CVE-2024-39529
- EPSS 0.39%
- Veröffentlicht 11.07.2024 16:15:04
- Zuletzt bearbeitet 21.11.2024 09:27:56
A Use of Externally-Controlled Format String vulnerability in the Packet Forwarding Engine (PFE) of Juniper Networks Junos OS on SRX Series allows an unauthenticated, network-based attacker to cause a Denial-of-Service (DoS). If DNS Domain Generat...
CVE-2024-39530
- EPSS 0.4%
- Veröffentlicht 11.07.2024 16:15:04
- Zuletzt bearbeitet 21.11.2024 09:27:56
An Improper Check for Unusual or Exceptional Conditions vulnerability in the chassis management daemon (chassisd) of Juniper Networks Junos OS allows an unauthenticated, network-based attacker to cause a Denial-of-Service (DoS). If an attempt is m...
CVE-2024-39560
- EPSS 0.15%
- Veröffentlicht 10.07.2024 23:15:13
- Zuletzt bearbeitet 22.01.2026 21:41:25
An Improper Handling of Exceptional Conditions vulnerability in the routing protocol daemon (rpd) of Juniper Networks Junos OS and Junos OS Evolved allows a logically adjacent downstream RSVP neighbor to cause kernel memory exhaustion, leading to a k...
CVE-2024-39561
- EPSS 0.12%
- Veröffentlicht 10.07.2024 23:15:13
- Zuletzt bearbeitet 10.04.2025 20:40:55
An Improper Check for Unusual or Exceptional Conditions vulnerability in the flow daemon (flowd) of Juniper Networks Junos OS on SRX4600 and SRX5000 Series allows an attacker to send TCP packets with SYN/FIN or SYN/RST flags, bypassing the ex...
CVE-2024-39565
- EPSS 0.64%
- Veröffentlicht 10.07.2024 23:15:13
- Zuletzt bearbeitet 22.01.2026 21:19:49
An Improper Neutralization of Data within XPath Expressions ('XPath Injection') vulnerability in J-Web shipped with Juniper Networks Junos OS allows an unauthenticated, network-based attacker to execute remote commands on the target device. While a...
- EPSS 0.05%
- Veröffentlicht 10.07.2024 23:15:12
- Zuletzt bearbeitet 07.02.2025 20:09:15
A Stack-Based Buffer Overflow vulnerability in Juniper Networks Junos OS and Juniper Networks Junos OS Evolved may allow a local, low-privileged attacker with access to the CLI the ability to load a malicious certificate file, leading to a limited De...
CVE-2024-39558
- EPSS 0.19%
- Veröffentlicht 10.07.2024 23:15:12
- Zuletzt bearbeitet 07.02.2025 20:06:51
An Unchecked Return Value vulnerability in the Routing Protocol Daemon (rpd) on Juniper Networks Junos OS and Juniper Networks Junos OS Evolved allows a logically adjacent, unauthenticated attacker sending a specific PIM packet to cause rpd to crash ...
CVE-2024-39517
- EPSS 0.15%
- Veröffentlicht 10.07.2024 23:15:11
- Zuletzt bearbeitet 07.02.2025 19:59:34
An Improper Check for Unusual or Exceptional Conditions vulnerability in the Layer 2 Address Learning Daemon (l2ald) on Juniper Networks Junos OS and Junos OS Evolved allows an unauthenticated, adjacent attacker to cause Denial of Service (DoS). In ...
CVE-2024-39518
- EPSS 0.43%
- Veröffentlicht 10.07.2024 23:15:11
- Zuletzt bearbeitet 01.03.2025 02:43:43
A Heap-based Buffer Overflow vulnerability in the telemetry sensor process (sensord) of Juniper Networks Junos OS on MX240, MX480, MX960 platforms using MPC10E causes a steady increase in memory utilization, ultimately leading to a Denial of Service ...
CVE-2024-39554
- EPSS 0.42%
- Veröffentlicht 10.07.2024 23:15:11
- Zuletzt bearbeitet 07.02.2025 20:01:23
A Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition') vulnerability the Routing Protocol Daemon (rpd) of Juniper Networks Junos OS and Juniper Networks Junos OS Evolved allows an unauthenticated, network-ba...