UploadHIGH HTTP:BIT-COIN-MININGHTTP: Bit-Coin Cryptocurrency MiningMEDIUM HTTP:DIR:MADDASH-WEBHTTP: MaDDash Multiple Directory Listing VulnerabilitiesHIGH HTTP:MISC:DOCKER-API-CEHTTP:Docker API Remote Code ExecutionMEDIUM HTTP:INFO-LEAK:DLINK-DIR-601-IDHTTP: D-link DIR-601 CVE-2018-5708 Information DisclosureHIGH HTTP:PHP:PRESTA-PSMODHTTP: Prestashop psmodthemeoptionpanel Arbitrary File Upload

1 renamed signature.

Copyright © 1996-2019 Juniper Networks, Inc.     All rights reserved                                                                                      Update preferences

                   
2019. március 18.

Signature Update #3153

Signature Update #3153

There were no updates in this release.

Copyright © 1996-2019 Juniper Networks, Inc.     All rights reserved                                                                                      Update preferences

                   
2019. március 15.

Signature Update #3152

Signature Update #3152

9 new signatures:

HIGH HTTP:STC:ADOBE:CVE-2019-7084-CEHTTP: Adobe Acrobat Reader CVE-2019-7084 Remote Code ExecutionMEDIUM HTTP:STC:ADOBE:CVE-2019-7074-IDHTTP: Adobe Acrobat Reader CVE-2019-7074 Information DisclosureHIGH HTTP:STC:ADOBE:CVE-2019-7076-CEHTTP: Adobe Pdf CVE-2019-7076 Remote Code ExecutionHIGH HTTP:STC:ADOBE:CVE-2019-7072-CEHTTP: Adobe Acrobat Reader CVE-2019-7072 Remote Code ExecutionHIGH HTTP:STC:ADOBE:CVE-2019-7052-CEHTTP: Adobe Pdf CVE-2019-7052 Remote Code ExecutionMEDIUM HTTP:STC:ADOBE:CVE-2019-7021-IDHTTP: Adobe Pdf CVE-2019-7021 Information DisclosureMEDIUM HTTP:STC:ADOBE:CVE-2019-7032-IDHTTP: Adobe Pdf CVE-2019-7032 Information DisclosureHIGH HTTP:STC:ADOBE:CVE-2019-7042N3HTTP: Adobe Reader CVE-2019-7042/3 Remote Code ExecutionMEDIUM HTTP:STC:ADOBE:CVE-2019-7034-IDHTTP: Adobe Pdf CVE-2019-7034 Information Disclosure

2 new protocol anomalies:

MEDIUMHTTP:COMPRESS:ENCODINGHTTP: Compress-EncodingMEDIUMHTTP:INVALID:ENCODINGHTTP: Invalid Encoding Copyright © 1996-2019 Juniper Networks, Inc.     All rights reserved                                                                                      Update preferences

                   
2019. március 14.

Signature Update #3151

Signature Update #3151

32 new signatures:

