Juniper

Junos

720 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
Medienbericht
  • EPSS 0.1%
  • Veröffentlicht 09.04.2025 19:56:28
  • Zuletzt bearbeitet 11.04.2025 15:40:10

A Buffer Access with Incorrect Length Value vulnerability in the routing protocol daemon (rpd) of Juniper Networks Junos OS and Junos OS Evolved allows an unauthenticated, network-based attacker to cause a Denial of Service (DoS). When an attacker se...

Medienbericht
  • EPSS 0.11%
  • Veröffentlicht 09.04.2025 19:55:37
  • Zuletzt bearbeitet 11.04.2025 15:40:10

An Improper Input Validation vulnerability in the syslog stream TCP transport of Juniper Networks Junos OS on MX240, MX480 and MX960 devices with MX-SPC3 Security Services Card allows an unauthenticated, network-based attacker, to send specific spoof...

Medienbericht
  • EPSS 0.04%
  • Veröffentlicht 09.04.2025 19:54:41
  • Zuletzt bearbeitet 11.04.2025 15:40:10

An Improper Input Validation vulnerability in the Juniper DHCP Daemon (jdhcpd) of Juniper Networks Junos OS and Junos OS Evolved allows an unauthenticated, adjacent attacker to cause the jdhcpd process to crash resulting in a Denial of Service (DoS)....

Medienbericht
  • EPSS 0.02%
  • Veröffentlicht 09.04.2025 19:53:59
  • Zuletzt bearbeitet 11.04.2025 15:40:10

A Missing Release of Memory after Effective Lifetime vulnerability in the packet forwarding engine (PFE) of Juniper Networks Junos OS on MX Series allows an unauthenticated adjacent attacker to cause a Denial-of-Service (DoS). In a subscriber manage...

Medienbericht
  • EPSS 0.03%
  • Veröffentlicht 09.04.2025 19:53:27
  • Zuletzt bearbeitet 11.04.2025 15:40:10

A Signed to Unsigned Conversion Error vulnerability in the Layer 2 Control Protocol daemon (l2cpd) of Juniper Networks Junos OS and Juniper Networks Junos OS Evolved allows an unauthenticated adjacent attacker sending a specifically malformed LLDP TL...

Medienbericht
  • EPSS 0.1%
  • Veröffentlicht 09.04.2025 19:52:51
  • Zuletzt bearbeitet 11.04.2025 15:40:10

A NULL Pointer Dereference vulnerability in the flow daemon (flowd) of Juniper Networks Junos OS on SRX Series allows an attacker causing specific, valid control traffic to be sent out of a Dual-Stack (DS) Lite tunnel to crash the flowd process, resu...

Medienbericht
  • EPSS 0.04%
  • Veröffentlicht 09.04.2025 19:52:16
  • Zuletzt bearbeitet 11.04.2025 15:40:10

A Heap-based Buffer Overflow vulnerability in the flexible PIC concentrator (FPC) of Juniper Networks Junos OS on EX2300, EX3400, EX4100, EX4300, EX4300MP, EX4400, EX4600, EX4650-48Y, and QFX5k Series allows an attacker to send a specific DHCP packet...

Medienbericht
  • EPSS 0.12%
  • Veröffentlicht 09.04.2025 19:51:36
  • Zuletzt bearbeitet 11.08.2025 15:03:15

An Improper Following of Specification by Caller vulnerability in web management (J-Web, Captive Portal, 802.1X, Juniper Secure Connect (JSC) of Juniper Networks Junos OS on SRX Series, EX Series, MX240, MX480, MX960, QFX5120 Series, allows an unauth...

  • EPSS 0.04%
  • Veröffentlicht 09.04.2025 19:50:57
  • Zuletzt bearbeitet 11.04.2025 15:40:10

An Improper Check for Unusual or Exceptional Conditions vulnerability in routing protocol daemon (rpd) of Juniper Networks Junos OS and Junos OS Evolved allows an unauthenticated, logically adjacent BGP peer to cause Denial of Service (DoS). On all ...

Medienbericht
  • EPSS 0.04%
  • Veröffentlicht 09.04.2025 19:50:28
  • Zuletzt bearbeitet 11.04.2025 15:40:10

A Missing Release of Memory after Effective Lifetime vulnerability in the Packet Forwarding Engine (PFE) of Juniper Networks Junos OS and Junos OS Evolved allows an adjacent, unauthenticated attacker to cause an FPC to crash, leading to Denial of Ser...