Juniper

Junos Os Evolved

200 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.16%
  • Veröffentlicht 11.10.2023 21:15:09
  • Zuletzt bearbeitet 21.11.2024 08:25:23

An Improper Handling of Exceptional Conditions vulnerability in AS PATH processing of Juniper Networks Junos OS and Junos OS Evolved allows an attacker to send a BGP update message with an AS PATH containing a large number of 4-byte ASes, leading to...

  • EPSS 0.04%
  • Veröffentlicht 11.10.2023 21:15:09
  • Zuletzt bearbeitet 21.11.2024 08:25:23

An Exposure of Sensitive Information vulnerability in the 'file copy' command of Junos OS Evolved allows a local, authenticated attacker with shell access to view passwords supplied on the CLI command-line. These credentials can then be used to provi...

  • EPSS 0.85%
  • Veröffentlicht 01.09.2023 00:15:08
  • Zuletzt bearbeitet 21.11.2024 08:35:15

An Improper Input Validation vulnerability in the Routing Protocol Daemon (rpd) of Juniper Networks Junos OS and Junos OS Evolved allows an unauthenticated, network-based attacker to cause a Denial of Service (DoS). When certain specific crafted BGP...

  • EPSS 0.05%
  • Veröffentlicht 14.07.2023 18:15:10
  • Zuletzt bearbeitet 21.11.2024 08:10:42

A Use of an Uninitialized Resource vulnerability in the routing protocol daemon (rpd) of Juniper Networks Junos OS and Junos OS Evolved allows a local, authenticated attacker with low privileges to cause a Denial of Service (DoS). On all Junos OS an...

  • EPSS 0.07%
  • Veröffentlicht 14.07.2023 18:15:10
  • Zuletzt bearbeitet 21.11.2024 08:10:43

A Reachable Assertion vulnerability in Routing Protocol Daemon (RPD) of Juniper Networks Junos OS and Junos OS Evolved allows a locally-based, low-privileged attacker to cause a Denial of Service (DoS). On all Junos OS and Junos OS Evolved, when a s...

  • EPSS 0.09%
  • Veröffentlicht 14.07.2023 18:15:10
  • Zuletzt bearbeitet 21.11.2024 08:10:46

An Improper Check or Handling of Exceptional Conditions vulnerability in the Layer-2 control protocols daemon (l2cpd) of Juniper Networks Junos OS and Junos OS Evolved allows an unauthenticated adjacent attacker to cause a Denial of Service (DoS). W...

  • EPSS 0.1%
  • Veröffentlicht 14.07.2023 17:15:09
  • Zuletzt bearbeitet 21.11.2024 08:10:42

A Use After Free vulnerability in the packet forwarding engine (PFE) of Juniper Networks Junos OS Evolved on PTX10001-36MR, and PTX10004, PTX10008, PTX10016 with LC1201/1202 allows an adjacent, unauthenticated attacker to cause a Denial of Service (D...

  • EPSS 0.1%
  • Veröffentlicht 21.06.2023 17:15:47
  • Zuletzt bearbeitet 21.11.2024 07:36:25

An Improper Input Validation vulnerability in the Routing Protocol Daemon (rpd) of Juniper Networks Junos OS and Junos OS Evolved allows an unauthenticated, network-based attacker to cause a Denial of Service (DoS). When a BGP update message is recei...

  • EPSS 0.03%
  • Veröffentlicht 17.04.2023 22:15:09
  • Zuletzt bearbeitet 21.11.2024 07:56:19

An Improper Authorization vulnerability in the 'sysmanctl' shell command of Juniper Networks Junos OS Evolved allows a local, authenticated attacker to execute administrative commands that could impact the integrity of the system or system availabili...

  • EPSS 0.28%
  • Veröffentlicht 17.04.2023 22:15:09
  • Zuletzt bearbeitet 21.11.2024 07:56:19

An Insecure Default Initialization of Resource vulnerability in Juniper Networks Junos OS Evolved allows an unauthenticated, network based attacker to read certain confidential information. In the default configuration it is possible to read confiden...