Juniper

Junos

729 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.25%
  • Veröffentlicht 10.07.2024 23:15:12
  • Zuletzt bearbeitet 07.02.2025 20:06:51

An Unchecked Return Value vulnerability in the Routing Protocol Daemon (rpd) on Juniper Networks Junos OS and Juniper Networks Junos OS Evolved allows a logically adjacent, unauthenticated attacker sending a specific PIM packet to cause rpd to crash ...

  • EPSS 0.15%
  • Veröffentlicht 10.07.2024 23:15:11
  • Zuletzt bearbeitet 07.02.2025 19:59:34

An Improper Check for Unusual or Exceptional Conditions vulnerability in the Layer 2 Address Learning Daemon (l2ald) on Juniper Networks Junos OS and Junos OS Evolved allows an unauthenticated, adjacent attacker to cause Denial of Service (DoS). In ...

  • EPSS 0.56%
  • Veröffentlicht 10.07.2024 23:15:11
  • Zuletzt bearbeitet 01.03.2025 02:43:43

A Heap-based Buffer Overflow vulnerability in the telemetry sensor process (sensord) of Juniper Networks Junos OS on MX240, MX480, MX960 platforms using MPC10E causes a steady increase in memory utilization, ultimately leading to a Denial of Service ...

  • EPSS 0.42%
  • Veröffentlicht 10.07.2024 23:15:11
  • Zuletzt bearbeitet 07.02.2025 20:01:23

A Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition') vulnerability the Routing Protocol Daemon (rpd) of Juniper Networks Junos OS and Juniper Networks Junos OS Evolved allows an unauthenticated, network-ba...

  • EPSS 1.59%
  • Veröffentlicht 10.07.2024 23:15:11
  • Zuletzt bearbeitet 07.02.2025 20:02:54

An Improper Handling of Exceptional Conditions vulnerability in the Routing Protocol Daemon (RPD) of Juniper Networks Junos OS and Junos OS Evolved allows an attacker sending a specific malformed BGP update message to cause the session to reset, resu...

  • EPSS 0.07%
  • Veröffentlicht 10.07.2024 23:15:10
  • Zuletzt bearbeitet 07.02.2025 19:29:52

An Improper Input Validation vulnerability in the 802.1X Authentication (dot1x) Daemon of Juniper Networks Junos OS allows a local, low-privileged attacker with access to the CLI to cause a Denial of Service (DoS). On running a specific operational ...

  • EPSS 0.15%
  • Veröffentlicht 10.07.2024 23:15:10
  • Zuletzt bearbeitet 07.02.2025 19:57:23

An Improper Check or Handling of Exceptional Conditions vulnerability in the Routing Protocol Daemon (rpd) of Juniper Networks Junos and Junos OS Evolved allows an unauthenticated, adjacent attacker to cause a Denial of Service (DoS). An attacker ca...

  • EPSS 0.28%
  • Veröffentlicht 01.07.2024 17:15:05
  • Zuletzt bearbeitet 21.11.2024 08:54:39

An Improper Check for Unusual or Exceptional Conditions vulnerability in the Packet Forwarding Engine (PFE) of Juniper Networks Junos OS on SRX Series and NFX Series allows an unauthenticated, network-based attacker to cause a Denial-of-Service (DoS)...

  • EPSS 0.05%
  • Veröffentlicht 16.04.2024 20:15:09
  • Zuletzt bearbeitet 11.04.2025 14:47:42

A Use After Free vulnerability in command processing of Juniper Networks Junos OS on MX Series allows a local, authenticated attacker to cause the broadband edge service manager daemon (bbe-smgd) to crash upon execution of specific CLI commands, crea...

  • EPSS 0.1%
  • Veröffentlicht 16.04.2024 20:15:09
  • Zuletzt bearbeitet 07.02.2025 20:17:11

An Improper Handling of Exceptional Conditions vulnerability in Juniper Networks Junos OS and Junos OS Evolved allows an adjacent unauthenticated attacker to cause a Denial of Service (DoS), which causes the l2cpd process to crash by sending a specif...