CVE-2019-0037
- EPSS 0.8%
- Veröffentlicht 10.04.2019 20:29:00
- Zuletzt bearbeitet 21.11.2024 04:16:06
In a Dynamic Host Configuration Protocol version 6 (DHCPv6) environment, the jdhcpd daemon may crash and restart upon receipt of certain DHCPv6 solicit messages received from a DHCPv6 client. By continuously sending the same crafted packet, an attack...
CVE-2019-0038
- EPSS 0.22%
- Veröffentlicht 10.04.2019 20:29:00
- Zuletzt bearbeitet 21.11.2024 04:16:06
Crafted packets destined to the management interface (fxp0) of an SRX340 or SRX345 services gateway may create a denial of service (DoS) condition due to buffer space exhaustion. This issue only affects the SRX340 and SRX345 services gateways. No oth...
CVE-2019-0039
- EPSS 0.29%
- Veröffentlicht 10.04.2019 20:29:00
- Zuletzt bearbeitet 21.11.2024 04:16:06
If REST API is enabled, the Junos OS login credentials are vulnerable to brute force attacks. The high default connection limit of the REST API may allow an attacker to brute-force passwords using advanced scripting techniques. Additionally, administ...
CVE-2019-0040
- EPSS 0.54%
- Veröffentlicht 10.04.2019 20:29:00
- Zuletzt bearbeitet 21.11.2024 04:16:06
On Junos OS, rpcbind should only be listening to port 111 on the internal routing instance (IRI). External packets destined to port 111 should be dropped. Due to an information leak vulnerability, responses were being generated from the source addres...
CVE-2019-0041
- EPSS 0.28%
- Veröffentlicht 10.04.2019 20:29:00
- Zuletzt bearbeitet 21.11.2024 04:16:06
On EX4300-MP Series devices with any lo0 filters applied, transit network traffic may reach the control plane via loopback interface (lo0). The device may fail to forward such traffic. This issue affects Juniper Networks Junos OS 18.2 versions prior ...
CVE-2017-3145
- EPSS 10.37%
- Veröffentlicht 16.01.2019 20:29:00
- Zuletzt bearbeitet 21.11.2024 03:24:55
BIND was improperly sequencing cleanup operations on upstream recursion fetch contexts, leading in some cases to a use-after-free error that can trigger an assertion failure and crash in named. Affects BIND 9.0.0 to 9.8.x, 9.9.0 to 9.9.11, 9.10.0 to ...
CVE-2019-0006
- EPSS 5.92%
- Veröffentlicht 15.01.2019 21:29:01
- Zuletzt bearbeitet 21.11.2024 04:16:01
A certain crafted HTTP packet can trigger an uninitialized function pointer deference vulnerability in the Packet Forwarding Engine manager (fxpc) on all EX, QFX and MX Series devices in a Virtual Chassis configuration. This issue can result in a cra...
- EPSS 0.5%
- Veröffentlicht 15.01.2019 21:29:01
- Zuletzt bearbeitet 21.11.2024 04:16:02
The vMX Series software uses a predictable IP ID Sequence Number. This leaves the system as well as clients connecting through the device susceptible to a family of attacks which rely on the use of predictable IP ID sequence numbers as their base met...
CVE-2019-0009
- EPSS 0.05%
- Veröffentlicht 15.01.2019 21:29:01
- Zuletzt bearbeitet 21.11.2024 04:16:02
On EX2300 and EX3400 series, high disk I/O operations may disrupt the communication between the routing engine (RE) and the packet forwarding engine (PFE). In a virtual chassis (VC) deployment, this issue disrupts communication between the VC members...
CVE-2019-0010
- EPSS 1.11%
- Veröffentlicht 15.01.2019 21:29:01
- Zuletzt bearbeitet 21.11.2024 04:16:02
An SRX Series Service Gateway configured for Unified Threat Management (UTM) may experience a system crash with the error message "mbuf exceed" -- an indication of memory buffer exhaustion -- due to the receipt of crafted HTTP traffic. Each crafted H...