CVE-2021-31363
- EPSS 0.08%
- Published 19.10.2021 19:15:09
- Last modified 21.11.2024 06:05:30
In an MPLS P2MP environment a Loop with Unreachable Exit Condition vulnerability in the routing protocol daemon (RPD) of Juniper Networks Junos OS and Junos OS Evolved allows an unauthenticated adjacent attacker to cause high load on RPD which in tur...
CVE-2021-31364
- EPSS 0.22%
- Published 19.10.2021 19:15:09
- Last modified 21.11.2024 06:05:30
An Improper Check for Unusual or Exceptional Conditions vulnerability combined with a Race Condition in the flow daemon (flowd) of Juniper Networks Junos OS on SRX300 Series, SRX500 Series, SRX1500, and SRX5000 Series with SPC2 allows an unauthentica...
CVE-2021-31365
- EPSS 0.08%
- Published 19.10.2021 19:15:09
- Last modified 21.11.2024 06:05:31
An Uncontrolled Resource Consumption vulnerability in Juniper Networks Junos OS on EX2300, EX3400 and EX4300 Series platforms allows an adjacent attacker sending a stream of layer 2 frames will trigger an Aggregated Ethernet (AE) interface to go down...
CVE-2021-31366
- EPSS 0.23%
- Published 19.10.2021 19:15:09
- Last modified 21.11.2024 06:05:31
An Unchecked Return Value vulnerability in the authd (authentication daemon) of Juniper Networks Junos OS on MX Series configured for subscriber management / BBE allows an adjacent attacker to cause a crash by sending a specific username. This impact...
CVE-2021-31367
- EPSS 0.08%
- Published 19.10.2021 19:15:09
- Last modified 21.11.2024 06:05:31
A Missing Release of Memory after Effective Lifetime vulnerability in the Packet Forwarding Engine (PFE) of Juniper Networks Junos OS on PTX Series allows an adjacent attacker to cause a Denial of Service (DoS) by sending genuine BGP flowspec packets...
CVE-2021-31368
- EPSS 0.51%
- Published 19.10.2021 19:15:09
- Last modified 21.11.2024 06:05:31
An Uncontrolled Resource Consumption vulnerability in the kernel of Juniper Networks JUNOS OS allows an unauthenticated network based attacker to cause 100% CPU load and the device to become unresponsive by sending a flood of traffic to the out-of-ba...
CVE-2021-0299
- EPSS 0.37%
- Published 19.10.2021 19:15:08
- Last modified 21.11.2024 05:42:26
An Improper Handling of Exceptional Conditions vulnerability in the processing of a transit or directly received malformed IPv6 packet in Juniper Networks Junos OS results in a kernel crash, causing the device to restart, leading to a Denial of Servi...
- EPSS 0.34%
- Published 19.10.2021 19:15:08
- Last modified 21.11.2024 06:05:28
An Improper Privilege Management vulnerability in the gRPC framework, used by the Juniper Extension Toolkit (JET) API on Juniper Networks Junos OS and Junos OS Evolved, allows a network-based, low-privileged authenticated attacker to perform operatio...
- EPSS 0.39%
- Published 19.10.2021 19:15:08
- Last modified 21.11.2024 06:05:28
An Improper Check for Unusual or Exceptional Conditions in packet processing on the MS-MPC/MS-MIC utilized by Juniper Networks Junos OS allows a malicious attacker to send a specific packet, triggering the MS-MPC/MS-MIC to reset, causing a Denial of ...
- EPSS 0.41%
- Published 19.10.2021 19:15:08
- Last modified 21.11.2024 06:05:29
An Improper Handling of Exceptional Conditions vulnerability in Juniper Networks Junos OS and Junos OS Evolved allows an attacker to inject a specific BGP update, causing the routing protocol daemon (RPD) to crash and restart, leading to a Denial of ...