{ "schema_version": "1.4.0", "id": "GHSA-j3m7-mwx3-4r7v", "modified": "2022-05-17T04:04:35Z", "published": "2022-05-17T04:04:35Z", "aliases": [ "CVE-2015-7751" ], "details": "Juniper Junos OS before 12.1X44-D50, 12.1X46 before 12.1X46-D35, 12.1X47 before 12.1X47-D25, 12.3 before 12.3R9, 12.3X48 before 12.3X48-D15, 13.2 before 13.2R7, 13.2X51 before 13.2X51-D35, 13.3 before 13.3R6, 14.1 before 14.1R5, 14.1X50 before 14.1X50-D105, 14.1X51 before 14.1X51-D70, 14.1X53 before 14.1X53-D25, 14.1X55 before 14.1X55-D20, 14.2 before 14.2R1, 15.1 before 15.1F2 or 15.1R1, and 15.1X49 before 15.1X49-D10 does not require a password for the root user when pam.conf is \"corrupted,\" which allows local users to gain root privileges by modifying the file.", "severity": [], "affected": [], "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-7751" }, { "type": "WEB", "url": "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10707" }, { "type": "WEB", "url": "http://www.securitytracker.com/id/1033817" } ], "database_specific": { "cwe_ids": [], "severity": "MODERATE", "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2015-10-19T18:59:00Z" } }