HIGH HTTP:MISC:SONATYPE-REPO-CMDINJHTTP: Sonatype Nexus Repository Manager CVE-2019-7238 Expression Language InjectionHIGH DNS:BIND-EDNS-DOSDNS: ISC BIND EDNS0 Key-Tag Memory Leak Denial of ServiceHIGH RPC:DCERPC:CVE-2018-18999-BORPC: Advantech WebAccess SCADA BwPAlarm.dll Stack-based Buffer OverflowHIGH HTTP:DIR:WINRAR-ACEHTTP: RARLAB WinRAR ACE Directory TraversalHIGH HTTP:MISC:HPE-IMC-PF-RCEHTTP: HPE Intelligent Management Center Remote Code ExecutionHIGH APP:MISC:CVE-2019-6250-IN-OVERAPP: ZeroMQ libzmq v2_decoder Integer OverflowMEDIUM DNS:PHP-GET-RCRD-OBDNS: PHP dns_get_record Out of Bounds ReadHIGH HTTP:STC:MICROSOFT-GD-IDHTTP: Microsoft Graphics Device Interface CVE-2019-0619 Information DisclosureHIGH HTTP:CVE-2018-15711-PRI-ESCHTTP: Nagios XI API Key Regeneration Privilege EscalationHIGH HTTP:PHP:DRPL-CORE-RCE-LINKHTTP: Drupal Core Web Services Remote Code ExecutionHIGH HTTP:STC:IE:CVE-2018-8174-RCE-1HTTP: Microsoft Internet Explorer CVE-2018-8174 Remote Code Execution 1HIGH VNC:OVERFLOW:CVE-2018-20020-BOVNC: libVNC LibVNCClient CoRRE Heap-based Buffer OverflowHIGH HTTP:STC:IE:CVE-2018-8174-RCE-2HTTP: Microsoft Internet Explorer CVE-2018-8174 Remote Code Execution 2HIGH HTTP:STC:IE:CVE-2018-8174-RCE-3HTTP: Microsoft Internet Explorer CVE-2018-8174 Remote Code Execution 3HIGH HTTP:STC:CVE-2017-5375-RCE-1HTTP: Mozilla Firefox CVE-2017-5375 Remote Code Execution 1HIGH HTTP:STC:IE:CVE-2018-8174-RCE-4HTTP: Microsoft Internet Explorer CVE-2018-8174 Remote Code Execution 4HIGH HTTP:STC:FF-NOTIFY-TM-CHANGE-1HTTP: Mozilla Firefox NotifyTimeChange Use After Free 1HIGH HTTP:STC:FF-NOTIFY-TM-CHANGE-2HTTP: Mozilla Firefox NotifyTimeChange Use After Free 2HIGH HTTP:STC:FF-NOTIFY-TM-CHANGE-3HTTP: Mozilla Firefox NotifyTimeChange Use After Free 3HIGH HTTP:STC:FF-NOTIFY-TM-CHANGE-4HTTP: Mozilla Firefox NotifyTimeChange Use After Free 4HIGH HTTP:STC:FF-NOTIFY-TM-CHANGE-5HTTP: Mozilla Firefox NotifyTimeChange Use After Free 5HIGH APP:MISC:RKWL-RRDATA-OFAPP: Rockwell Automation RSLinx Classic Forward Open Electronic Key Stack Buffer OverflowHIGH HTTP:STC:FF-NOTIFY-TM-CHANGE-6HTTP: Mozilla Firefox NotifyTimeChange Use After Free 6HIGH HTTP:STC:FF-NOTIFY-TM-CHANGE-7HTTP: Mozilla Firefox NotifyTimeChange Use After Free 7HIGH HTTP:STC:FF-NOTIFY-TM-CHANGE-8HTTP: Mozilla Firefox NotifyTimeChange Use After Free 8MEDIUM HTTP:APACHE:CVE-2018-11803-DOSHTTP: Apache Subversion mod_dav_svn Denial of ServiceHIGH SSL:VULN:CVE-2019-5010-DOSSSL: Python SSL X.509 DistributionPoint Extension NULL Pointer DereferenceHIGH HTTP:XSS:CISCO-ISEHTTP: Cisco Identity Services Engine 2.2 Cross Site ScriptingHIGH HTTP:STC:FOXIT-GETPAGE-UAFHTTP: Foxit Reader JavaScript getPageNumWords Use After FreeMEDIUM HTTP:STC:MICROSOFT-GDI-IDHTTP: Microsoft Graphics Device Interface CVE-2019-0602 Information DisclosureHIGH HTTP:MISC:LAQUIS-SCADA-CEHTTP: LAquis SCADA Web Server relatorionome NOME Command InjectionHIGH HTTP:XIPH-CAST-URL-AUTHHTTP: Xiph.org Icecast Server auth_url Stack Buffer Overflow

1 new protocol anomaly:

HIGHFTP:COMMAND:MULTISPACINGFTP: Multi-spacing

7 updated signatures.

2 renamed signatures.

Copyright © 1996-2019 Juniper Networks, Inc.     All rights reserved                                                                                      Update preferences

                   
2019. március 13.

Signature Update #3150

Signature Update #3150

2 new signatures:

HIGH APP:MISC:CVE-2018-7114-BOAPP: HPE Intelligent Management Center dbman decryptMsgAes Stack Buffer OverflowHIGH HTTP:COLDFUSION:ADOBE-COLDF-CEHTTP: Adobe ColdFusion JavaAdapter JavaBeanAdapter Insecure Deserialization Copyright © 1996-2019 Juniper Networks, Inc.     All rights reserved                                                                                      Update preferences

                   
2019. március 12.

Signature Update #3149

Signature Update #3149

21 new signatures:

