Juniper

Junos

720 vulnerabilities found.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.07%
  • Published 22.04.2021 20:15:10
  • Last modified 21.11.2024 05:42:22

A kernel memory leak in QFX10002-32Q, QFX10002-60C, QFX10002-72Q, QFX10008, QFX10016 devices Flexible PIC Concentrators (FPCs) on Juniper Networks Junos OS allows an attacker to send genuine packets destined to the device to cause a Denial of Service...

  • EPSS 0.27%
  • Published 22.04.2021 20:15:10
  • Last modified 21.11.2024 05:42:22

An always-incorrect control flow implementation in the implicit filter terms of Juniper Networks Junos OS and Junos OS Evolved on ACX5800, EX9200 Series, MX10000 Series, MX240, MX480, MX960 devices with affected Trio line cards allows an attacker to ...

  • EPSS 0.53%
  • Published 22.04.2021 20:15:10
  • Last modified 21.11.2024 05:42:22

A Cross-site Scripting (XSS) vulnerability in J-Web on Juniper Networks Junos OS allows an attacker to target another user's session thereby gaining access to the users session. The other user session must be active for the attack to succeed. Once su...

  • EPSS 0.11%
  • Published 22.04.2021 20:15:09
  • Last modified 21.11.2024 05:42:17

On Juniper Networks Junos OS platforms configured as DHCPv6 local server or DHCPv6 Relay Agent, Juniper Networks Dynamic Host Configuration Protocol Daemon (JDHCPD) process might crash with a core dump if a specific DHCPv6 packet is received, resulti...

  • EPSS 0.08%
  • Published 22.04.2021 20:15:09
  • Last modified 21.11.2024 05:42:17

A vulnerability due to the improper handling of direct memory access (DMA) buffers on EX4300 switches on Juniper Networks Junos OS allows an attacker sending specific unicast frames to trigger a Denial of Service (DoS) condition by exhausting DMA buf...

  • EPSS 0.08%
  • Published 22.04.2021 20:15:09
  • Last modified 21.11.2024 05:42:17

Improper Handling of Unexpected Data in the firewall policer of Juniper Networks Junos OS on EX4300 switches allows matching traffic to exceed set policer limits, possibly leading to a limited Denial of Service (DoS) condition. When the firewall poli...

  • EPSS 0.21%
  • Published 22.04.2021 20:15:09
  • Last modified 21.11.2024 05:42:18

A signal handler race condition exists in the Layer 2 Address Learning Daemon (L2ALD) of Juniper Networks Junos OS due to the absence of a specific protection mechanism to avoid a race condition which may allow an attacker to bypass the storm-control...

  • EPSS 0.04%
  • Published 22.04.2021 20:15:09
  • Last modified 21.11.2024 05:42:18

A Use of Hard-coded Credentials vulnerability in Juniper Networks Junos OS on Junos Fusion satellite devices allows an attacker who is local to the device to elevate their privileges and take control of the device. This issue affects: Juniper Network...

  • EPSS 0.04%
  • Published 22.04.2021 20:15:09
  • Last modified 21.11.2024 05:42:18

On SRX1500, SRX4100, SRX4200, SRX4600, SRX5000 Series with SPC2/SPC3, devices using tenant services on Juniper Networks Junos OS, due to incorrect default permissions assigned to tenant system administrators a tenant system administrator may inadvert...

  • EPSS 0.23%
  • Published 22.04.2021 20:15:09
  • Last modified 21.11.2024 05:42:18

A Race Condition (Concurrent Execution using Shared Resource with Improper Synchronization) vulnerability in the firewall process (dfwd) of Juniper Networks Junos OS allows an attacker to bypass the firewall rule sets applied to the input loopback fi...