CVE-2024-39547
- EPSS 0.05%
- Veröffentlicht 11.10.2024 16:15:07
- Zuletzt bearbeitet 15.10.2024 12:58:51
An Improper Handling of Exceptional Conditions vulnerability in the rpd-server of Juniper Networks Junos OS and Junos OS Evolved within cRPD allows an unauthenticated network-based attacker sending crafted TCP traffic to the routing engine (RE) to ca...
CVE-2024-39526
- EPSS 0.07%
- Veröffentlicht 11.10.2024 16:15:06
- Zuletzt bearbeitet 15.10.2024 12:58:51
An Improper Handling of Exceptional Conditions vulnerability in packet processing of Juniper Networks Junos OS on MX Series with MPC10/MPC11/LC9600 line cards, EX9200 with EX9200-15C lines cards, MX304 devices, and Juniper Networks Junos OS Evolved o...
CVE-2024-39527
- EPSS 0.03%
- Veröffentlicht 11.10.2024 16:15:06
- Zuletzt bearbeitet 15.10.2024 12:58:51
An Exposure of Sensitive Information to an Unauthorized Actor vulnerability in the command-line interface (CLI) of Juniper Networks Junos OS on SRX Series devices allows a local, low-privileged user with access to the Junos CLI to view the contents o...
CVE-2024-39515
- EPSS 0.21%
- Veröffentlicht 09.10.2024 20:15:08
- Zuletzt bearbeitet 10.10.2024 12:51:56
An Improper Validation of Consistency within Input vulnerability in the routing protocol daemon (rpd) of Juniper Networks Junos OS and Junos OS Evolved allows an unauthenticated network-based attacker sending a specifically malformed BGP packet to ca...
CVE-2024-39516
- EPSS 0.21%
- Veröffentlicht 09.10.2024 20:15:08
- Zuletzt bearbeitet 16.10.2024 22:15:02
An Out-of-Bounds Read vulnerability in the routing protocol daemon (rpd) of Juniper Networks Junos OS and Junos OS Evolved allows an unauthenticated network-based attacker sending a specifically malformed BGP packet to cause rpd to crash and rest...
CVE-2024-39525
- EPSS 0.21%
- Veröffentlicht 09.10.2024 20:15:08
- Zuletzt bearbeitet 10.10.2024 12:51:56
An Improper Handling of Exceptional Conditions vulnerability in the routing protocol daemon (rpd) of Juniper Networks Junos OS and Junos OS Evolved allows an unauthenticated network-based attacker sending a specific BGP packet to cause rpd to crash a...
CVE-2024-39552
- EPSS 0.81%
- Veröffentlicht 11.07.2024 17:15:16
- Zuletzt bearbeitet 21.11.2024 09:27:59
An Improper Handling of Exceptional Conditions vulnerability in the routing protocol daemon (RPD) of Juniper Networks Junos OS and Junos OS Evolved allows a network based, unauthenticated attacker to cause the RPD process to crash leading to a Denial...
CVE-2024-39549
- EPSS 0.3%
- Veröffentlicht 11.07.2024 17:15:15
- Zuletzt bearbeitet 21.11.2024 09:27:59
A Missing Release of Memory after Effective Lifetime vulnerability in the routing process daemon (rpd) of Juniper Networks Junos OS and Junos OS Evolved allows an attacker to send a malformed BGP Path attribute update which allocates memory used to l...
CVE-2024-39550
- EPSS 0.15%
- Veröffentlicht 11.07.2024 17:15:15
- Zuletzt bearbeitet 04.09.2025 02:27:09
A Missing Release of Memory after Effective Lifetime vulnerability in the rtlogd process of Juniper Networks Junos OS on MX Series with SPC3 allows an unauthenticated, adjacent attacker to trigger internal events cause ( which can be done by repeated...
CVE-2024-39541
- EPSS 0.06%
- Veröffentlicht 11.07.2024 17:15:13
- Zuletzt bearbeitet 21.11.2024 09:27:58
An Improper Handling of Exceptional Conditions vulnerability in the Routing Protocol Daemon (rpd) of Juniper Networks Junos OS and Junos OS Evolved allows an unauthenticated, adjacent attacker to cause a Denial-of-Service (DoS). When conflicting inf...