CVE-2024-39547
- EPSS 0.04%
- Veröffentlicht 11.10.2024 16:15:07
- Zuletzt bearbeitet 26.01.2026 18:19:43
An Improper Handling of Exceptional Conditions vulnerability in the rpd-server of Juniper Networks Junos OS and Junos OS Evolved within cRPD allows an unauthenticated network-based attacker sending crafted TCP traffic to the routing engine (RE) to ca...
CVE-2024-39526
- EPSS 0.08%
- Veröffentlicht 11.10.2024 16:15:06
- Zuletzt bearbeitet 23.01.2026 18:54:32
An Improper Handling of Exceptional Conditions vulnerability in packet processing of Juniper Networks Junos OS on MX Series with MPC10/MPC11/LC9600 line cards, EX9200 with EX9200-15C lines cards, MX304 devices, and Juniper Networks Junos OS Evolved o...
CVE-2024-39527
- EPSS 0.03%
- Veröffentlicht 11.10.2024 16:15:06
- Zuletzt bearbeitet 23.01.2026 18:53:48
An Exposure of Sensitive Information to an Unauthorized Actor vulnerability in the command-line interface (CLI) of Juniper Networks Junos OS on SRX Series devices allows a local, low-privileged user with access to the Junos CLI to view the contents o...
CVE-2024-39515
- EPSS 0.28%
- Veröffentlicht 09.10.2024 20:15:08
- Zuletzt bearbeitet 23.01.2026 19:24:17
An Improper Validation of Consistency within Input vulnerability in the routing protocol daemon (rpd) of Juniper Networks Junos OS and Junos OS Evolved allows an unauthenticated network-based attacker sending a specifically malformed BGP packet to ca...
CVE-2024-39516
- EPSS 0.25%
- Veröffentlicht 09.10.2024 20:15:08
- Zuletzt bearbeitet 23.01.2026 19:22:44
An Out-of-Bounds Read vulnerability in the routing protocol daemon (rpd) of Juniper Networks Junos OS and Junos OS Evolved allows an unauthenticated network-based attacker sending a specifically malformed BGP packet to cause rpd to crash and rest...
CVE-2024-39525
- EPSS 0.38%
- Veröffentlicht 09.10.2024 20:15:08
- Zuletzt bearbeitet 23.01.2026 19:22:23
An Improper Handling of Exceptional Conditions vulnerability in the routing protocol daemon (rpd) of Juniper Networks Junos OS and Junos OS Evolved allows an unauthenticated network-based attacker sending a specific BGP packet to cause rpd to crash a...
CVE-2024-39551
- EPSS 0.54%
- Veröffentlicht 11.07.2024 17:15:16
- Zuletzt bearbeitet 23.01.2026 19:22:56
An Uncontrolled Resource Consumption vulnerability in the H.323 ALG (Application Layer Gateway) of Juniper Networks Junos OS on SRX Series and MX Series with SPC3 and MS-MPC/MIC, allows an unauthenticated network-based attacker to send specific pack...
CVE-2024-39552
- EPSS 1.28%
- Veröffentlicht 11.07.2024 17:15:16
- Zuletzt bearbeitet 23.01.2026 19:23:40
An Improper Handling of Exceptional Conditions vulnerability in the routing protocol daemon (RPD) of Juniper Networks Junos OS and Junos OS Evolved allows a network based, unauthenticated attacker to cause the RPD process to crash leading to a Denial...
CVE-2024-39549
- EPSS 0.3%
- Veröffentlicht 11.07.2024 17:15:15
- Zuletzt bearbeitet 21.11.2024 09:27:59
A Missing Release of Memory after Effective Lifetime vulnerability in the routing process daemon (rpd) of Juniper Networks Junos OS and Junos OS Evolved allows an attacker to send a malformed BGP Path attribute update which allocates memory used to l...
CVE-2024-39550
- EPSS 0.19%
- Veröffentlicht 11.07.2024 17:15:15
- Zuletzt bearbeitet 04.09.2025 02:27:09
A Missing Release of Memory after Effective Lifetime vulnerability in the rtlogd process of Juniper Networks Junos OS on MX Series with SPC3 allows an unauthenticated, adjacent attacker to trigger internal events cause ( which can be done by repeated...