CVE-2020-1645
- EPSS 0.27%
- Veröffentlicht 17.07.2020 19:15:12
- Zuletzt bearbeitet 21.11.2024 05:11:04
When DNS filtering is enabled on Juniper Networks Junos MX Series with one of the following cards MS-PIC, MS-MIC or MS-MPC, an incoming stream of packets processed by the Multiservices PIC Management Daemon (mspmand) process, responsible for managing...
CVE-2020-7656
- EPSS 1.11%
- Veröffentlicht 19.05.2020 21:15:10
- Zuletzt bearbeitet 21.11.2024 05:37:33
jquery prior to 1.9.0 allows Cross-site Scripting attacks via the load method. The load method fails to recognize and remove "<script>" HTML tags that contain a whitespace character, i.e: "</script >", which results in the enclosed script logic to be...
CVE-2020-1631
- EPSS 5.64%
- Veröffentlicht 04.05.2020 10:15:10
- Zuletzt bearbeitet 18.02.2025 14:59:06
A vulnerability in the HTTP/HTTPS service used by J-Web, Web Authentication, Dynamic-VPN (DVPN), Firewall Authentication Pass-Through with Web-Redirect, and Zero Touch Provisioning (ZTP) allows an unauthenticated attacker to perform local file inclus...
CVE-2020-1632
- EPSS 0.55%
- Veröffentlicht 15.04.2020 21:15:35
- Zuletzt bearbeitet 21.11.2024 05:11:02
In a certain condition, receipt of a specific BGP UPDATE message might cause Juniper Networks Junos OS and Junos OS Evolved devices to advertise an invalid BGP UPDATE message to other peers, causing the other peers to terminate the established BGP se...
CVE-2020-1633
- EPSS 0.11%
- Veröffentlicht 09.04.2020 23:15:12
- Zuletzt bearbeitet 21.11.2024 05:11:02
Due to a new NDP proxy feature for EVPN leaf nodes introduced in Junos OS 17.4, crafted NDPv6 packets could transit a Junos device configured as a Broadband Network Gateway (BNG) and reach the EVPN leaf node, causing a stale MAC address entry. This c...
CVE-2020-1627
- EPSS 0.39%
- Veröffentlicht 08.04.2020 20:15:14
- Zuletzt bearbeitet 21.11.2024 05:11:01
A vulnerability in Juniper Networks Junos OS on vMX and MX150 devices may allow an attacker to cause a Denial of Service (DoS) by sending specific packets requiring special processing in microcode that the flow cache can't handle, causing the riot fo...
CVE-2020-1628
- EPSS 0.38%
- Veröffentlicht 08.04.2020 20:15:14
- Zuletzt bearbeitet 21.11.2024 05:11:01
Juniper Networks Junos OS uses the 128.0.0.0/2 subnet for internal communications between the RE and PFEs. It was discovered that packets utilizing these IP addresses may egress an EX4300 switch, leaking configuration information such as heartbeats, ...
CVE-2020-1629
- EPSS 0.31%
- Veröffentlicht 08.04.2020 20:15:14
- Zuletzt bearbeitet 21.11.2024 05:11:02
A race condition vulnerability on Juniper Network Junos OS devices may cause the routing protocol daemon (RPD) process to crash and restart while processing a BGP NOTIFICATION message. This issue affects Juniper Networks Junos OS: 16.1 versions prior...
CVE-2020-1630
- EPSS 0.03%
- Veröffentlicht 08.04.2020 20:15:14
- Zuletzt bearbeitet 21.11.2024 05:11:02
A privilege escalation vulnerability in Juniper Networks Junos OS devices configured with dual Routing Engines (RE), Virtual Chassis (VC) or high-availability cluster may allow a local authenticated low-privileged user with access to the shell to per...
CVE-2020-1634
- EPSS 0.54%
- Veröffentlicht 08.04.2020 20:15:14
- Zuletzt bearbeitet 21.11.2024 05:11:02
On High-End SRX Series devices, in specific configurations and when specific networking events or operator actions occur, an SPC receiving genuine multicast traffic may core. Subsequently, all FPCs in a chassis may reset causing a Denial of Service. ...