CVE-2019-11358
- EPSS 1.52%
- Veröffentlicht 20.04.2019 00:29:00
- Zuletzt bearbeitet 21.11.2024 04:20:56
jQuery before 3.4.0, as used in Drupal, Backdrop CMS, and other products, mishandles jQuery.extend(true, {}, ...) because of Object.prototype pollution. If an unsanitized source object contained an enumerable __proto__ property, it could extend the n...
CVE-2019-0043
- EPSS 0.39%
- Veröffentlicht 10.04.2019 20:29:01
- Zuletzt bearbeitet 21.11.2024 04:16:07
In MPLS environments, receipt of a specific SNMP packet may cause the routing protocol daemon (RPD) process to crash and restart. By continuously sending a specially crafted SNMP packet, an attacker can repetitively crash the RPD process causing prol...
CVE-2019-0044
- EPSS 0.6%
- Veröffentlicht 10.04.2019 20:29:01
- Zuletzt bearbeitet 21.11.2024 04:16:07
Receipt of a specific packet on the out-of-band management interface fxp0 may cause the system to crash and restart (vmcore). By continuously sending a specially crafted packet to the fxp0 interface, an attacker can repetitively crash the rpd process...
CVE-2019-0008
- EPSS 4.77%
- Veröffentlicht 10.04.2019 20:29:00
- Zuletzt bearbeitet 21.11.2024 04:16:02
A certain sequence of valid BGP or IPv6 BFD packets may trigger a stack based buffer overflow in the Junos OS Packet Forwarding Engine manager (FXPC) process on QFX5000 series, EX4300, EX4600 devices. This issue can result in a crash of the fxpc daem...
CVE-2019-0019
- EPSS 0.49%
- Veröffentlicht 10.04.2019 20:29:00
- Zuletzt bearbeitet 21.11.2024 04:16:03
When BGP tracing is enabled an incoming BGP message may cause the Junos OS routing protocol daemon (rpd) process to crash and restart. While rpd restarts after a crash, repeated crashes can result in an extended DoS condition. Affected releases are J...
CVE-2019-0028
- EPSS 0.57%
- Veröffentlicht 10.04.2019 20:29:00
- Zuletzt bearbeitet 21.11.2024 04:16:04
On Junos devices with the BGP graceful restart helper mode enabled or the BGP graceful restart mechanism enabled, a BGP session restart on a remote peer that has the graceful restart mechanism enabled may cause the local routing protocol daemon (RPD)...
CVE-2019-0031
- EPSS 0.52%
- Veröffentlicht 10.04.2019 20:29:00
- Zuletzt bearbeitet 21.11.2024 04:16:05
Specific IPv6 DHCP packets received by the jdhcpd daemon will cause a memory resource consumption issue to occur on a Junos OS device using the jdhcpd daemon configured to respond to IPv6 requests. Once started, memory consumption will eventually imp...
CVE-2019-0033
- EPSS 0.49%
- Veröffentlicht 10.04.2019 20:29:00
- Zuletzt bearbeitet 21.11.2024 04:16:05
A firewall bypass vulnerability in the proxy ARP service of Juniper Networks Junos OS allows an attacker to cause a high CPU condition leading to a Denial of Service (DoS). This issue affects only IPv4. Affected releases are Juniper Networks Junos OS...
CVE-2019-0035
- EPSS 0.04%
- Veröffentlicht 10.04.2019 20:29:00
- Zuletzt bearbeitet 21.11.2024 04:16:05
When "set system ports console insecure" is enabled, root login is disallowed for Junos OS as expected. However, the root password can be changed using "set system root-authentication plain-text-password" on systems booted from an OAM (Operations, Ad...
CVE-2019-0036
- EPSS 0.26%
- Veröffentlicht 10.04.2019 20:29:00
- Zuletzt bearbeitet 21.11.2024 04:16:05
When configuring a stateless firewall filter in Junos OS, terms named using the format "internal-n" (e.g. "internal-1", "internal-2", etc.) are silently ignored. No warning is issued during configuration, and the config is committed without error, bu...