Juniper

Junos

756 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.08%
  • Veröffentlicht 22.04.2021 20:15:09
  • Zuletzt bearbeitet 21.11.2024 05:42:20

Through routine static code analysis of the Juniper Networks Junos OS software codebase, the Secure Development Life Cycle team identified a Use After Free vulnerability in PFE packet processing on the QFX10002-60C switching platform. Exploitation of...

  • EPSS 0.31%
  • Veröffentlicht 22.04.2021 20:15:09
  • Zuletzt bearbeitet 21.11.2024 05:42:20

A Data Processing vulnerability in the Multi-Service process (multi-svcs) on the FPC of Juniper Networks Junos OS on the PTX Series routers may lead to the process becoming unresponsive, ultimately affecting traffic forwarding, allowing an attacker t...

  • EPSS 0.24%
  • Veröffentlicht 22.04.2021 20:15:09
  • Zuletzt bearbeitet 21.11.2024 05:42:21

A vulnerability in the processing of traffic matching a firewall filter containing a syslog action in Juniper Networks Junos OS on MX Series with MPC10/MPC11 cards installed, PTX10003 and PTX10008 Series devices, will cause the line card to crash and...

  • EPSS 0.41%
  • Veröffentlicht 22.04.2021 20:15:09
  • Zuletzt bearbeitet 21.11.2024 05:42:21

The use of multiple hard-coded cryptographic keys in cSRX Series software in Juniper Networks Junos OS allows an attacker to take control of any instance of a cSRX deployment through device management services. This issue affects: Juniper Networks Ju...

  • EPSS 0.06%
  • Veröffentlicht 22.04.2021 20:15:09
  • Zuletzt bearbeitet 21.11.2024 05:42:21

An Improper Input Validation vulnerability in the active-lease query portion in JDHCPD's DHCP Relay Agent of Juniper Networks Junos OS allows an attacker to cause a Denial of Service (DoS) by sending a crafted DHCP packet to the device thereby crashi...

  • EPSS 0.27%
  • Veröffentlicht 22.04.2021 20:15:09
  • Zuletzt bearbeitet 21.11.2024 05:42:21

An Improper Neutralization of CRLF Sequences in HTTP Headers ('HTTP Response Splitting') weakness in J-web of Juniper Networks Junos OS leads to buffer overflows, segment faults, or other impacts, which allows an attacker to modify the integrity of t...

  • EPSS 0.38%
  • Veröffentlicht 22.04.2021 20:15:09
  • Zuletzt bearbeitet 21.11.2024 05:42:21

The improper handling of client-side parameters in J-Web of Juniper Networks Junos OS allows an attacker to perform a number of different malicious actions against a target device when a user is authenticated to J-Web. An attacker may be able to supe...

  • EPSS 0.03%
  • Veröffentlicht 22.04.2021 20:15:08
  • Zuletzt bearbeitet 21.11.2024 05:42:13

A vulnerability in the distributed or centralized periodic packet management daemon (PPMD) of Juniper Networks Junos OS may cause receipt of a malformed packet to crash and restart the PPMD process, leading to network destabilization, service interru...

  • EPSS 0.08%
  • Veröffentlicht 22.04.2021 20:15:08
  • Zuletzt bearbeitet 21.11.2024 05:42:13

A vulnerability in Juniper Networks Junos OS running on the ACX5448 and ACX710 platforms may cause BFD sessions to flap when a high rate of transit ARP packets are received. This, in turn, may impact routing protocols and network stability, leading t...

  • EPSS 0.08%
  • Veröffentlicht 22.04.2021 20:15:08
  • Zuletzt bearbeitet 21.11.2024 05:42:14

A vulnerability in the handling of internal resources necessary to bring up a large number of Layer 2 broadband remote access subscriber (BRAS) nodes in Juniper Networks Junos OS can cause the Access Node Control Protocol daemon (ANCPD) to crash and ...