Juniper

Junos

756 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.24%
  • Veröffentlicht 10.10.2018 18:29:02
  • Zuletzt bearbeitet 21.11.2024 03:37:28

Receipt of a specially crafted DHCPv6 message destined to a Junos OS device configured as a DHCP server in a Broadband Edge (BBE) environment may result in a jdhcpd daemon crash. The daemon automatically restarts without intervention, but a continuou...

  • EPSS 0.17%
  • Veröffentlicht 10.10.2018 18:29:02
  • Zuletzt bearbeitet 21.11.2024 03:37:28

If a duplicate MAC address is learned by two different interfaces on an MX Series device, the MAC address learning function correctly flaps between the interfaces. However, the Layer 2 Address Learning Daemon (L2ALD) daemon might crash when attemptin...

  • EPSS 0.34%
  • Veröffentlicht 10.10.2018 18:29:02
  • Zuletzt bearbeitet 21.11.2024 03:37:28

On MX Series and M120/M320 platforms configured in a Broadband Edge (BBE) environment, subscribers logging in with DHCP Option 50 to request a specific IP address will be assigned the requested IP address, even if there is a static MAC to IP address ...

  • EPSS 1.42%
  • Veröffentlicht 10.10.2018 18:29:01
  • Zuletzt bearbeitet 21.11.2024 03:37:25

A vulnerability in the Routing Protocols Daemon (RPD) with Juniper Extension Toolkit (JET) support can allow a network based unauthenticated attacker to cause a severe memory exhaustion condition on the device. This can have an adverse impact on the ...

  • EPSS 0.68%
  • Veröffentlicht 10.10.2018 18:29:00
  • Zuletzt bearbeitet 21.11.2024 03:37:25

Receipt of a specific MPLS packet may cause the routing protocol daemon (RPD) process to crash and restart or may lead to remote code execution. By continuously sending specific MPLS packets, an attacker can repeatedly crash the RPD process causing a...

  • EPSS 0.42%
  • Veröffentlicht 10.10.2018 18:29:00
  • Zuletzt bearbeitet 21.11.2024 03:37:25

An insecure SSHD configuration in Juniper Device Manager (JDM) and host OS on Juniper NFX Series devices may allow remote unauthenticated access if any of the passwords on the system are empty. The affected SSHD configuration has the PermitEmptyPassw...

  • EPSS 0.68%
  • Veröffentlicht 10.10.2018 18:29:00
  • Zuletzt bearbeitet 21.11.2024 03:37:25

Receipt of a specific Draft-Rosen MVPN control packet may cause the routing protocol daemon (RPD) process to crash and restart or may lead to remote code execution. By continuously sending the same specific Draft-Rosen MVPN control packet, an attacke...

Exploit
  • EPSS 0.42%
  • Veröffentlicht 18.08.2018 03:29:00
  • Zuletzt bearbeitet 21.11.2024 03:50:57

An issue was discovered in Embedthis GoAhead before 4.0.1 and Appweb before 7.0.2. The server mishandles some HTTP request fields associated with time, which results in a NULL pointer dereference, as demonstrated by If-Modified-Since or If-Unmodified...

Exploit
  • EPSS 0.15%
  • Veröffentlicht 18.08.2018 03:29:00
  • Zuletzt bearbeitet 21.11.2024 03:50:57

An issue was discovered in Embedthis GoAhead before 4.0.1 and Appweb before 7.0.2. An HTTP POST request with a specially crafted "Host" header field may cause a NULL pointer dereference and thus cause a denial of service, as demonstrated by the lack ...

  • EPSS 0.06%
  • Veröffentlicht 11.07.2018 18:29:00
  • Zuletzt bearbeitet 21.11.2024 03:37:22

An Improper Privilege Management vulnerability in a shell session of Juniper Networks Junos OS allows an authenticated unprivileged attacker to gain full control of the system. Affected releases are Juniper Networks Junos OS: 12.1X46 versions prior t...