CVE-2019-0065
- EPSS 0.28%
- Veröffentlicht 09.10.2019 20:15:17
- Zuletzt bearbeitet 21.11.2024 04:16:10
On MX Series, when the SIP ALG is enabled, receipt of a certain malformed SIP packet may crash the MS-PIC component on MS-MIC or MS-MPC. By continuously sending a crafted SIP packet, an attacker can repeatedly bring down MS-PIC on MS-MIC/MS-MPC causi...
CVE-2019-0066
- EPSS 0.47%
- Veröffentlicht 09.10.2019 20:15:17
- Zuletzt bearbeitet 21.11.2024 04:16:10
An unexpected status return value weakness in the Next-Generation Multicast VPN (NG-mVPN) service of Juniper Networks Junos OS allows attacker to cause a Denial of Service (DoS) condition and core the routing protocol daemon (rpd) process when a spec...
CVE-2019-0067
- EPSS 0.08%
- Veröffentlicht 09.10.2019 20:15:17
- Zuletzt bearbeitet 21.11.2024 04:16:10
Receipt of a specific link-local IPv6 packet destined to the RE may cause the system to crash and restart (vmcore). By continuously sending a specially crafted IPv6 packet, an attacker can repeatedly crash the system causing a prolonged Denial of Ser...
CVE-2019-0068
- EPSS 0.28%
- Veröffentlicht 09.10.2019 20:15:17
- Zuletzt bearbeitet 21.11.2024 04:16:10
The SRX flowd process, responsible for packet forwarding, may crash and restart when processing specific multicast packets. By continuously sending the specific multicast packets, an attacker can repeatedly crash the flowd process causing a sustained...
CVE-2019-0069
- EPSS 0.02%
- Veröffentlicht 09.10.2019 20:15:17
- Zuletzt bearbeitet 21.11.2024 04:16:11
On EX4600, QFX5100 Series, NFX Series, QFX10K Series, QFX5110, QFX5200 Series, QFX5110, QFX5200, QFX10K Series, vSRX, SRX1500, SRX4000 Series, vSRX, SRX1500, SRX4000, QFX5110, QFX5200, QFX10K Series, when the user uses console management port to auth...
CVE-2019-0047
- EPSS 0.65%
- Veröffentlicht 09.10.2019 20:15:16
- Zuletzt bearbeitet 21.11.2024 04:16:07
A persistent Cross-Site Scripting (XSS) vulnerability in Junos OS J-Web interface may allow remote unauthenticated attackers to perform administrative actions on the Junos device. Successful exploitation requires a Junos administrator to first perfor...
CVE-2019-0050
- EPSS 0.39%
- Veröffentlicht 09.10.2019 20:15:16
- Zuletzt bearbeitet 21.11.2024 04:16:08
Under certain heavy traffic conditions srxpfe process can crash and result in a denial of service condition for the SRX1500 device. Repeated crashes of the srxpfe can result in an extended denial of service condition. The SRX device may fail to forwa...
CVE-2019-0051
- EPSS 0.24%
- Veröffentlicht 09.10.2019 20:15:16
- Zuletzt bearbeitet 21.11.2024 04:16:08
SSL-Proxy feature on SRX devices fails to handle a hardware resource limitation which can be exploited by remote SSL/TLS servers to crash the flowd daemon. Repeated crashes of the flowd daemon can result in an extended denial of service condition. Fo...
CVE-2019-0054
- EPSS 0.08%
- Veröffentlicht 09.10.2019 20:15:16
- Zuletzt bearbeitet 21.11.2024 04:16:08
An Improper Certificate Validation weakness in the SRX Series Application Identification (app-id) signature update client of Juniper Networks Junos OS allows an attacker to perform Man-in-the-Middle (MitM) attacks which may compromise the integrity a...
CVE-2019-0055
- EPSS 0.41%
- Veröffentlicht 09.10.2019 20:15:16
- Zuletzt bearbeitet 21.11.2024 04:16:08
A vulnerability in the SIP ALG packet processing service of Juniper Networks Junos OS allows an attacker to cause a Denial of Service (DoS) to the device by sending specific types of valid SIP traffic to the device. In this case, the flowd process cr...