CVE-2019-0050
- EPSS 0.39%
- Veröffentlicht 09.10.2019 20:15:16
- Zuletzt bearbeitet 21.11.2024 04:16:08
Under certain heavy traffic conditions srxpfe process can crash and result in a denial of service condition for the SRX1500 device. Repeated crashes of the srxpfe can result in an extended denial of service condition. The SRX device may fail to forwa...
CVE-2019-0051
- EPSS 0.24%
- Veröffentlicht 09.10.2019 20:15:16
- Zuletzt bearbeitet 21.11.2024 04:16:08
SSL-Proxy feature on SRX devices fails to handle a hardware resource limitation which can be exploited by remote SSL/TLS servers to crash the flowd daemon. Repeated crashes of the flowd daemon can result in an extended denial of service condition. Fo...
CVE-2019-0054
- EPSS 0.08%
- Veröffentlicht 09.10.2019 20:15:16
- Zuletzt bearbeitet 21.11.2024 04:16:08
An Improper Certificate Validation weakness in the SRX Series Application Identification (app-id) signature update client of Juniper Networks Junos OS allows an attacker to perform Man-in-the-Middle (MitM) attacks which may compromise the integrity a...
CVE-2019-0055
- EPSS 0.41%
- Veröffentlicht 09.10.2019 20:15:16
- Zuletzt bearbeitet 21.11.2024 04:16:08
A vulnerability in the SIP ALG packet processing service of Juniper Networks Junos OS allows an attacker to cause a Denial of Service (DoS) to the device by sending specific types of valid SIP traffic to the device. In this case, the flowd process cr...
CVE-2019-0056
- EPSS 0.39%
- Veröffentlicht 09.10.2019 20:15:16
- Zuletzt bearbeitet 21.11.2024 04:16:09
This issue only affects devices with three (3) or more MPC10's installed in a single chassis with OSPF enabled and configured on the device. An Insufficient Resource Pool weakness allows an attacker to cause the device's Open Shortest Path First (OSP...
CVE-2019-0057
- EPSS 0.04%
- Veröffentlicht 09.10.2019 20:15:16
- Zuletzt bearbeitet 21.11.2024 04:16:09
An improper authorization weakness in Juniper Networks Junos OS allows a local authenticated attacker to bypass regular security controls to access the Junos Device Manager (JDM) application and take control of the system. This issue affects: Juniper...
CVE-2019-0058
- EPSS 0.04%
- Veröffentlicht 09.10.2019 20:15:16
- Zuletzt bearbeitet 21.11.2024 04:16:09
A vulnerability in the Veriexec subsystem of Juniper Networks Junos OS allowing an attacker to fully compromise the host system. A local authenticated user can elevate privileges to gain full control of the system even if they are specifically denied...
CVE-2019-0059
- EPSS 0.39%
- Veröffentlicht 09.10.2019 20:15:16
- Zuletzt bearbeitet 21.11.2024 04:16:09
A memory leak vulnerability in the of Juniper Networks Junos OS allows an attacker to cause a Denial of Service (DoS) to the device by sending specific commands from a peered BGP host and having those BGP states delivered to the vulnerable device. Th...
CVE-2019-0060
- EPSS 0.41%
- Veröffentlicht 09.10.2019 20:15:16
- Zuletzt bearbeitet 21.11.2024 04:16:09
The flowd process, responsible for forwarding traffic in SRX Series services gateways, may crash and restart when processing specific transit IP packets through an IPSec tunnel. Continued processing of these packets may result in an extended Denial o...
CVE-2019-0046
- EPSS 0.11%
- Veröffentlicht 11.07.2019 20:15:11
- Zuletzt bearbeitet 21.11.2024 04:16:07
A vulnerability in the pfe-chassisd Chassis Manager (CMLC) daemon of Juniper Networks Junos OS allows an attacker to cause a Denial of Service (DoS) to the EX4300 when specific valid broadcast packets create a broadcast storm condition when received ...