CVE-2024-39543
- EPSS 0.06%
- Veröffentlicht 11.07.2024 17:15:13
- Zuletzt bearbeitet 21.11.2024 09:27:58
A Buffer Copy without Checking Size of Input vulnerability in the routing protocol daemon (rpd) of Juniper Networks Junos OS and Juniper Networks Junos OS Evolved allows an unauthenticated, adjacent attacker to send specific RPKI-RTR packets resultin...
- EPSS 0.19%
- Veröffentlicht 11.07.2024 17:15:12
- Zuletzt bearbeitet 11.04.2025 14:47:34
A Missing Release of Memory after Effective Lifetime vulnerability in Juniper Networks Junos OS on MX Series allows an unauthenticated adjacent attacker to cause a Denial-of-Service (DoS). In a subscriber management scenario continuous subscriber lo...
CVE-2024-39540
- EPSS 0.52%
- Veröffentlicht 11.07.2024 17:15:12
- Zuletzt bearbeitet 11.04.2025 14:50:12
An Improper Check for Unusual or Exceptional Conditions vulnerability in the Packet Forwarding Engine (pfe) of Juniper Networks Junos OS on SRX Series, and MX Series with SPC3 allows an unauthenticated, network-based attacker to cause a Denial-of-Ser...
CVE-2024-39532
- EPSS 0.04%
- Veröffentlicht 11.07.2024 17:15:10
- Zuletzt bearbeitet 07.01.2025 21:15:11
An Insertion of Sensitive Information into Log File vulnerability in Juniper Networks Junos OS and Junos OS Evolved allows a local, authenticated attacker with high privileges to access sensitive information. When another user performs a specific op...
- EPSS 0.41%
- Veröffentlicht 11.07.2024 16:15:04
- Zuletzt bearbeitet 21.11.2024 09:27:56
A Use After Free vulnerability in the Routing Protocol Daemon (rpd) of Juniper Networks Junos OS and Junos OS Evolved allows an authenticated, network-based attacker to cause a Denial of Service (DoS).On all Junos OS and Junos Evolved platforms, if a...
CVE-2024-39529
- EPSS 0.51%
- Veröffentlicht 11.07.2024 16:15:04
- Zuletzt bearbeitet 21.11.2024 09:27:56
A Use of Externally-Controlled Format String vulnerability in the Packet Forwarding Engine (PFE) of Juniper Networks Junos OS on SRX Series allows an unauthenticated, network-based attacker to cause a Denial-of-Service (DoS). If DNS Domain Generat...
CVE-2024-39530
- EPSS 0.4%
- Veröffentlicht 11.07.2024 16:15:04
- Zuletzt bearbeitet 21.11.2024 09:27:56
An Improper Check for Unusual or Exceptional Conditions vulnerability in the chassis management daemon (chassisd) of Juniper Networks Junos OS allows an unauthenticated, network-based attacker to cause a Denial-of-Service (DoS). If an attempt is m...
CVE-2024-39560
- EPSS 0.08%
- Veröffentlicht 10.07.2024 23:15:13
- Zuletzt bearbeitet 21.11.2024 09:28:00
An Improper Handling of Exceptional Conditions vulnerability in the routing protocol daemon (rpd) of Juniper Networks Junos OS and Junos OS Evolved allows a logically adjacent downstream RSVP neighbor to cause kernel memory exhaustion, leading to a k...
CVE-2024-39561
- EPSS 0.12%
- Veröffentlicht 10.07.2024 23:15:13
- Zuletzt bearbeitet 10.04.2025 20:40:55
An Improper Check for Unusual or Exceptional Conditions vulnerability in the flow daemon (flowd) of Juniper Networks Junos OS on SRX4600 and SRX5000 Series allows an attacker to send TCP packets with SYN/FIN or SYN/RST flags, bypassing the ex...
- EPSS 0.05%
- Veröffentlicht 10.07.2024 23:15:12
- Zuletzt bearbeitet 07.02.2025 20:09:15
A Stack-Based Buffer Overflow vulnerability in Juniper Networks Junos OS and Juniper Networks Junos OS Evolved may allow a local, low-privileged attacker with access to the CLI the ability to load a malicious certificate file, leading to a limited De...