Juniper

Junos

720 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.06%
  • Veröffentlicht 11.07.2025 15:11:24
  • Zuletzt bearbeitet 15.07.2025 13:14:49

An Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') vulnerability in the CLI of Juniper Networks Junos OS and Junos OS Evolved allows a high privileged, local attacker to escalated their privileges to root. ...

  • EPSS 0.04%
  • Veröffentlicht 11.07.2025 15:11:04
  • Zuletzt bearbeitet 15.07.2025 13:14:49

An Incorrect Authorization vulnerability in the web server of Juniper Networks Junos OS on SRX Series allows an unauthenticated, network-based attacker to reach the Juniper Web Device Manager (J-Web). When Juniper Secure connect (JSC) is enabled...

  • EPSS 0.02%
  • Veröffentlicht 11.07.2025 15:10:47
  • Zuletzt bearbeitet 15.07.2025 13:14:49

An Improper Neutralization of Delimiters vulnerability in the UI of Juniper Networks Junos OS and Junos OS Evolved allows a local, authenticated attacker with high privileges to modify the system configuration. A user with limited configuration an...

  • EPSS 0.02%
  • Veröffentlicht 11.07.2025 15:10:20
  • Zuletzt bearbeitet 15.07.2025 13:14:49

A Missing Release of Memory after Effective Lifetime vulnerability in the routing protocol daemon (rpd) of Juniper Networks Junos OS and Junos OS Evolved allows a local, low privileged user to cause an impact to the availability of the device. When ...

  • EPSS 0.06%
  • Veröffentlicht 11.07.2025 15:09:37
  • Zuletzt bearbeitet 15.07.2025 13:14:49

A NULL Pointer Dereference vulnerability in the routing protocol daemon (rpd) of Juniper Networks Junos OS and Junos OS Evolved allows an unauthenticated, network-based attacker to cause impact to the availability of the device. When static route po...

  • EPSS 0.12%
  • Veröffentlicht 11.07.2025 15:09:18
  • Zuletzt bearbeitet 15.07.2025 13:14:49

A UI Discrepancy for Security Feature vulnerability in the UI of Juniper Networks Junos OS on VM Host systems allows a network-based, unauthenticated attacker to access the device. On VM Host Routing Engines (RE), even if the configured public ke...

  • EPSS 0.06%
  • Veröffentlicht 11.07.2025 15:08:53
  • Zuletzt bearbeitet 15.07.2025 13:14:49

An Improper Resource Shutdown or Release vulnerability in the SIP ALG of Juniper Networks Junos OS on MX Series with MS-MPC allows an unauthenticated, network-based attacker to cause a Denial-of-Service (DoS). When an MX Series device with an MS-MPC...

  • EPSS 0.06%
  • Veröffentlicht 11.07.2025 15:08:33
  • Zuletzt bearbeitet 15.07.2025 13:14:49

An Improper Check for Unusual or Exceptional Conditions vulnerability in the flow processing daemon (flowd) of Juniper Networks Junos OS on SRX1600, SRX2300, SRX 4000 Series, and SRX5000 Series with SPC3 allows an unauthenticated, network...

  • EPSS 0.06%
  • Veröffentlicht 11.07.2025 15:08:15
  • Zuletzt bearbeitet 15.07.2025 13:14:49

A Use of Incorrect Byte Ordering vulnerability in the Routing Protocol Daemon (rpd) of Juniper Networks Junos OS on SRX300 Series allows an unauthenticated, network-based attacker to cause a Denial-of-Service (DoS). When a BGP update is receiv...

  • EPSS 0.02%
  • Veröffentlicht 11.07.2025 15:06:49
  • Zuletzt bearbeitet 15.07.2025 13:14:49

A Reachable Assertion vulnerability in the Routing Protocol Daemon (rpd) of Juniper Networks Junos OS and Junos OS Evolved allows an unauthenticated, network-based attacker to cause a Denial of Service (DoS). When the device receives a specific BGP ...