CVE-2022-22172
- EPSS 0.08%
- Published 19.01.2022 01:15:09
- Last modified 21.11.2024 06:46:18
A Missing Release of Memory after Effective Lifetime vulnerability in the Layer-2 control protocols daemon (l2cpd) of Juniper Networks Junos OS and Junos OS Evolved allows an unauthenticated adjacent attacker to cause a memory leak. Continued exploit...
CVE-2022-22177
- EPSS 0.24%
- Published 19.01.2022 01:15:09
- Last modified 21.11.2024 06:46:19
A release of illegal memory vulnerability in the snmpd daemon of Juniper Networks Junos OS, Junos OS Evolved allows an attacker to halt the snmpd daemon causing a sustained Denial of Service (DoS) to the service until it is manually restarted. This i...
CVE-2022-22164
- EPSS 0.31%
- Published 19.01.2022 01:15:08
- Last modified 21.11.2024 06:46:17
An Improper Initialization vulnerability in Juniper Networks Junos OS Evolved may cause a commit operation for disabling the telnet service to not take effect as expected, resulting in the telnet service staying enabled. When it is not intended to be...
CVE-2021-31383
- EPSS 0.46%
- Published 19.10.2021 19:15:11
- Last modified 21.11.2024 06:05:34
In Point to MultiPoint (P2MP) scenarios within established sessions between network or adjacent neighbors the improper use of a source to destination copy write operation combined with a Stack-based Buffer Overflow on certain specific packets process...
- EPSS 0.39%
- Published 19.10.2021 19:15:10
- Last modified 21.11.2024 06:05:32
On Juniper Networks Junos OS and Junos OS Evolved devices processing a specially crafted BGP UPDATE or KEEPALIVE message can lead to a routing process daemon (RPD) crash and restart, causing a Denial of Service (DoS). Continued receipt and processing...
CVE-2021-31358
- EPSS 0.13%
- Published 19.10.2021 19:15:09
- Last modified 21.11.2024 06:05:29
A command injection vulnerability in sftp command processing on Juniper Networks Junos OS Evolved allows an attacker with authenticated CLI access to be able to bypass configured access protections to execute arbitrary shell commands within the conte...
CVE-2021-31359
- EPSS 0.09%
- Published 19.10.2021 19:15:09
- Last modified 21.11.2024 06:05:29
A local privilege escalation vulnerability in Juniper Networks Junos OS and Junos OS Evolved allows a local, low-privileged user to cause the Juniper DHCP daemon (jdhcpd) process to crash, resulting in a Denial of Service (DoS), or execute arbitrary ...
CVE-2021-31360
- EPSS 0.12%
- Published 19.10.2021 19:15:09
- Last modified 21.11.2024 06:05:30
An improper privilege management vulnerability in the Juniper Networks Junos OS and Junos OS Evolved command-line interpreter (CLI) allows a low-privileged user to overwrite local files as root, possibly leading to a system integrity issue or Denial ...
CVE-2021-31362
- EPSS 0.08%
- Published 19.10.2021 19:15:09
- Last modified 21.11.2024 06:05:30
A Protection Mechanism Failure vulnerability in RPD (routing protocol daemon) of Juniper Networks Junos OS and Junos OS Evolved allows an adjacent unauthenticated attacker to cause established IS-IS adjacencies to go down by sending a spoofed hello P...
CVE-2021-31363
- EPSS 0.08%
- Published 19.10.2021 19:15:09
- Last modified 21.11.2024 06:05:30
In an MPLS P2MP environment a Loop with Unreachable Exit Condition vulnerability in the routing protocol daemon (RPD) of Juniper Networks Junos OS and Junos OS Evolved allows an unauthenticated adjacent attacker to cause high load on RPD which in tur...