Rewterz penetration testing services help organizations determine if a cyber attacker can gain access to their critical assets while giving them detailed insights of the overall business impact of a cyber attack.
Before Rewterz got its start, the market was in dire need of a specialized and dedicated information security company. It was nearly impossible for businesses to find a trustworthy provider that could truly cover all of their bases. We wanted to meet this need, giving companies across the globe a chance to get ahead while knowing that their data is in good hands.
Rewterz penetration testing services help organizations determine if a cyber attacker can gain access to their critical assets while giving them detailed insights of the overall business impact of a cyber attack.
Before Rewterz got its start, the market was in dire need of a specialized and dedicated information security company. It was nearly impossible for businesses to find a trustworthy provider that could truly cover all of their bases. We wanted to meet this need, giving companies across the globe a chance to get ahead while knowing that their data is in good hands.
Medium
CVE-2023-36847 CVSS:5.3
Juniper Networks Junos OS on EX Series could allow a remote attacker to upload arbitrary files, caused by the improper validation of file extensions. By sending a specially crafted HTTP request, a remote attacker could exploit this vulnerability to upload a malicious file, which could allow the attacker to execute arbitrary code on the vulnerable system.
CVE-2023-36846 CVSS:5.3
Juniper Networks Junos OS on SRX Series could allow a remote attacker to upload arbitrary files, caused by the improper validation of file extensions. By sending a specially crafted HTTP request, a remote attacker could exploit this vulnerability to upload a malicious file, which could allow the attacker to execute arbitrary code on the vulnerable system.
CVE-2023-36845 CVSS:5.3
Juniper Networks Junos OS on EX Series and SRX Series could allow a remote attacker to bypass security restrictions, caused by a PHP external variable modification flaw in J-Web. By sending a specially crafted request, an attacker could exploit this vulnerability to modify certain PHP environments variables.
CVE-2023-36844 CVSS:5.3
Juniper Networks Junos OS on EX Series could allow a remote attacker to bypass security restrictions, caused by a PHP external variable modification flaw in J-Web. By sending a specially crafted request, an attacker could exploit this vulnerability to modify certain PHP environments variables.
Juniper
Refer to Juniper Networks Security Bulletin for patch, upgrade or suggested workaround information.