Juniper

Junos

756 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.26%
  • Veröffentlicht 12.04.2024 15:15:25
  • Zuletzt bearbeitet 06.02.2025 18:21:04

An Incorrect Behavior Order in the routing engine (RE) of Juniper Networks Junos OS on EX4300 Series allows traffic intended to the device to reach the RE instead of being discarded when the discard term is set in loopback (lo0) interface. The intend...

  • EPSS 0.04%
  • Veröffentlicht 12.04.2024 15:15:24
  • Zuletzt bearbeitet 06.02.2025 18:39:32

An Incorrect Default Permissions vulnerability in Juniper Networks Junos OS and Junos OS Evolved allows a local, low-privileged attacker to access confidential information on the system. On all Junos OS and Junos OS Evolved platforms, when NETCONF t...

  • EPSS 0.12%
  • Veröffentlicht 12.04.2024 15:15:24
  • Zuletzt bearbeitet 06.02.2025 18:39:21

An Access of Memory Location After End of Buffer vulnerability in the Layer-2 Control Protocols Daemon (l2cpd) of Juniper Networks Junos OS and Junos OS Evolved allows an adjacent, unauthenticated attacker to cause Denial of Service (DoS). On all Ju...

  • EPSS 0.25%
  • Veröffentlicht 12.04.2024 15:15:24
  • Zuletzt bearbeitet 06.02.2025 18:39:12

A Stack-based Buffer Overflow vulnerability in the Routing Protocol Daemon (RPD) component of Junos OS and Junos OS Evolved allows an unauthenticated, network-based attacker to cause an rpd crash, leading to Denial of Service (DoS). On all Junos OS ...

  • EPSS 0.14%
  • Veröffentlicht 12.04.2024 15:15:24
  • Zuletzt bearbeitet 06.02.2025 18:39:02

An Improper Validation of Specified Type of Input vulnerability in Routing Protocol Daemon (RPD) of Junos OS and Junos OS Evolved allows an unauthenticated, network-based attacker to cause Denial of Service (DoS). If a BGP update is received over an...

  • EPSS 0.08%
  • Veröffentlicht 12.04.2024 15:15:23
  • Zuletzt bearbeitet 23.01.2026 16:31:57

An Improper Check or Handling of Exceptional Conditions vulnerability in the Packet Forwarding Engine (PFE) of Juniper Networks Junos OS and Junos OS Evolved allows an unauthenticated, adjacent attacker to cause a Denial of Service (DoS). If an atta...

  • EPSS 0.11%
  • Veröffentlicht 12.04.2024 15:15:23
  • Zuletzt bearbeitet 06.02.2025 16:46:39

An Improper Validation of Syntactic Correctness of Input vulnerability in the Routing Protocol Daemon (rpd) of Juniper Networks Junos OS and Junos OS Evolved allows a network-based, unauthenticated attacker to cause a Denial of Service (DoS). If a B...

  • EPSS 0.06%
  • Veröffentlicht 12.04.2024 15:15:23
  • Zuletzt bearbeitet 06.02.2025 16:58:10

An Exposure of Resource to Wrong Sphere vulnerability in the Packet Forwarding Engine (PFE) of Juniper Networks Junos OS on SRX 300 Series allows an unauthenticated, adjacent attacker to cause a Denial of Service (DoS). Specific valid link-local t...

  • EPSS 0.06%
  • Veröffentlicht 12.04.2024 15:15:23
  • Zuletzt bearbeitet 10.04.2025 20:44:13

A Missing Release of Memory after Effective Lifetime vulnerability in the IKE daemon (iked) of Juniper Networks Junos OS on MX Series with SPC3, and SRX Series allows an administratively adjacent attacker which is able to successfully establish IPsec...

  • EPSS 0.07%
  • Veröffentlicht 12.04.2024 15:15:23
  • Zuletzt bearbeitet 19.05.2025 10:15:20

An Improper Handling of Exceptional Conditions vulnerability in the Class of Service daemon (cosd) of Juniper Networks Junos OS allows an authenticated, network-based attacker with low privileges to cause a limited Denial of Service (DoS). In a scal...