Juniper

Junos Os Evolved

196 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.06%
  • Veröffentlicht 13.10.2023 00:15:11
  • Zuletzt bearbeitet 21.11.2024 08:25:22

A Stack-based Buffer Overflow vulnerability in the CLI command of Juniper Networks Junos OS allows a low privileged attacker to execute a specific CLI commands leading to Denial of Service. Repeated actions by the attacker will create a sustained D...

  • EPSS 0.12%
  • Veröffentlicht 13.10.2023 00:15:11
  • Zuletzt bearbeitet 21.11.2024 08:25:23

An Unchecked Return Value vulnerability in the user interfaces to the Juniper Networks Junos OS and Junos OS Evolved, the CLI, the XML API, the XML Management Protocol, the NETCONF Management Protocol, the gNMI interfaces, and the J-Web User Interfa...

  • EPSS 0.17%
  • Veröffentlicht 12.10.2023 23:15:11
  • Zuletzt bearbeitet 21.11.2024 08:25:22

A Reachable Assertion vulnerability in the routing protocol daemon (rpd) of Juniper Networks Junos OS and Junos OS Evolved allows to send specific genuine PIM packets to the device resulting in rpd to crash causing a Denial of Service (DoS). Contin...

  • EPSS 0.04%
  • Veröffentlicht 12.10.2023 23:15:10
  • Zuletzt bearbeitet 21.11.2024 08:10:43

An Improper Validation of Specified Quantity in Input vulnerability in the Layer-2 control protocols daemon (l2cpd) of Juniper Networks Junos OS and Junos OS Evolved allows an unauthenticated adjacent attacker who sends specific LLDP packets to caus...

  • EPSS 0.01%
  • Veröffentlicht 11.10.2023 22:15:10
  • Zuletzt bearbeitet 21.11.2024 08:25:24

An Origin Validation vulnerability in MAC address validation of Juniper Networks Junos OS Evolved on PTX10001, PTX10004, PTX10008, and PTX10016 devices allows a network-adjacent attacker to bypass MAC address checking, allowing MAC addresses not int...

  • EPSS 0.01%
  • Veröffentlicht 11.10.2023 22:15:09
  • Zuletzt bearbeitet 21.11.2024 08:25:24

An Origin Validation vulnerability in MAC address validation of Juniper Networks Junos OS Evolved on PTX10003 Series allows a network-adjacent attacker to bypass MAC address checking, allowing MAC addresses not intended to reach the adjacent LAN to ...

  • EPSS 0.16%
  • Veröffentlicht 11.10.2023 21:15:09
  • Zuletzt bearbeitet 21.11.2024 08:25:23

An Improper Handling of Exceptional Conditions vulnerability in AS PATH processing of Juniper Networks Junos OS and Junos OS Evolved allows an attacker to send a BGP update message with an AS PATH containing a large number of 4-byte ASes, leading to...

  • EPSS 0.04%
  • Veröffentlicht 11.10.2023 21:15:09
  • Zuletzt bearbeitet 21.11.2024 08:25:23

An Exposure of Sensitive Information vulnerability in the 'file copy' command of Junos OS Evolved allows a local, authenticated attacker with shell access to view passwords supplied on the CLI command-line. These credentials can then be used to provi...

  • EPSS 1.3%
  • Veröffentlicht 01.09.2023 00:15:08
  • Zuletzt bearbeitet 21.11.2024 08:35:15

An Improper Input Validation vulnerability in the Routing Protocol Daemon (rpd) of Juniper Networks Junos OS and Junos OS Evolved allows an unauthenticated, network-based attacker to cause a Denial of Service (DoS). When certain specific crafted BGP...

  • EPSS 0.05%
  • Veröffentlicht 14.07.2023 18:15:10
  • Zuletzt bearbeitet 21.11.2024 08:10:42

A Use of an Uninitialized Resource vulnerability in the routing protocol daemon (rpd) of Juniper Networks Junos OS and Junos OS Evolved allows a local, authenticated attacker with low privileges to cause a Denial of Service (DoS). On all Junos OS an...