HIGH APP:MISC:MQTT-CSNTA-RCEAPP: Cesanta Mongoose 6.8 CVE-2017-2894 MQTT Remote Code Execution.MEDIUM APP:BOMB-SCTP-AMP-3APP: SCTP Bombing Attack Amplification 3MEDIUM HTTP:SQL:INJ:JMLA-HATHORHTTP: Joomla CVE-2018-6789 Hathor postinstall messageHIGH HTTP:STC:EDGE:CVE-2019-0592-MCHTTP: Microsoft Edge Chakra Scripting Engine CVE-2019-0592 Memory CorruptionHIGH HTTP:STC:IE:CVE-2019-0609-MCHTTP: Microsoft Scripting Engine CVE-2019-0609 Memory CorruptionHIGH HTTP:STC:IE:CVE-2019-0665-MCHTTP: Microsoft Internet Explorer CVE-2019-0665 Memory CorruptionHIGH IP:MS-IGMP-2007-0069-CEIP: Microsoft Windows Kernel Remote Code ExecutionHIGH HTTP:STC:IE:CVE-2019-0667-MCHTTP: Microsoft Internet Explorer CVE-2019-0667 Memory CorruptionMEDIUM APP:MISC:MQTT-TOPIC-ECLIPSEAPP: Eclipse Mosquitto CVE-2018-12543 Denial of ServiceHIGH HTTP:STC:IE:CVE-2019-0666-MCHTTP: Microsoft Scripting Engine CVE-2019-0666 Memory CorruptionMEDIUM HTTP:MISC:TREND-AUTH-BYPASSHTTP: TRENDnet Routers CVE-2018-7034 Authentication BypassHIGH HTTP:STC:IE:CVE-2019-0763-MCHTTP: Microsoft Internet Explorer CVE-2019-0763 Memory CorruptionHIGH HTTP:STC:EDGE:CVE-2019-0771-RCEHTTP: Microsoft Edge CVE-2019-0771 Remote Code ExecutionMEDIUM HTTP:STC:CVE-2019-0755-IDHTTP: Microsoft Windows Kernel CVE-2019-0755 Information DisclosureHIGH HTTP:STC:EDGE:CVE-2019-0769-MCHTTP: Microsoft Edge CVE-2019-0769 Scripting Engine Memory CorruptionHIGH HTTP:STC:EDGE:CVE-2019-0770-RCEHTTP: Microsoft Edge CVE-2019-0770 Remote Code ExecutionHIGH HTTP:STC:IE:CVE-2019-0680-MCHTTP: Microsoft Internet Explorer CVE-2019-0680 Memory CorruptionHIGH HTTP:APACHE:SOLR-LISTERNER-RCEHTTP: Apache Solr CVE-2017-12629 Remote Code ExecutionHIGH HTTP:STC:IE:CVE-2019-0639-MCHTTP: Microsoft Scripting Engine CVE-2019-0639 Memory CorruptionHIGH DOS:SOFTROS-NET-TM-SYS-11HTTP: Softros Network Time System CVE-2018-7658 Denial of ServiceHIGH HTTP:STC:IE:CVE-2019-0768-SBHTTP: Microsoft Windows IE CVE-2019-0768 Security Bypass

7 updated signatures.

1 renamed signature.

Copyright © 1996-2019 Juniper Networks, Inc.     All rights reserved                                                                                      Update preferences

                   
2019. március 8.

Signature Update #3148

Signature Update #3148

1 updated signature.

Copyright © 1996-2019 Juniper Networks, Inc.     All rights reserved                                                                                      Update preferences

                   
2019. március 7.

Signature Update #3147

Signature Update #3147

11 new signatures:

HIGH HTTP:STC:QNAP-MULTIPLE-RCE-CVEHTTP: QNAP Qcenter Virtual Appliance Multiple CVE's Remote Code ExecutionMEDIUM HTTP:INFO-LEAK:CVE-2017-14942IDHTTP: Roteador Intelbras WRN150 Wireless Routers Information DisclosureHIGH HTTP:MISC:CSRF-EHCPHTTP: Easy Hosting Control Panel CVE-2018-6458 Cross-Site Request ForgeryHIGH HTTP:PHP:FERRET-CMS-FILE-UPLOADHTTP: Ferret CMS CVE-2015-1371 File UploadHIGH HTTP:CTS-TYPE3-CMS-RCEHTTP: Typo3 CMS Phar Insecure Deserialization Remote Code ExecutionMEDIUM HTTP:DOS:CVE-2018-7254-DOSHTTP: Wavpack CVE-2018-7254 Denial of ServiceHIGH HTTP:WORDPRESS-WP-PRIV-ESCHTTP: WordPress WP Membership PluginHIGH HTTP:CVE-2015-2090-SQL-INJHTTP: Wordpress Survey and Poll Plugin CVE-2015-2090 SQL InjectionHIGH HTTP:CTS-HPE-IMC-RCEHTTP: HPE Intelligent Management Center iccSelectCommand Expression Language InjectionHIGH DHCP:RQST:CVE-2019-0626-RCEDHCP: Microsoft Windows DHCP Server Code ExecutionLOW SPYWARE:RAT:TROCHILUSRAT-BCONSPYWARE: TrochilusRAT Malware Binary Beacon Communication

5 updated signatures.

Copyright © 1996-2019 Juniper Networks, Inc.     All rights reserved                                                                                      Update preferences

                   
2019. március 4.

Introducing Simplicity to Workload Diversity and Operational Uniformity

Introducing Simplicity to Workload Diversity and Operational Uniformity

Juniper Networks recently announced it has entered into an agreement to acquire Mist Systems. As Juniper’s CTO, I wanted to provide my thoughts about the technology synergies that underpin this move.

Copyright © 1996-2019 Juniper Networks, Inc.     All rights reserved                                                                                      Update preferences

                   
2019. március 4.

Juniper Networks Announces Intent to Acquire Mist Systems to Bring AI to IT, Delivering on Promise of Software-Defined Enterprise

Juniper Networks Announces Intent to Acquire Mist Systems to Bring AI to IT, Delivering on Promise of Software-Defined Enterprise

Today, we announced the next big step that Juniper Networks is taking in pursuit of a simpler IT experience. With our planned acquisition of Mist Systems, we are not only expanding our enterprise portfolio into the wireless arena, but also staking claim to AI-driven operations in the era of multicloud.

Copyright © 1996-2019 Juniper Networks, Inc.     All rights reserved                                                                                      Update preferences