CVE-2021-0262
- EPSS 0.08%
- Veröffentlicht 22.04.2021 20:15:09
- Zuletzt bearbeitet 21.11.2024 05:42:20
Through routine static code analysis of the Juniper Networks Junos OS software codebase, the Secure Development Life Cycle team identified a Use After Free vulnerability in PFE packet processing on the QFX10002-60C switching platform. Exploitation of...
CVE-2021-0263
- EPSS 0.31%
- Veröffentlicht 22.04.2021 20:15:09
- Zuletzt bearbeitet 21.11.2024 05:42:20
A Data Processing vulnerability in the Multi-Service process (multi-svcs) on the FPC of Juniper Networks Junos OS on the PTX Series routers may lead to the process becoming unresponsive, ultimately affecting traffic forwarding, allowing an attacker t...
CVE-2021-0264
- EPSS 0.24%
- Veröffentlicht 22.04.2021 20:15:09
- Zuletzt bearbeitet 21.11.2024 05:42:21
A vulnerability in the processing of traffic matching a firewall filter containing a syslog action in Juniper Networks Junos OS on MX Series with MPC10/MPC11 cards installed, PTX10003 and PTX10008 Series devices, will cause the line card to crash and...
CVE-2021-0266
- EPSS 0.41%
- Veröffentlicht 22.04.2021 20:15:09
- Zuletzt bearbeitet 21.11.2024 05:42:21
The use of multiple hard-coded cryptographic keys in cSRX Series software in Juniper Networks Junos OS allows an attacker to take control of any instance of a cSRX deployment through device management services. This issue affects: Juniper Networks Ju...
CVE-2021-0267
- EPSS 0.06%
- Veröffentlicht 22.04.2021 20:15:09
- Zuletzt bearbeitet 21.11.2024 05:42:21
An Improper Input Validation vulnerability in the active-lease query portion in JDHCPD's DHCP Relay Agent of Juniper Networks Junos OS allows an attacker to cause a Denial of Service (DoS) by sending a crafted DHCP packet to the device thereby crashi...
CVE-2021-0268
- EPSS 0.27%
- Veröffentlicht 22.04.2021 20:15:09
- Zuletzt bearbeitet 21.11.2024 05:42:21
An Improper Neutralization of CRLF Sequences in HTTP Headers ('HTTP Response Splitting') weakness in J-web of Juniper Networks Junos OS leads to buffer overflows, segment faults, or other impacts, which allows an attacker to modify the integrity of t...
CVE-2021-0269
- EPSS 0.38%
- Veröffentlicht 22.04.2021 20:15:09
- Zuletzt bearbeitet 21.11.2024 05:42:21
The improper handling of client-side parameters in J-Web of Juniper Networks Junos OS allows an attacker to perform a number of different malicious actions against a target device when a user is authenticated to J-Web. An attacker may be able to supe...
CVE-2021-0214
- EPSS 0.03%
- Veröffentlicht 22.04.2021 20:15:08
- Zuletzt bearbeitet 21.11.2024 05:42:13
A vulnerability in the distributed or centralized periodic packet management daemon (PPMD) of Juniper Networks Junos OS may cause receipt of a malformed packet to crash and restart the PPMD process, leading to network destabilization, service interru...
CVE-2021-0216
- EPSS 0.08%
- Veröffentlicht 22.04.2021 20:15:08
- Zuletzt bearbeitet 21.11.2024 05:42:13
A vulnerability in Juniper Networks Junos OS running on the ACX5448 and ACX710 platforms may cause BFD sessions to flap when a high rate of transit ARP packets are received. This, in turn, may impact routing protocols and network stability, leading t...
CVE-2021-0224
- EPSS 0.08%
- Veröffentlicht 22.04.2021 20:15:08
- Zuletzt bearbeitet 21.11.2024 05:42:14
A vulnerability in the handling of internal resources necessary to bring up a large number of Layer 2 broadband remote access subscriber (BRAS) nodes in Juniper Networks Junos OS can cause the Access Node Control Protocol daemon (ANCPD) to crash and ...