Juniper

Junos Os Evolved

231 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.01%
  • Veröffentlicht 11.10.2023 22:15:09
  • Zuletzt bearbeitet 21.11.2024 08:25:24

An Origin Validation vulnerability in MAC address validation of Juniper Networks Junos OS Evolved on PTX10003 Series allows a network-adjacent attacker to bypass MAC address checking, allowing MAC addresses not intended to reach the adjacent LAN to ...

  • EPSS 0.16%
  • Veröffentlicht 11.10.2023 21:15:09
  • Zuletzt bearbeitet 21.11.2024 08:25:23

An Improper Handling of Exceptional Conditions vulnerability in AS PATH processing of Juniper Networks Junos OS and Junos OS Evolved allows an attacker to send a BGP update message with an AS PATH containing a large number of 4-byte ASes, leading to...

  • EPSS 0.04%
  • Veröffentlicht 11.10.2023 21:15:09
  • Zuletzt bearbeitet 21.11.2024 08:25:23

An Exposure of Sensitive Information vulnerability in the 'file copy' command of Junos OS Evolved allows a local, authenticated attacker with shell access to view passwords supplied on the CLI command-line. These credentials can then be used to provi...

  • EPSS 0.85%
  • Veröffentlicht 01.09.2023 00:15:08
  • Zuletzt bearbeitet 21.11.2024 08:35:15

An Improper Input Validation vulnerability in the Routing Protocol Daemon (rpd) of Juniper Networks Junos OS and Junos OS Evolved allows an unauthenticated, network-based attacker to cause a Denial of Service (DoS). When certain specific crafted BGP...

  • EPSS 0.05%
  • Veröffentlicht 14.07.2023 18:15:10
  • Zuletzt bearbeitet 21.11.2024 08:10:42

A Use of an Uninitialized Resource vulnerability in the routing protocol daemon (rpd) of Juniper Networks Junos OS and Junos OS Evolved allows a local, authenticated attacker with low privileges to cause a Denial of Service (DoS). On all Junos OS an...

  • EPSS 0.07%
  • Veröffentlicht 14.07.2023 18:15:10
  • Zuletzt bearbeitet 21.11.2024 08:10:43

A Reachable Assertion vulnerability in Routing Protocol Daemon (RPD) of Juniper Networks Junos OS and Junos OS Evolved allows a locally-based, low-privileged attacker to cause a Denial of Service (DoS). On all Junos OS and Junos OS Evolved, when a s...

  • EPSS 0.09%
  • Veröffentlicht 14.07.2023 18:15:10
  • Zuletzt bearbeitet 21.11.2024 08:10:46

An Improper Check or Handling of Exceptional Conditions vulnerability in the Layer-2 control protocols daemon (l2cpd) of Juniper Networks Junos OS and Junos OS Evolved allows an unauthenticated adjacent attacker to cause a Denial of Service (DoS). W...

  • EPSS 0.1%
  • Veröffentlicht 14.07.2023 17:15:09
  • Zuletzt bearbeitet 21.11.2024 08:10:42

A Use After Free vulnerability in the packet forwarding engine (PFE) of Juniper Networks Junos OS Evolved on PTX10001-36MR, and PTX10004, PTX10008, PTX10016 with LC1201/1202 allows an adjacent, unauthenticated attacker to cause a Denial of Service (D...

  • EPSS 0.1%
  • Veröffentlicht 21.06.2023 17:15:47
  • Zuletzt bearbeitet 21.11.2024 07:36:25

An Improper Input Validation vulnerability in the Routing Protocol Daemon (rpd) of Juniper Networks Junos OS and Junos OS Evolved allows an unauthenticated, network-based attacker to cause a Denial of Service (DoS). When a BGP update message is recei...

  • EPSS 0.03%
  • Veröffentlicht 17.04.2023 22:15:09
  • Zuletzt bearbeitet 21.11.2024 07:56:19

An Improper Authorization vulnerability in the 'sysmanctl' shell command of Juniper Networks Junos OS Evolved allows a local, authenticated attacker to execute administrative commands that could impact the integrity of the system or system availabili...