- EPSS 6.95%
- Veröffentlicht 06.03.2020 15:15:14
- Zuletzt bearbeitet 21.11.2024 04:54:55
utility.c in telnetd in netkit telnet through 0.17 allows remote attackers to execute arbitrary code via short writes or urgent data, because of a buffer overflow involving the netclear and nextitem functions.
CVE-2015-3006
- EPSS 0.12%
- Veröffentlicht 28.02.2020 23:15:11
- Zuletzt bearbeitet 21.11.2024 02:28:29
On the QFX3500 and QFX3600 platforms, the number of bytes collected from the RANDOM_INTERRUPT entropy source when the device boots up is insufficient, possibly leading to weak or duplicate SSH keys or self-signed SSL/TLS certificates. Entropy increas...
CVE-2015-5361
- EPSS 0.15%
- Veröffentlicht 28.02.2020 23:15:11
- Zuletzt bearbeitet 21.11.2024 02:32:52
Background For regular, unencrypted FTP traffic, the FTP ALG can inspect the unencrypted control channel and open related sessions for the FTP data channel. These related sessions (gates) are specific to source and destination IPs and ports of client...
CVE-2014-6447
- EPSS 0.48%
- Veröffentlicht 11.02.2020 17:15:11
- Zuletzt bearbeitet 21.11.2024 02:14:24
Multiple vulnerabilities exist in Juniper Junos J-Web error handling that may lead to cross site scripting (XSS) issues or crash the J-Web service (DoS). This affects Juniper Junos OS 12.1X44 before 12.1X44-D45, 12.1X46 before 12.1X46-D30, 12.1X47 be...
CVE-2014-6448
- EPSS 0.04%
- Veröffentlicht 15.01.2020 18:15:11
- Zuletzt bearbeitet 21.11.2024 02:14:24
Juniper Junos OS 13.2 before 13.2R5, 13.2X51, 13.2X52, and 13.3 before 13.3R3 allow local users to bypass intended restrictions and execute arbitrary Python code via vectors involving shell access.
CVE-2020-1602
- EPSS 0.24%
- Veröffentlicht 15.01.2020 09:15:12
- Zuletzt bearbeitet 21.11.2024 05:10:56
When a device using Juniper Network's Dynamic Host Configuration Protocol Daemon (JDHCPD) process on Junos OS or Junos OS Evolved which is configured in relay mode it vulnerable to an attacker sending crafted IPv4 packets who may remotely take over t...
CVE-2020-1603
- EPSS 0.64%
- Veröffentlicht 15.01.2020 09:15:12
- Zuletzt bearbeitet 21.11.2024 05:10:56
Specific IPv6 packets sent by clients processed by the Routing Engine (RE) are improperly handled. These IPv6 packets are designed to be blocked by the RE from egressing the RE. Instead, the RE allows these specific IPv6 packets to egress the RE, at ...
CVE-2020-1604
- EPSS 0.24%
- Veröffentlicht 15.01.2020 09:15:12
- Zuletzt bearbeitet 21.11.2024 05:10:56
On EX4300, EX4600, QFX3500, and QFX5100 Series, a vulnerability in the IP firewall filter component may cause the firewall filter evaluation of certain packets to fail. This issue only affects firewall filter evaluation of certain packets destined to...
CVE-2020-1605
- EPSS 0.21%
- Veröffentlicht 15.01.2020 09:15:12
- Zuletzt bearbeitet 21.11.2024 05:10:56
When a device using Juniper Network's Dynamic Host Configuration Protocol Daemon (JDHCPD) process on Junos OS or Junos OS Evolved which is configured in relay mode it vulnerable to an attacker sending crafted IPv4 packets who may then arbitrarily exe...
CVE-2020-1606
- EPSS 0.32%
- Veröffentlicht 15.01.2020 09:15:12
- Zuletzt bearbeitet 21.11.2024 05:10:57
A path traversal vulnerability in the Juniper Networks Junos OS device may allow an authenticated J-web user to read files with 'world' readable permission and delete files with 'world' writeable permission. This issue does not affect system files th...