CVE-2023-44189
- EPSS 0.01%
- Veröffentlicht 11.10.2023 22:15:09
- Zuletzt bearbeitet 21.11.2024 08:25:24
An Origin Validation vulnerability in MAC address validation of Juniper Networks Junos OS Evolved on PTX10003 Series allows a network-adjacent attacker to bypass MAC address checking, allowing MAC addresses not intended to reach the adjacent LAN to ...
CVE-2023-44186
- EPSS 0.16%
- Veröffentlicht 11.10.2023 21:15:09
- Zuletzt bearbeitet 21.11.2024 08:25:23
An Improper Handling of Exceptional Conditions vulnerability in AS PATH processing of Juniper Networks Junos OS and Junos OS Evolved allows an attacker to send a BGP update message with an AS PATH containing a large number of 4-byte ASes, leading to...
CVE-2023-44187
- EPSS 0.04%
- Veröffentlicht 11.10.2023 21:15:09
- Zuletzt bearbeitet 21.11.2024 08:25:23
An Exposure of Sensitive Information vulnerability in the 'file copy' command of Junos OS Evolved allows a local, authenticated attacker with shell access to view passwords supplied on the CLI command-line. These credentials can then be used to provi...
CVE-2023-4481
- EPSS 0.85%
- Veröffentlicht 01.09.2023 00:15:08
- Zuletzt bearbeitet 21.11.2024 08:35:15
An Improper Input Validation vulnerability in the Routing Protocol Daemon (rpd) of Juniper Networks Junos OS and Junos OS Evolved allows an unauthenticated, network-based attacker to cause a Denial of Service (DoS). When certain specific crafted BGP...
CVE-2023-36836
- EPSS 0.05%
- Veröffentlicht 14.07.2023 18:15:10
- Zuletzt bearbeitet 21.11.2024 08:10:42
A Use of an Uninitialized Resource vulnerability in the routing protocol daemon (rpd) of Juniper Networks Junos OS and Junos OS Evolved allows a local, authenticated attacker with low privileges to cause a Denial of Service (DoS). On all Junos OS an...
CVE-2023-36840
- EPSS 0.07%
- Veröffentlicht 14.07.2023 18:15:10
- Zuletzt bearbeitet 21.11.2024 08:10:43
A Reachable Assertion vulnerability in Routing Protocol Daemon (RPD) of Juniper Networks Junos OS and Junos OS Evolved allows a locally-based, low-privileged attacker to cause a Denial of Service (DoS). On all Junos OS and Junos OS Evolved, when a s...
CVE-2023-36849
- EPSS 0.09%
- Veröffentlicht 14.07.2023 18:15:10
- Zuletzt bearbeitet 21.11.2024 08:10:46
An Improper Check or Handling of Exceptional Conditions vulnerability in the Layer-2 control protocols daemon (l2cpd) of Juniper Networks Junos OS and Junos OS Evolved allows an unauthenticated adjacent attacker to cause a Denial of Service (DoS). W...
CVE-2023-36833
- EPSS 0.1%
- Veröffentlicht 14.07.2023 17:15:09
- Zuletzt bearbeitet 21.11.2024 08:10:42
A Use After Free vulnerability in the packet forwarding engine (PFE) of Juniper Networks Junos OS Evolved on PTX10001-36MR, and PTX10004, PTX10008, PTX10016 with LC1201/1202 allows an adjacent, unauthenticated attacker to cause a Denial of Service (D...
CVE-2023-0026
- EPSS 0.1%
- Veröffentlicht 21.06.2023 17:15:47
- Zuletzt bearbeitet 21.11.2024 07:36:25
An Improper Input Validation vulnerability in the Routing Protocol Daemon (rpd) of Juniper Networks Junos OS and Junos OS Evolved allows an unauthenticated, network-based attacker to cause a Denial of Service (DoS). When a BGP update message is recei...
CVE-2023-28973
- EPSS 0.03%
- Veröffentlicht 17.04.2023 22:15:09
- Zuletzt bearbeitet 21.11.2024 07:56:19
An Improper Authorization vulnerability in the 'sysmanctl' shell command of Juniper Networks Junos OS Evolved allows a local, authenticated attacker to execute administrative commands that could impact the integrity of the system or system availabili...