Juniper

Junos

756 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.3%
  • Veröffentlicht 10.01.2018 22:29:01
  • Zuletzt bearbeitet 21.11.2024 03:37:20

A high rate of VLAN authentication attempts sent from an adjacent host on the local broadcast domain can trigger high memory utilization by the BBE subscriber management daemon (bbe-smgd), and lead to a denial of service condition. The issue was caus...

  • EPSS 0.44%
  • Veröffentlicht 10.01.2018 22:29:01
  • Zuletzt bearbeitet 21.11.2024 03:37:20

An unauthenticated network-based attacker able to send a maliciously crafted LLDP packet to the local segment, through a local segment broadcast, may be able to cause a Junos device to enter an improper boundary check condition allowing a memory corr...

  • EPSS 0.15%
  • Veröffentlicht 10.01.2018 22:29:01
  • Zuletzt bearbeitet 21.11.2024 03:37:20

An unauthenticated root login may allow upon reboot when a commit script is used. A commit script allows a device administrator to execute certain instructions during commit, which is configured under the [system scripts commit] stanza. Certain commi...

  • EPSS 0.18%
  • Veröffentlicht 10.01.2018 22:29:01
  • Zuletzt bearbeitet 21.11.2024 03:37:20

On Juniper Networks SRX series devices, firewall rules configured to match custom application UUIDs starting with zeros can match all TCP traffic. Due to this issue, traffic that should have been blocked by other rules is permitted to flow through th...

  • EPSS 4.22%
  • Veröffentlicht 10.01.2018 22:29:00
  • Zuletzt bearbeitet 21.11.2024 03:37:19

A remote, unauthenticated attacker may be able to execute code by exploiting a use-after-free defect found in older versions of PHP through injection of crafted data via specific PHP URLs within the context of the J-Web process. Affected releases are...

  • EPSS 1.84%
  • Veröffentlicht 10.01.2018 22:29:00
  • Zuletzt bearbeitet 21.11.2024 03:37:19

On SRX Series and MX Series devices with a Service PIC with any ALG enabled, a crafted TCP/IP response packet processed through the device results in memory corruption leading to a flowd daemon crash. Sustained crafted response packets lead to repeat...

  • EPSS 0.15%
  • Veröffentlicht 13.10.2017 17:29:00
  • Zuletzt bearbeitet 20.04.2025 01:37:25

J-Web does not validate certain input that may lead to cross-site request forgery (CSRF) issues or cause a denial of J-Web service (DoS).

  • EPSS 1.35%
  • Veröffentlicht 13.10.2017 17:29:00
  • Zuletzt bearbeitet 20.04.2025 01:37:25

By flooding a Juniper Networks router running Junos OS with specially crafted IPv6 traffic, all available resources can be consumed, leading to the inability to store next hop information for legitimate traffic. In extreme cases, the crafted IPv6 tra...

  • EPSS 0.08%
  • Veröffentlicht 13.10.2017 17:29:00
  • Zuletzt bearbeitet 20.04.2025 01:37:25

Certain combinations of Junos OS CLI commands and arguments have been found to be exploitable in a way that can allow unauthorized access to the operating system. This may allow any user with permissions to run these CLI commands the ability to achie...

  • EPSS 0.33%
  • Veröffentlicht 13.10.2017 17:29:00
  • Zuletzt bearbeitet 20.04.2025 01:37:25

Insufficient cross site scripting protection in J-Web component in Juniper Networks Junos OS may potentially allow a remote unauthenticated user to inject web script or HTML and steal sensitive data and credentials from a J-Web session and to perform...