CVE-2014-6448
- EPSS 0.04%
- Veröffentlicht 15.01.2020 18:15:11
- Zuletzt bearbeitet 21.11.2024 02:14:24
Juniper Junos OS 13.2 before 13.2R5, 13.2X51, 13.2X52, and 13.3 before 13.3R3 allow local users to bypass intended restrictions and execute arbitrary Python code via vectors involving shell access.
CVE-2020-1602
- EPSS 0.24%
- Veröffentlicht 15.01.2020 09:15:12
- Zuletzt bearbeitet 21.11.2024 05:10:56
When a device using Juniper Network's Dynamic Host Configuration Protocol Daemon (JDHCPD) process on Junos OS or Junos OS Evolved which is configured in relay mode it vulnerable to an attacker sending crafted IPv4 packets who may remotely take over t...
CVE-2020-1603
- EPSS 0.64%
- Veröffentlicht 15.01.2020 09:15:12
- Zuletzt bearbeitet 21.11.2024 05:10:56
Specific IPv6 packets sent by clients processed by the Routing Engine (RE) are improperly handled. These IPv6 packets are designed to be blocked by the RE from egressing the RE. Instead, the RE allows these specific IPv6 packets to egress the RE, at ...
CVE-2020-1604
- EPSS 0.17%
- Veröffentlicht 15.01.2020 09:15:12
- Zuletzt bearbeitet 21.11.2024 05:10:56
On EX4300, EX4600, QFX3500, and QFX5100 Series, a vulnerability in the IP firewall filter component may cause the firewall filter evaluation of certain packets to fail. This issue only affects firewall filter evaluation of certain packets destined to...
CVE-2020-1605
- EPSS 0.21%
- Veröffentlicht 15.01.2020 09:15:12
- Zuletzt bearbeitet 21.11.2024 05:10:56
When a device using Juniper Network's Dynamic Host Configuration Protocol Daemon (JDHCPD) process on Junos OS or Junos OS Evolved which is configured in relay mode it vulnerable to an attacker sending crafted IPv4 packets who may then arbitrarily exe...
CVE-2020-1606
- EPSS 0.32%
- Veröffentlicht 15.01.2020 09:15:12
- Zuletzt bearbeitet 21.11.2024 05:10:57
A path traversal vulnerability in the Juniper Networks Junos OS device may allow an authenticated J-web user to read files with 'world' readable permission and delete files with 'world' writeable permission. This issue does not affect system files th...
CVE-2020-1607
- EPSS 0.34%
- Veröffentlicht 15.01.2020 09:15:12
- Zuletzt bearbeitet 21.11.2024 05:10:57
Insufficient Cross-Site Scripting (XSS) protection in J-Web may potentially allow a remote attacker to inject web script or HTML, hijack the target user's J-Web session and perform administrative actions on the Junos device as the targeted user. This...
CVE-2020-1608
- EPSS 0.55%
- Veröffentlicht 15.01.2020 09:15:12
- Zuletzt bearbeitet 21.11.2024 05:10:57
Receipt of a specific MPLS or IPv6 packet on the core facing interface of an MX Series device configured for Broadband Edge (BBE) service may trigger a kernel crash (vmcore), causing the device to reboot. The issue is specific to the processing of pa...
CVE-2020-1609
- EPSS 0.2%
- Veröffentlicht 15.01.2020 09:15:12
- Zuletzt bearbeitet 21.11.2024 05:10:57
When a device using Juniper Network's Dynamic Host Configuration Protocol Daemon (JDHCPD) process on Junos OS or Junos OS Evolved which is configured in relay mode it vulnerable to an attacker sending crafted IPv6 packets who may then arbitrarily exe...
CVE-2020-1600
- EPSS 0.22%
- Veröffentlicht 15.01.2020 09:15:11
- Zuletzt bearbeitet 21.11.2024 05:10:55
In a Point-to-Multipoint (P2MP) Label Switched Path (LSP) scenario, an uncontrolled resource consumption vulnerability in the Routing Protocol Daemon (RPD) in Juniper Networks Junos OS allows a specific SNMP request to trigger an infinite loop causin...