Juniper

Junos

756 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.98%
  • Veröffentlicht 19.01.2022 01:15:08
  • Zuletzt bearbeitet 21.11.2024 06:46:17

An Uncontrolled Resource Consumption vulnerability in the kernel of Juniper Networks Junos OS allows an unauthenticated network based attacker to cause 100% CPU load and the device to become unresponsive by sending a flood of traffic to the out-of-ba...

  • EPSS 0.04%
  • Veröffentlicht 19.01.2022 01:15:08
  • Zuletzt bearbeitet 21.11.2024 06:46:17

A Generation of Error Message Containing Sensitive Information vulnerability in the CLI of Juniper Networks Junos OS allows a locally authenticated attacker with low privileges to elevate these to the level of any other user logged in via J-Web at th...

  • EPSS 0.08%
  • Veröffentlicht 19.01.2022 01:15:08
  • Zuletzt bearbeitet 21.11.2024 06:46:17

An Improper Input Validation vulnerability in the Juniper DHCP daemon (jdhcpd) of Juniper Networks Junos OS allows an adjacent unauthenticated attacker to cause a crash of jdhcpd and thereby a Denial of Service (DoS). If a device is configured as DHC...

  • EPSS 0.2%
  • Veröffentlicht 19.01.2022 01:15:08
  • Zuletzt bearbeitet 21.11.2024 06:46:17

An Improper Validation of Specified Quantity in Input vulnerability in the routing protocol daemon (rpd) of Juniper Networks Junos OS allows an unauthenticated networked attacker to cause an rdp crash and thereby a Denial of Service (DoS). If a BGP u...

  • EPSS 0.26%
  • Veröffentlicht 19.01.2022 01:15:08
  • Zuletzt bearbeitet 21.11.2024 06:46:18

A traffic classification vulnerability in Juniper Networks Junos OS on the SRX Series Services Gateways may allow an attacker to bypass Juniper Deep Packet Inspection (JDPI) rules and access unauthorized networks or resources, when 'no-syn-check' is ...

  • EPSS 0.08%
  • Veröffentlicht 19.01.2022 01:15:08
  • Zuletzt bearbeitet 21.11.2024 06:46:18

An Improper Validation of Specified Type of Input vulnerability in the kernel of Juniper Networks Junos OS allows an unauthenticated adjacent attacker to trigger a Missing Release of Memory after Effective Lifetime vulnerability. Continued exploitati...

  • EPSS 0.28%
  • Veröffentlicht 19.10.2021 19:15:11
  • Zuletzt bearbeitet 21.11.2024 06:05:33

In broadband environments, including but not limited to Enhanced Subscriber Management, (CHAP, PPP, DHCP, etc.), on Juniper Networks Junos OS devices where RADIUS servers are configured for managing subscriber access and a subscriber is logged in and...

Exploit
  • EPSS 0.35%
  • Veröffentlicht 19.10.2021 19:15:11
  • Zuletzt bearbeitet 21.11.2024 06:05:33

An Incorrect Behavior Order vulnerability in the MAP-E automatic tunneling mechanism of Juniper Networks Junos OS allows an attacker to send certain malformed IPv4 or IPv6 packets to cause a Denial of Service (DoS) to the PFE on the device which is d...

  • EPSS 0.22%
  • Veröffentlicht 19.10.2021 19:15:11
  • Zuletzt bearbeitet 21.11.2024 06:05:34

On PTX1000 System, PTX10002-60C System, after upgrading to an affected release, a Race Condition vulnerability between the chassis daemon (chassisd) and firewall process (dfwd) of Juniper Networks Junos OS, may update the device's interfaces with inc...

  • EPSS 0.46%
  • Veröffentlicht 19.10.2021 19:15:11
  • Zuletzt bearbeitet 21.11.2024 06:05:34

In Point to MultiPoint (P2MP) scenarios within established sessions between network or adjacent neighbors the improper use of a source to destination copy write operation combined with a Stack-based Buffer Overflow on certain specific packets process...