CVE-2019-0002
- EPSS 0.29%
- Published 15.01.2019 21:29:00
- Last modified 21.11.2024 04:16:01
On EX2300 and EX3400 series, stateless firewall filter configuration that uses the action 'policer' in combination with other actions might not take effect. When this issue occurs, the output of the command: show pfe filter hw summary will not show t...
CVE-2019-0003
- EPSS 1.72%
- Published 15.01.2019 21:29:00
- Last modified 21.11.2024 04:16:01
When a specific BGP flowspec configuration is enabled and upon receipt of a specific matching BGP packet meeting a specific term in the flowspec configuration, a reachable assertion failure occurs, causing the routing protocol daemon (rpd) process to...
CVE-2019-0005
- EPSS 0.21%
- Published 15.01.2019 21:29:00
- Last modified 21.11.2024 04:16:01
On EX2300, EX3400, EX4600, QFX3K and QFX5K series, firewall filter configuration cannot perform packet matching on any IPv6 extension headers. This issue may allow IPv6 packets that should have been blocked to be forwarded. IPv4 packet filtering is u...
CVE-2018-0058
- EPSS 0.36%
- Published 10.10.2018 18:29:03
- Last modified 21.11.2024 03:37:28
Receipt of a specially crafted IPv6 exception packet may be able to trigger a kernel crash (vmcore), causing the device to reboot. The issue is specific to the processing of Broadband Edge (BBE) client route processing on MX Series subscriber managem...
CVE-2018-0060
- EPSS 0.2%
- Published 10.10.2018 18:29:03
- Last modified 21.11.2024 03:37:29
An improper input validation weakness in the device control daemon process (dcd) of Juniper Networks Junos OS allows an attacker to cause a Denial of Service to the dcd process and interfaces and connected clients when the Junos device is requesting ...
CVE-2018-0061
- EPSS 0.43%
- Published 10.10.2018 18:29:03
- Last modified 21.11.2024 03:37:29
A denial of service vulnerability in the telnetd service on Junos OS allows remote unauthenticated users to cause high CPU usage which may affect system performance. Affected releases are Juniper Networks Junos OS: 12.1X46 versions prior to 12.1X46-D...
CVE-2018-0062
- EPSS 0.49%
- Published 10.10.2018 18:29:03
- Last modified 21.11.2024 03:37:29
A Denial of Service vulnerability in J-Web service may allow a remote unauthenticated user to cause Denial of Service which may prevent other users to authenticate or to perform J-Web operations. Affected releases are Juniper Networks Junos OS: 12.1X...
CVE-2018-0063
- EPSS 0.12%
- Published 10.10.2018 18:29:03
- Last modified 21.11.2024 03:37:29
A vulnerability in the IP next-hop index database in Junos OS 17.3R3 may allow a flood of ARP requests, sent to the management interface, to exhaust the private Internal routing interfaces (IRIs) next-hop limit. Once the IRI next-hop database is full...
CVE-2018-0049
- EPSS 1.15%
- Published 10.10.2018 18:29:02
- Last modified 21.11.2024 03:37:25
A NULL Pointer Dereference vulnerability in Juniper Networks Junos OS allows an attacker to cause the Junos OS kernel to crash. Continued receipt of this specifically crafted malicious MPLS packet will cause a sustained Denial of Service condition. T...
CVE-2018-0050
- EPSS 0.71%
- Published 10.10.2018 18:29:02
- Last modified 21.11.2024 03:37:26
An error handling vulnerability in Routing Protocols Daemon (RPD) of Juniper Networks Junos OS allows an attacker to cause RPD to crash. Continued receipt of this malformed MPLS RSVP packet will cause a sustained Denial of Service condition. Affected...