CVE-2023-36840
- EPSS 0.07%
- Published 14.07.2023 18:15:10
- Last modified 21.11.2024 08:10:43
A Reachable Assertion vulnerability in Routing Protocol Daemon (RPD) of Juniper Networks Junos OS and Junos OS Evolved allows a locally-based, low-privileged attacker to cause a Denial of Service (DoS). On all Junos OS and Junos OS Evolved, when a s...
CVE-2023-36849
- EPSS 0.09%
- Published 14.07.2023 18:15:10
- Last modified 21.11.2024 08:10:46
An Improper Check or Handling of Exceptional Conditions vulnerability in the Layer-2 control protocols daemon (l2cpd) of Juniper Networks Junos OS and Junos OS Evolved allows an unauthenticated adjacent attacker to cause a Denial of Service (DoS). W...
CVE-2023-36833
- EPSS 0.1%
- Published 14.07.2023 17:15:09
- Last modified 21.11.2024 08:10:42
A Use After Free vulnerability in the packet forwarding engine (PFE) of Juniper Networks Junos OS Evolved on PTX10001-36MR, and PTX10004, PTX10008, PTX10016 with LC1201/1202 allows an adjacent, unauthenticated attacker to cause a Denial of Service (D...
CVE-2023-0026
- EPSS 0.1%
- Published 21.06.2023 17:15:47
- Last modified 21.11.2024 07:36:25
An Improper Input Validation vulnerability in the Routing Protocol Daemon (rpd) of Juniper Networks Junos OS and Junos OS Evolved allows an unauthenticated, network-based attacker to cause a Denial of Service (DoS). When a BGP update message is recei...
CVE-2023-28973
- EPSS 0.03%
- Published 17.04.2023 22:15:09
- Last modified 21.11.2024 07:56:19
An Improper Authorization vulnerability in the 'sysmanctl' shell command of Juniper Networks Junos OS Evolved allows a local, authenticated attacker to execute administrative commands that could impact the integrity of the system or system availabili...
CVE-2023-28978
- EPSS 0.28%
- Published 17.04.2023 22:15:09
- Last modified 21.11.2024 07:56:19
An Insecure Default Initialization of Resource vulnerability in Juniper Networks Junos OS Evolved allows an unauthenticated, network based attacker to read certain confidential information. In the default configuration it is possible to read confiden...
CVE-2023-28980
- EPSS 0.05%
- Published 17.04.2023 22:15:09
- Last modified 21.11.2024 07:56:19
A Use After Free vulnerability in the routing protocol daemon of Juniper Networks Junos OS and Junos OS Evolved allows a locally authenticated attacker with low privileges to cause Denial of Service (DoS). In a rib sharding scenario the rpd process w...
CVE-2023-28981
- EPSS 0.06%
- Published 17.04.2023 22:15:09
- Last modified 21.11.2024 07:56:20
An Improper Input Validation vulnerability in the kernel of Juniper Networks Junos OS and Junos OS Evolved allows an unauthenticated, adjacent attacker to cause a Denial of Service (DoS). If the receipt of router advertisements is enabled on an inter...
CVE-2023-28982
- EPSS 0.23%
- Published 17.04.2023 22:15:09
- Last modified 21.11.2024 07:56:20
A Missing Release of Memory after Effective Lifetime vulnerability in the routing protocol daemon of Juniper Networks Junos OS and Junos OS Evolved allows an unauthenticated, network based attacker to cause a Denial of Service (DoS). In a BGP rib sha...
CVE-2023-28983
- EPSS 0.65%
- Published 17.04.2023 22:15:09
- Last modified 21.11.2024 07:56:20
An OS Command Injection vulnerability in gRPC Network Operations Interface (gNOI) server module of Juniper Networks Junos OS Evolved allows an authenticated, low privileged, network based attacker to inject shell commands and execute code. This issue...