Juniper

Junos

720 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.34%
  • Veröffentlicht 15.01.2020 09:15:12
  • Zuletzt bearbeitet 21.11.2024 05:10:57

Insufficient Cross-Site Scripting (XSS) protection in J-Web may potentially allow a remote attacker to inject web script or HTML, hijack the target user's J-Web session and perform administrative actions on the Junos device as the targeted user. This...

  • EPSS 0.55%
  • Veröffentlicht 15.01.2020 09:15:12
  • Zuletzt bearbeitet 21.11.2024 05:10:57

Receipt of a specific MPLS or IPv6 packet on the core facing interface of an MX Series device configured for Broadband Edge (BBE) service may trigger a kernel crash (vmcore), causing the device to reboot. The issue is specific to the processing of pa...

  • EPSS 0.2%
  • Veröffentlicht 15.01.2020 09:15:12
  • Zuletzt bearbeitet 21.11.2024 05:10:57

When a device using Juniper Network's Dynamic Host Configuration Protocol Daemon (JDHCPD) process on Junos OS or Junos OS Evolved which is configured in relay mode it vulnerable to an attacker sending crafted IPv6 packets who may then arbitrarily exe...

  • EPSS 0.22%
  • Veröffentlicht 15.01.2020 09:15:11
  • Zuletzt bearbeitet 21.11.2024 05:10:55

In a Point-to-Multipoint (P2MP) Label Switched Path (LSP) scenario, an uncontrolled resource consumption vulnerability in the Routing Protocol Daemon (RPD) in Juniper Networks Junos OS allows a specific SNMP request to trigger an infinite loop causin...

  • EPSS 0.41%
  • Veröffentlicht 15.01.2020 09:15:11
  • Zuletzt bearbeitet 21.11.2024 05:10:56

Certain types of malformed Path Computation Element Protocol (PCEP) packets when received and processed by a Juniper Networks Junos OS device serving as a Path Computation Client (PCC) in a PCEP environment using Juniper's path computational element ...

  • EPSS 0.03%
  • Veröffentlicht 09.10.2019 20:15:18
  • Zuletzt bearbeitet 21.11.2024 04:16:11

An Improper Input Validation weakness allows a malicious local attacker to elevate their permissions to take control of other portions of the NFX platform they should not be able to access, and execute commands outside their authorized scope of contr...

  • EPSS 0.01%
  • Veröffentlicht 09.10.2019 20:15:18
  • Zuletzt bearbeitet 21.11.2024 04:16:11

Veriexec is a kernel-based file integrity subsystem in Junos OS that ensures only authorized binaries are able to be executed. Due to a flaw in specific versions of Junos OS, affecting specific EX Series platforms, the Veriexec subsystem will fail to...

  • EPSS 0.03%
  • Veröffentlicht 09.10.2019 20:15:18
  • Zuletzt bearbeitet 21.11.2024 04:16:11

The PKI keys exported using the command "run request security pki key-pair export" on Junos OS may have insecure file permissions. This may allow another user on the Junos OS device with shell access to read them. This issue affects: Juniper Networks...

  • EPSS 0.04%
  • Veröffentlicht 09.10.2019 20:15:18
  • Zuletzt bearbeitet 21.11.2024 04:16:11

A path traversal vulnerability in NFX150 Series and QFX10K Series, EX9200 Series, MX Series and PTX Series devices with Next-Generation Routing Engine (NG-RE) allows a local authenticated user to read sensitive system files. This issue only affects N...

  • EPSS 0.39%
  • Veröffentlicht 09.10.2019 20:15:18
  • Zuletzt bearbeitet 21.11.2024 04:16:12

A vulnerability in the srxpfe process on Protocol Independent Multicast (PIM) enabled SRX series devices may lead to crash of the srxpfe process and an FPC reboot while processing (PIM) messages. Sustained receipt of these packets may lead to an exte...