CVE-2024-47507
- EPSS 0.15%
- Published 11.10.2024 16:15:12
- Last modified 15.10.2024 12:58:51
An Improper Check for Unusual or Exceptional Conditions vulnerability in the routing protocol daemon (rpd) of Juniper Networks Junos OS and Junos OS Evolved allows an unauthenticated, network-based attacker to cause an integrity impact to the downstr...
CVE-2024-47508
- EPSS 0.2%
- Published 11.10.2024 16:15:12
- Last modified 15.10.2024 12:58:51
An Allocation of Resources Without Limits or Throttling vulnerability in the PFE management daemon (evo-pfemand) of Juniper Networks Junos OS Evolved allows an authenticated, network-based attacker to cause an FPC crash leading to a Denial of Service...
CVE-2024-47502
- EPSS 0.56%
- Published 11.10.2024 16:15:11
- Last modified 15.10.2024 12:58:51
An Allocation of Resources Without Limits or Throttling vulnerability in the kernel of Juniper Networks Junos OS Evolved allows an unauthenticated, network based attacker to cause a Denial of Service (DoS). In specific cases the state of TCP session...
CVE-2024-47498
- EPSS 0.06%
- Published 11.10.2024 16:15:10
- Last modified 15.10.2024 12:58:51
An Unimplemented or Unsupported Feature in UI vulnerability in the CLI of Juniper Networks Junos OS Evolved on QFX5000 Series allows an unauthenticated, adjacent attacker to cause a Denial-of-Service (DoS). Several configuration statements meant to ...
CVE-2024-47499
- EPSS 0.56%
- Published 11.10.2024 16:15:10
- Last modified 15.10.2024 12:58:51
An Improper Check for Unusual or Exceptional Conditions vulnerability in the routing protocol daemon (RPD) of Juniper Networks Junos OS and Junos OS Evolved allows an unauthenticated, network based attacker to cause a Denial of Service (DoS). In a ...
CVE-2024-47491
- EPSS 0.16%
- Published 11.10.2024 16:15:09
- Last modified 17.10.2024 18:15:07
An Improper Handling of Exceptional Conditions vulnerability in the Routing Protocol Daemon (rpd) of Juniper Networks Junos OS and Junos OS Evolved allows a network-based, unauthenticated attacker to cause Denial of Service (DoS). When a BGP UPDATE ...
CVE-2024-47495
- EPSS 0.03%
- Published 11.10.2024 16:15:09
- Last modified 15.10.2024 12:58:51
An Authorization Bypass Through User-Controlled Key vulnerability allows a locally authenticated attacker with shell access to gain full control of the device when Dual Routing Engines (REs) are in use on Juniper Networks Junos OS Evolved devices. T...
CVE-2024-47489
- EPSS 0.16%
- Published 11.10.2024 16:15:08
- Last modified 21.11.2024 09:39:49
An Improper Handling of Exceptional Conditions vulnerability in the Packet Forwarding Engine (pfe) of the Juniper Networks Junos OS Evolved on ACX Series devices allows an unauthenticated, network based attacker sending specific transit protocol traf...
CVE-2024-47490
- EPSS 0.4%
- Published 11.10.2024 16:15:08
- Last modified 15.10.2024 12:58:51
An Improper Restriction of Communication Channel to Intended Endpoints vulnerability in the Packet Forwarding Engine (PFE) of Juniper Networks Junos OS Evolved on ACX 7000 Series allows an unauthenticated, network based attacker to cause increased co...
- EPSS 0.02%
- Published 11.10.2024 16:15:07
- Last modified 15.10.2024 12:58:51
An Incorrect Default Permissions vulnerability in the command line interface (CLI) of Juniper Networks Junos OS Evolved allows a low privileged local attacker to view NETCONF traceoptions files, representing an exposure of sensitive information. O...