Juniper

Junos

720 vulnerabilities found.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.44%
  • Published 18.10.2022 03:15:10
  • Last modified 21.11.2024 06:46:28

An Improper Input Validation vulnerability in the J-Web component of Juniper Networks Junos OS may allow an unauthenticated attacker to access data without proper authorization. Utilizing a crafted POST request, deserialization may occur which could ...

  • EPSS 0.21%
  • Published 18.10.2022 03:15:09
  • Last modified 21.11.2024 06:46:22

An Improper Validation of Specified Index, Position, or Offset in Input vulnerability in the Packet Forwarding Engine (PFE) of Juniper Networks Junos OS allows an unauthenticated network-based attacker to cause a Denial of Service (DoS). On SRX5000 S...

  • EPSS 0.19%
  • Published 18.10.2022 03:15:09
  • Last modified 21.11.2024 06:46:23

A Use After Free vulnerability in the Routing Protocol Daemon (rdp) of Juniper Networks Junos OS and Junos OS Evolved allows an unauthenticated network-based attacker to cause Denial of Service (DoS). When a BGP session flap happens, a Use After Free...

  • EPSS 0.3%
  • Published 18.10.2022 03:15:09
  • Last modified 21.11.2024 06:46:25

On SRX Series devices, an Improper Check for Unusual or Exceptional Conditions when using Certificate Management Protocol Version 2 (CMPv2) auto re-enrollment, allows a network-based, unauthenticated attacker to cause a Denial of Service (DoS) by cra...

  • EPSS 0.22%
  • Published 18.10.2022 03:15:09
  • Last modified 21.11.2024 06:46:25

Due to the Improper Handling of an Unexpected Data Type in the processing of EVPN routes on Juniper Networks Junos OS and Junos OS Evolved, an attacker in direct control of a BGP client connected to a route reflector, or via a machine in the middle (...

  • EPSS 0.27%
  • Published 18.10.2022 03:15:09
  • Last modified 21.11.2024 06:46:25

A Time-of-check Time-of-use (TOCTOU) Race Condition vulnerability in Routing Protocol Daemon (rpd) of Juniper Networks Junos OS, Junos OS Evolved allows a network-based unauthenticated attacker to cause a Denial of Service (DoS). When a BGP flow rout...

Exploit
  • EPSS 0.19%
  • Published 18.10.2022 03:15:09
  • Last modified 21.11.2024 06:46:25

On QFX10000 Series devices using Juniper Networks Junos OS when configured as transit IP/MPLS penultimate hop popping (PHP) nodes with link aggregation group (LAG) interfaces, an Improper Validation of Specified Index, Position, or Offset in Input we...

  • EPSS 0.1%
  • Published 18.10.2022 03:15:09
  • Last modified 21.11.2024 06:46:25

An Improper Check or Handling of Exceptional Conditions vulnerability in the processing of a malformed OSPF TLV in Juniper Networks Junos OS and Junos OS Evolved allows an unauthenticated adjacent attacker to cause the periodic packet management daem...

  • EPSS 0.24%
  • Published 18.10.2022 03:15:09
  • Last modified 21.11.2024 06:46:25

A Time-of-check Time-of-use (TOCTOU) Race Condition vulnerability in the Routing Protocol Daemon (rpd) of Juniper Networks Junos OS and Junos OS Evolved allows an unauthenticated attacker with an established BGP session to cause a Denial of Service (...

  • EPSS 0.09%
  • Published 18.10.2022 03:15:09
  • Last modified 21.11.2024 06:46:26

In VxLAN scenarios on EX4300-MP, EX4600, QFX5000 Series devices an Uncontrolled Memory Allocation vulnerability in the Packet Forwarding Engine (PFE) of Juniper Networks Junos OS allows an unauthenticated adjacently located attacker sending specific ...