CVE-2024-30403
- EPSS 0.08%
- Published 12.04.2024 16:15:40
- Last modified 06.02.2025 20:35:23
A NULL Pointer Dereference vulnerability in the Packet Forwarding Engine (PFE) of Juniper Networks Junos OS Evolved allows an unauthenticated, adjacent attacker to cause a Denial of Service (DoS). When Layer 2 traffic is sent through a logical inter...
CVE-2024-30402
- EPSS 0.17%
- Published 12.04.2024 16:15:39
- Last modified 06.02.2025 20:35:36
An Improper Check for Unusual or Exceptional Conditions vulnerability in the Layer 2 Address Learning Daemon (l2ald) of Juniper Networks Junos OS and Junos OS Evolved allows an unauthenticated, adjacent attacker to cause a Denial of Service (DoS). W...
CVE-2024-30390
- EPSS 0.08%
- Published 12.04.2024 16:15:38
- Last modified 06.02.2025 20:36:12
An Improper Restriction of Excessive Authentication Attempts vulnerability in Juniper Networks Junos OS Evolved allows an unauthenticated, network-based attacker to cause a limited Denial of Service (DoS) to the management plane. When an incoming co...
CVE-2024-30382
- EPSS 0.49%
- Published 12.04.2024 16:15:37
- Last modified 06.02.2025 20:37:07
An Improper Handling of Exceptional Conditions vulnerability in the routing protocol daemon (rpd) of Juniper Networks Junos OS and Junos OS Evolved allows a network-based, unauthenticated attacker to send a specific routing update, causing an rpd cor...
CVE-2024-30386
- EPSS 0.08%
- Published 12.04.2024 16:15:37
- Last modified 06.02.2025 20:36:32
A Use-After-Free vulnerability in the Layer 2 Address Learning Daemon (l2ald) of Juniper Networks Junos OS and Junos OS Evolved allows an unauthenticated, adjacent attacker to cause l2ald to crash leading to a Denial-of-Service (DoS). In an EVPN-V...
CVE-2024-30406
- EPSS 0.02%
- Published 12.04.2024 15:15:25
- Last modified 21.11.2024 09:11:51
A Cleartext Storage in a File on Disk vulnerability in Juniper Networks Junos OS Evolved ACX Series devices using the Paragon Active Assurance Test Agent software installed on network devices allows a local, authenticated attacker with high privilege...
CVE-2024-30409
- EPSS 0.09%
- Published 12.04.2024 15:15:25
- Last modified 06.02.2025 18:32:50
An Improper Check for Unusual or Exceptional Conditions vulnerability in telemetry processing of Juniper Networks Junos OS and Junos OS Evolved allows a network-based authenticated attacker to cause the forwarding information base telemetry daemon (f...
CVE-2024-21615
- EPSS 0.04%
- Published 12.04.2024 15:15:24
- Last modified 06.02.2025 18:39:32
An Incorrect Default Permissions vulnerability in Juniper Networks Junos OS and Junos OS Evolved allows a local, low-privileged attacker to access confidential information on the system. On all Junos OS and Junos OS Evolved platforms, when NETCONF t...
CVE-2024-21618
- EPSS 0.12%
- Published 12.04.2024 15:15:24
- Last modified 06.02.2025 18:39:21
An Access of Memory Location After End of Buffer vulnerability in the Layer-2 Control Protocols Daemon (l2cpd) of Juniper Networks Junos OS and Junos OS Evolved allows an adjacent, unauthenticated attacker to cause Denial of Service (DoS). On all Ju...
CVE-2024-30394
- EPSS 0.25%
- Published 12.04.2024 15:15:24
- Last modified 06.02.2025 18:39:12
A Stack-based Buffer Overflow vulnerability in the Routing Protocol Daemon (RPD) component of Junos OS and Junos OS Evolved allows an unauthenticated, network-based attacker to cause an rpd crash, leading to Denial of Service (DoS). On all Junos OS ...