CVE-2023-36840
- EPSS 0.07%
- Veröffentlicht 14.07.2023 18:15:10
- Zuletzt bearbeitet 21.11.2024 08:10:43
A Reachable Assertion vulnerability in Routing Protocol Daemon (RPD) of Juniper Networks Junos OS and Junos OS Evolved allows a locally-based, low-privileged attacker to cause a Denial of Service (DoS). On all Junos OS and Junos OS Evolved, when a s...
CVE-2023-36849
- EPSS 0.09%
- Veröffentlicht 14.07.2023 18:15:10
- Zuletzt bearbeitet 21.11.2024 08:10:46
An Improper Check or Handling of Exceptional Conditions vulnerability in the Layer-2 control protocols daemon (l2cpd) of Juniper Networks Junos OS and Junos OS Evolved allows an unauthenticated adjacent attacker to cause a Denial of Service (DoS). W...
CVE-2023-36833
- EPSS 0.1%
- Veröffentlicht 14.07.2023 17:15:09
- Zuletzt bearbeitet 21.11.2024 08:10:42
A Use After Free vulnerability in the packet forwarding engine (PFE) of Juniper Networks Junos OS Evolved on PTX10001-36MR, and PTX10004, PTX10008, PTX10016 with LC1201/1202 allows an adjacent, unauthenticated attacker to cause a Denial of Service (D...
CVE-2023-0026
- EPSS 0.1%
- Veröffentlicht 21.06.2023 17:15:47
- Zuletzt bearbeitet 21.11.2024 07:36:25
An Improper Input Validation vulnerability in the Routing Protocol Daemon (rpd) of Juniper Networks Junos OS and Junos OS Evolved allows an unauthenticated, network-based attacker to cause a Denial of Service (DoS). When a BGP update message is recei...
CVE-2023-28973
- EPSS 0.03%
- Veröffentlicht 17.04.2023 22:15:09
- Zuletzt bearbeitet 21.11.2024 07:56:19
An Improper Authorization vulnerability in the 'sysmanctl' shell command of Juniper Networks Junos OS Evolved allows a local, authenticated attacker to execute administrative commands that could impact the integrity of the system or system availabili...
CVE-2023-28978
- EPSS 0.28%
- Veröffentlicht 17.04.2023 22:15:09
- Zuletzt bearbeitet 21.11.2024 07:56:19
An Insecure Default Initialization of Resource vulnerability in Juniper Networks Junos OS Evolved allows an unauthenticated, network based attacker to read certain confidential information. In the default configuration it is possible to read confiden...
CVE-2023-28980
- EPSS 0.05%
- Veröffentlicht 17.04.2023 22:15:09
- Zuletzt bearbeitet 21.11.2024 07:56:19
A Use After Free vulnerability in the routing protocol daemon of Juniper Networks Junos OS and Junos OS Evolved allows a locally authenticated attacker with low privileges to cause Denial of Service (DoS). In a rib sharding scenario the rpd process w...
CVE-2023-28981
- EPSS 0.06%
- Veröffentlicht 17.04.2023 22:15:09
- Zuletzt bearbeitet 21.11.2024 07:56:20
An Improper Input Validation vulnerability in the kernel of Juniper Networks Junos OS and Junos OS Evolved allows an unauthenticated, adjacent attacker to cause a Denial of Service (DoS). If the receipt of router advertisements is enabled on an inter...
CVE-2023-28982
- EPSS 0.23%
- Veröffentlicht 17.04.2023 22:15:09
- Zuletzt bearbeitet 21.11.2024 07:56:20
A Missing Release of Memory after Effective Lifetime vulnerability in the routing protocol daemon of Juniper Networks Junos OS and Junos OS Evolved allows an unauthenticated, network based attacker to cause a Denial of Service (DoS). In a BGP rib sha...
CVE-2023-28983
- EPSS 0.65%
- Veröffentlicht 17.04.2023 22:15:09
- Zuletzt bearbeitet 21.11.2024 07:56:20
An OS Command Injection vulnerability in gRPC Network Operations Interface (gNOI) server module of Juniper Networks Junos OS Evolved allows an authenticated, low privileged, network based attacker to inject shell commands and execute code. This issue...