CVE-2024-39555
- EPSS 1.59%
- Veröffentlicht 10.07.2024 23:15:11
- Zuletzt bearbeitet 07.02.2025 20:02:54
An Improper Handling of Exceptional Conditions vulnerability in the Routing Protocol Daemon (RPD) of Juniper Networks Junos OS and Junos OS Evolved allows an attacker sending a specific malformed BGP update message to cause the session to reset, resu...
CVE-2024-39511
- EPSS 0.05%
- Veröffentlicht 10.07.2024 23:15:10
- Zuletzt bearbeitet 07.02.2025 19:29:52
An Improper Input Validation vulnerability in the 802.1X Authentication (dot1x) Daemon of Juniper Networks Junos OS allows a local, low-privileged attacker with access to the CLI to cause a Denial of Service (DoS). On running a specific operational ...
CVE-2024-39514
- EPSS 0.15%
- Veröffentlicht 10.07.2024 23:15:10
- Zuletzt bearbeitet 07.02.2025 19:57:23
An Improper Check or Handling of Exceptional Conditions vulnerability in the Routing Protocol Daemon (rpd) of Juniper Networks Junos and Junos OS Evolved allows an unauthenticated, adjacent attacker to cause a Denial of Service (DoS). An attacker ca...
CVE-2024-21586
- EPSS 0.53%
- Veröffentlicht 01.07.2024 17:15:05
- Zuletzt bearbeitet 22.01.2026 21:41:15
An Improper Check for Unusual or Exceptional Conditions vulnerability in the Packet Forwarding Engine (PFE) of Juniper Networks Junos OS on SRX Series and NFX Series allows an unauthenticated, network-based attacker to cause a Denial-of-Service (DoS)...
CVE-2024-30378
- EPSS 0.05%
- Veröffentlicht 16.04.2024 20:15:09
- Zuletzt bearbeitet 11.04.2025 14:47:42
A Use After Free vulnerability in command processing of Juniper Networks Junos OS on MX Series allows a local, authenticated attacker to cause the broadband edge service manager daemon (bbe-smgd) to crash upon execution of specific CLI commands, crea...
CVE-2024-30380
- EPSS 0.1%
- Veröffentlicht 16.04.2024 20:15:09
- Zuletzt bearbeitet 07.02.2025 20:17:11
An Improper Handling of Exceptional Conditions vulnerability in Juniper Networks Junos OS and Junos OS Evolved allows an adjacent unauthenticated attacker to cause a Denial of Service (DoS), which causes the l2cpd process to crash by sending a specif...
CVE-2024-30392
- EPSS 0.19%
- Veröffentlicht 12.04.2024 16:15:39
- Zuletzt bearbeitet 23.01.2026 16:18:48
A Stack-based Buffer Overflow vulnerability in Flow Processing Daemon (flowd) of Juniper Networks Junos OS allows an unauthenticated, network-based attacker to cause Denial of Service (DoS). On all Junos OS MX Series platforms with SPC3 and MS-MPC/-...
CVE-2024-30397
- EPSS 0.26%
- Veröffentlicht 12.04.2024 16:15:39
- Zuletzt bearbeitet 26.02.2025 07:46:51
An Improper Check for Unusual or Exceptional Conditions vulnerability in the the Public Key Infrastructure daemon (pkid) of Juniper Networks Junos OS allows an unauthenticated networked attacker to cause Denial of Service (DoS). The pkid is responsi...
CVE-2024-30398
- EPSS 0.2%
- Veröffentlicht 12.04.2024 16:15:39
- Zuletzt bearbeitet 06.02.2025 20:35:49
An Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in the Packet Forwarding Engine (PFE) of Juniper Networks Junos OS allows an unauthenticated, network-based attacker to cause a Denial of Service (DoS). When a ...
CVE-2024-30401
- EPSS 0.17%
- Veröffentlicht 12.04.2024 16:15:39
- Zuletzt bearbeitet 23.01.2026 16:12:00
An Out-of-bounds Read vulnerability in the advanced forwarding management process aftman of Juniper Networks Junos OS on MX Series with MPC10E, MPC11, MX10K-LC9600 line cards, MX304, and EX9200-15C, may allow an attacker to exploit a stack-based buff...