Juniper

Junos

756 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 1.19%
  • Veröffentlicht 22.04.2021 20:15:08
  • Zuletzt bearbeitet 21.11.2024 05:42:15

An improper restriction of operations within the bounds of a memory buffer vulnerability in Juniper Networks Junos OS J-Web on SRX Series devices allows an attacker to cause Denial of Service (DoS) by sending certain crafted HTTP packets. Continued r...

  • EPSS 0.08%
  • Veröffentlicht 22.04.2021 20:15:08
  • Zuletzt bearbeitet 21.11.2024 05:42:15

An improper check for unusual or exceptional conditions vulnerability in Juniper Networks MX Series platforms with Trio-based MPC (Modular Port Concentrator) deployed in (Ethernet VPN) EVPN-(Virtual Extensible LAN) VXLAN configuration, may allow an a...

  • EPSS 0.53%
  • Veröffentlicht 22.04.2021 20:15:08
  • Zuletzt bearbeitet 21.11.2024 05:42:15

An uncontrolled resource consumption vulnerability in Message Queue Telemetry Transport (MQTT) server of Juniper Networks Junos OS allows an attacker to cause MQTT server to crash and restart leading to a Denial of Service (DoS) by sending a stream o...

  • EPSS 0.39%
  • Veröffentlicht 22.04.2021 20:15:08
  • Zuletzt bearbeitet 21.11.2024 05:42:15

On Juniper Networks SRX Series devices with link aggregation (lag) configured, executing any operation that fetches Aggregated Ethernet (AE) interface statistics, including but not limited to SNMP GET requests, causes a slow kernel memory leak. If al...

  • EPSS 0.27%
  • Veröffentlicht 22.04.2021 20:15:08
  • Zuletzt bearbeitet 21.11.2024 05:42:15

A path traversal vulnerability in the Juniper Networks SRX and vSRX Series may allow an authenticated J-web user to read sensitive system files. This issue affects Juniper Networks Junos OS on SRX and vSRX Series: 19.3 versions prior to 19.3R2-S6, 19...

  • EPSS 0.54%
  • Veröffentlicht 22.04.2021 20:15:08
  • Zuletzt bearbeitet 21.11.2024 05:42:15

A vulnerability in Juniper Networks Junos OS ACX500 Series, ACX4000 Series, may allow an attacker to cause a Denial of Service (DoS) by sending a high rate of specific packets to the device, resulting in a Forwarding Engine Board (FFEB) crash. Contin...

  • EPSS 0.27%
  • Veröffentlicht 22.04.2021 20:15:08
  • Zuletzt bearbeitet 21.11.2024 05:42:16

Due to an improper Initialization vulnerability on Juniper Networks Junos OS QFX5100-96S devices with QFX 5e Series image installed, ddos-protection configuration changes will not take effect beyond the default DDoS (Distributed Denial of Service) se...

  • EPSS 0.05%
  • Veröffentlicht 22.04.2021 20:15:08
  • Zuletzt bearbeitet 21.11.2024 05:42:16

On SRX1500, SRX4100, SRX4200, SRX4600, SRX5000 Series with SPC2/SPC3, vSRX Series devices using tenant services on Juniper Networks Junos OS, due to incorrect permission scheme assigned to tenant system administrators, a tenant system administrator m...

  • EPSS 0.22%
  • Veröffentlicht 22.04.2021 20:15:08
  • Zuletzt bearbeitet 21.11.2024 05:42:16

Due to an improper check for unusual or exceptional conditions in Juniper Networks Junos OS and Junos OS Evolved the Routing Protocol Daemon (RPD) service, upon receipt of a specific matching BGP packet meeting a specific term in the flowspec configu...

  • EPSS 0.08%
  • Veröffentlicht 22.04.2021 20:15:08
  • Zuletzt bearbeitet 21.11.2024 05:42:16

On Juniper Networks EX4300-MP Series, EX4600 Series, EX4650 Series, QFX5K Series deployed as a Virtual Chassis with a specific Layer 2 circuit configuration, Packet Forwarding Engine manager (FXPC) process may crash and restart upon receipt of specif...