CVE-2021-0289
- EPSS 0.06%
- Published 15.07.2021 20:15:10
- Last modified 21.11.2024 05:42:24
When user-defined ARP Policer is configured and applied on one or more Aggregated Ethernet (AE) interface units, a Time-of-check Time-of-use (TOCTOU) Race Condition vulnerability between the Device Control Daemon (DCD) and firewall process (dfwd) dae...
CVE-2021-0290
- EPSS 0.08%
- Published 15.07.2021 20:15:10
- Last modified 21.11.2024 05:42:24
Improper Handling of Exceptional Conditions in Ethernet interface frame processing of Juniper Networks Junos OS allows an attacker to send specially crafted frames over the local Ethernet segment, causing the interface to go into a down state, result...
CVE-2021-0291
- EPSS 0.29%
- Published 15.07.2021 20:15:10
- Last modified 21.11.2024 05:42:25
An Exposure of System Data vulnerability in Juniper Networks Junos OS and Junos OS Evolved, where a sensitive system-level resource is not being sufficiently protected, allows a network-based unauthenticated attacker to send specific traffic which pa...
CVE-2021-0277
- EPSS 0.23%
- Published 15.07.2021 20:15:09
- Last modified 21.11.2024 05:42:23
An Out-of-bounds Read vulnerability in the processing of specially crafted LLDP frames by the Layer 2 Control Protocol Daemon (l2cpd) of Juniper Networks Junos OS and Junos OS Evolved may allow an attacker to cause a Denial of Service (DoS), or may l...
CVE-2021-0278
- EPSS 0.17%
- Published 15.07.2021 20:15:09
- Last modified 21.11.2024 05:42:23
An Improper Input Validation vulnerability in J-Web of Juniper Networks Junos OS allows a locally authenticated attacker to escalate their privileges to root over the target device. junos:18.3R3-S5 junos:18.4R3-S9 junos:19.1R3-S6 junos:19.3R2-S6 juno...
- EPSS 0.39%
- Published 15.07.2021 20:15:09
- Last modified 21.11.2024 05:42:23
Due to an Improper Initialization vulnerability in Juniper Networks Junos OS on PTX platforms and QFX10K Series with Paradise (PE) chipset-based line cards, ddos-protection configuration changes made from the CLI will not take effect as expected beyo...
CVE-2021-0281
- EPSS 0.28%
- Published 15.07.2021 20:15:09
- Last modified 21.11.2024 05:42:23
On Juniper Networks Junos OS devices configured with BGP origin validation using Resource Public Key Infrastructure (RPKI) receipt of a specific packet from the RPKI cache server may cause routing process daemon (RPD) to crash and restart, creating a...
CVE-2021-0282
- EPSS 0.37%
- Published 15.07.2021 20:15:09
- Last modified 21.11.2024 05:42:23
On Juniper Networks Junos OS devices with Multipath or add-path feature enabled, processing a specific BGP UPDATE can lead to a routing process daemon (RPD) crash and restart, causing a Denial of Service (DoS). Continued receipt and processing of thi...
CVE-2021-0270
- EPSS 0.33%
- Published 22.04.2021 20:15:10
- Last modified 21.11.2024 05:42:22
On PTX Series and QFX10k Series devices with the "inline-jflow" feature enabled, a use after free weakness in the Packet Forwarding Engine (PFE) microkernel architecture of Juniper Networks Junos OS may allow an attacker to cause a Denial of Service ...
CVE-2021-0271
- EPSS 0.08%
- Published 22.04.2021 20:15:10
- Last modified 21.11.2024 05:42:22
A Double Free vulnerability in the software forwarding interface daemon (sfid) process of Juniper Networks Junos OS allows an adjacently-connected attacker to cause a Denial of Service (DoS) by sending a crafted ARP packet to the device. Continued re...