CVE-2021-31359
- EPSS 0.09%
- Veröffentlicht 19.10.2021 19:15:09
- Zuletzt bearbeitet 21.11.2024 06:05:29
A local privilege escalation vulnerability in Juniper Networks Junos OS and Junos OS Evolved allows a local, low-privileged user to cause the Juniper DHCP daemon (jdhcpd) process to crash, resulting in a Denial of Service (DoS), or execute arbitrary ...
CVE-2021-31360
- EPSS 0.12%
- Veröffentlicht 19.10.2021 19:15:09
- Zuletzt bearbeitet 21.11.2024 06:05:30
An improper privilege management vulnerability in the Juniper Networks Junos OS and Junos OS Evolved command-line interpreter (CLI) allows a low-privileged user to overwrite local files as root, possibly leading to a system integrity issue or Denial ...
CVE-2021-31362
- EPSS 0.08%
- Veröffentlicht 19.10.2021 19:15:09
- Zuletzt bearbeitet 21.11.2024 06:05:30
A Protection Mechanism Failure vulnerability in RPD (routing protocol daemon) of Juniper Networks Junos OS and Junos OS Evolved allows an adjacent unauthenticated attacker to cause established IS-IS adjacencies to go down by sending a spoofed hello P...
CVE-2021-31363
- EPSS 0.08%
- Veröffentlicht 19.10.2021 19:15:09
- Zuletzt bearbeitet 21.11.2024 06:05:30
In an MPLS P2MP environment a Loop with Unreachable Exit Condition vulnerability in the routing protocol daemon (RPD) of Juniper Networks Junos OS and Junos OS Evolved allows an unauthenticated adjacent attacker to cause high load on RPD which in tur...
CVE-2021-0297
- EPSS 0.18%
- Veröffentlicht 19.10.2021 19:15:08
- Zuletzt bearbeitet 21.11.2024 05:42:25
A vulnerability in the processing of TCP MD5 authentication in Juniper Networks Junos OS Evolved may allow a BGP or LDP session configured with MD5 authentication to succeed, even if the peer does not have TCP MD5 authentication enabled. This could l...
- EPSS 0.03%
- Veröffentlicht 19.10.2021 19:15:08
- Zuletzt bearbeitet 21.11.2024 05:42:26
A Race Condition in the 'show chassis pic' command in Juniper Networks Junos OS Evolved may allow an attacker to crash the port interface concentrator daemon (picd) process on the FPC, if the command is executed coincident with other system events ou...
- EPSS 0.34%
- Veröffentlicht 19.10.2021 19:15:08
- Zuletzt bearbeitet 21.11.2024 06:05:28
An Improper Privilege Management vulnerability in the gRPC framework, used by the Juniper Extension Toolkit (JET) API on Juniper Networks Junos OS and Junos OS Evolved, allows a network-based, low-privileged authenticated attacker to perform operatio...
- EPSS 0.41%
- Veröffentlicht 19.10.2021 19:15:08
- Zuletzt bearbeitet 21.11.2024 06:05:29
An Improper Handling of Exceptional Conditions vulnerability in Juniper Networks Junos OS and Junos OS Evolved allows an attacker to inject a specific BGP update, causing the routing protocol daemon (RPD) to crash and restart, leading to a Denial of ...
CVE-2021-31354
- EPSS 0.28%
- Veröffentlicht 19.10.2021 19:15:08
- Zuletzt bearbeitet 21.11.2024 06:05:29
An Out Of Bounds (OOB) access vulnerability in the handling of responses by a Juniper Agile License (JAL) Client in Juniper Networks Junos OS and Junos OS Evolved, configured in Network Mode (to use Juniper Agile License Manager) may allow an attacke...
CVE-2021-31356
- EPSS 0.1%
- Veröffentlicht 19.10.2021 19:15:08
- Zuletzt bearbeitet 21.11.2024 06:05:29
A command injection vulnerability in command processing on Juniper Networks Junos OS Evolved allows an attacker with authenticated CLI access to be able to bypass configured access protections to execute arbitrary shell commands within the context of...