CVE-2024-39547
- EPSS 0.05%
- Published 11.10.2024 16:15:07
- Last modified 15.10.2024 12:58:51
An Improper Handling of Exceptional Conditions vulnerability in the rpd-server of Juniper Networks Junos OS and Junos OS Evolved within cRPD allows an unauthenticated network-based attacker sending crafted TCP traffic to the routing engine (RE) to ca...
CVE-2024-39526
- EPSS 0.07%
- Published 11.10.2024 16:15:06
- Last modified 15.10.2024 12:58:51
An Improper Handling of Exceptional Conditions vulnerability in packet processing of Juniper Networks Junos OS on MX Series with MPC10/MPC11/LC9600 line cards, EX9200 with EX9200-15C lines cards, MX304 devices, and Juniper Networks Junos OS Evolved o...
CVE-2024-39534
- EPSS 0.07%
- Published 11.10.2024 16:15:06
- Last modified 15.10.2024 12:58:51
An Incorrect Comparison vulnerability in the local address verification API of Juniper Networks Junos OS Evolved allows an unauthenticated network-adjacent attacker to create sessions or send traffic to the device using the network and broadcast addr...
CVE-2024-39515
- EPSS 0.21%
- Published 09.10.2024 20:15:08
- Last modified 10.10.2024 12:51:56
An Improper Validation of Consistency within Input vulnerability in the routing protocol daemon (rpd) of Juniper Networks Junos OS and Junos OS Evolved allows an unauthenticated network-based attacker sending a specifically malformed BGP packet to ca...
CVE-2024-39516
- EPSS 0.21%
- Published 09.10.2024 20:15:08
- Last modified 16.10.2024 22:15:02
An Out-of-Bounds Read vulnerability in the routing protocol daemon (rpd) of Juniper Networks Junos OS and Junos OS Evolved allows an unauthenticated network-based attacker sending a specifically malformed BGP packet to cause rpd to crash and rest...
CVE-2024-39525
- EPSS 0.21%
- Published 09.10.2024 20:15:08
- Last modified 10.10.2024 12:51:56
An Improper Handling of Exceptional Conditions vulnerability in the routing protocol daemon (rpd) of Juniper Networks Junos OS and Junos OS Evolved allows an unauthenticated network-based attacker sending a specific BGP packet to cause rpd to crash a...
CVE-2024-39552
- EPSS 0.81%
- Published 11.07.2024 17:15:16
- Last modified 21.11.2024 09:27:59
An Improper Handling of Exceptional Conditions vulnerability in the routing protocol daemon (RPD) of Juniper Networks Junos OS and Junos OS Evolved allows a network based, unauthenticated attacker to cause the RPD process to crash leading to a Denial...
CVE-2024-39553
- EPSS 0.08%
- Published 11.07.2024 17:15:16
- Last modified 21.11.2024 09:27:59
An Exposure of Resource to Wrong Sphere vulnerability in the sampling service of Juniper Networks Junos OS Evolved allows an unauthenticated network-based attacker to send arbitrary data to the device, which leads msvcsd process to crash with limited...
CVE-2024-39549
- EPSS 0.3%
- Published 11.07.2024 17:15:15
- Last modified 21.11.2024 09:27:59
A Missing Release of Memory after Effective Lifetime vulnerability in the routing process daemon (rpd) of Juniper Networks Junos OS and Junos OS Evolved allows an attacker to send a malformed BGP Path attribute update which allocates memory used to l...
CVE-2024-39546
- EPSS 0.06%
- Published 11.07.2024 17:15:14
- Last modified 08.08.2025 16:28:55
A Missing Authorization vulnerability in the Socket Intercept (SI) command file interface of Juniper Networks Junos OS Evolved allows an authenticated, low-privilege local attacker to modify certain files, allowing the attacker to cause any command t...