CVE-2023-44175
- EPSS 0.17%
- Veröffentlicht 12.10.2023 23:15:11
- Zuletzt bearbeitet 21.11.2024 08:25:22
A Reachable Assertion vulnerability in the routing protocol daemon (rpd) of Juniper Networks Junos OS and Junos OS Evolved allows to send specific genuine PIM packets to the device resulting in rpd to crash causing a Denial of Service (DoS). Contin...
CVE-2023-22392
- EPSS 0.07%
- Veröffentlicht 12.10.2023 23:15:10
- Zuletzt bearbeitet 21.11.2024 07:44:43
A Missing Release of Memory after Effective Lifetime vulnerability in the Packet Forwarding Engine (PFE) of Juniper Networks Junos OS allows an adjacent, unauthenticated attacker to cause a Denial of Service (DoS). PTX3000, PTX5000, QFX10000, PTX10...
CVE-2023-36839
- EPSS 0.04%
- Veröffentlicht 12.10.2023 23:15:10
- Zuletzt bearbeitet 21.11.2024 08:10:43
An Improper Validation of Specified Quantity in Input vulnerability in the Layer-2 control protocols daemon (l2cpd) of Juniper Networks Junos OS and Junos OS Evolved allows an unauthenticated adjacent attacker who sends specific LLDP packets to caus...
CVE-2023-36841
- EPSS 0.13%
- Veröffentlicht 12.10.2023 23:15:10
- Zuletzt bearbeitet 21.11.2024 08:10:43
An Improper Check for Unusual or Exceptional Conditions vulnerability in the Packet Forwarding Engine (pfe) of Juniper Networks Junos OS on MX Series allows a unauthenticated network-based attacker to cause an infinite loop, resulting in a Denial of...
CVE-2023-44188
- EPSS 0.1%
- Veröffentlicht 11.10.2023 21:15:10
- Zuletzt bearbeitet 21.11.2024 08:25:24
A Time-of-check Time-of-use (TOCTOU) Race Condition vulnerability in telemetry processing of Juniper Networks Junos OS allows a network-based authenticated attacker to flood the system with multiple telemetry requests, causing the Junos Kernel Debug...
CVE-2023-44186
- EPSS 0.16%
- Veröffentlicht 11.10.2023 21:15:09
- Zuletzt bearbeitet 21.11.2024 08:25:23
An Improper Handling of Exceptional Conditions vulnerability in AS PATH processing of Juniper Networks Junos OS and Junos OS Evolved allows an attacker to send a BGP update message with an AS PATH containing a large number of 4-byte ASes, leading to...
CVE-2023-36851
- EPSS 15.29%
- Veröffentlicht 27.09.2023 15:18:54
- Zuletzt bearbeitet 24.10.2025 16:42:06
A Missing Authentication for Critical Function vulnerability in Juniper Networks Junos OS on SRX Series allows an unauthenticated, network-based attacker to cause limited impact to the file system integrity. With a specific request to webauth_op...
CVE-2023-4481
- EPSS 0.85%
- Veröffentlicht 01.09.2023 00:15:08
- Zuletzt bearbeitet 21.11.2024 08:35:15
An Improper Input Validation vulnerability in the Routing Protocol Daemon (rpd) of Juniper Networks Junos OS and Junos OS Evolved allows an unauthenticated, network-based attacker to cause a Denial of Service (DoS). When certain specific crafted BGP...
CVE-2023-36844
- EPSS 94.3%
- Veröffentlicht 17.08.2023 20:15:10
- Zuletzt bearbeitet 24.10.2025 16:44:08
A PHP External Variable Modification vulnerability in J-Web of Juniper Networks Junos OS on EX Series allows an unauthenticated, network-based attacker to control certain, important environment variables. Using a crafted request an attacker is able ...
CVE-2023-36845
- EPSS 94.36%
- Veröffentlicht 17.08.2023 20:15:10
- Zuletzt bearbeitet 24.10.2025 16:43:55
A PHP External Variable Modification vulnerability in J-Web of Juniper Networks Junos OS on EX Series and SRX Series allows an unauthenticated, network-based attacker to remotely execute code. Using a crafted request which sets the variable PHPR...