Juniper

Junos Os Evolved

200 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.22%
  • Veröffentlicht 19.10.2021 19:15:08
  • Zuletzt bearbeitet 21.11.2024 06:05:29

A command injection vulnerability in tcpdump command processing on Juniper Networks Junos OS Evolved allows an attacker with authenticated CLI access to be able to bypass configured access protections to execute arbitrary shell commands within the co...

  • EPSS 0.08%
  • Veröffentlicht 15.07.2021 20:15:11
  • Zuletzt bearbeitet 21.11.2024 05:42:25

An Uncontrolled Resource Consumption vulnerability in the ARP daemon (arpd) and Network Discovery Protocol (ndp) process of Juniper Networks Junos OS Evolved allows a malicious attacker on the local network to consume memory resources, ultimately res...

  • EPSS 0.15%
  • Veröffentlicht 15.07.2021 20:15:10
  • Zuletzt bearbeitet 21.11.2024 05:42:24

A vulnerability in the handling of exceptional conditions in Juniper Networks Junos OS Evolved (EVO) allows an attacker to send specially crafted packets to the device, causing the Advanced Forwarding Toolkit manager (evo-aftmand-bt or evo-aftmand-zx...

  • EPSS 0.08%
  • Veröffentlicht 15.07.2021 20:15:10
  • Zuletzt bearbeitet 21.11.2024 05:42:24

In a Segment Routing ISIS (SR-ISIS)/MPLS environment, on Juniper Networks Junos OS and Junos OS Evolved devices, configured with ISIS Flexible Algorithm for Segment Routing and sensor-based statistics, a flap of a ISIS link in the network, can lead t...

  • EPSS 0.29%
  • Veröffentlicht 15.07.2021 20:15:10
  • Zuletzt bearbeitet 21.11.2024 05:42:25

An Exposure of System Data vulnerability in Juniper Networks Junos OS and Junos OS Evolved, where a sensitive system-level resource is not being sufficiently protected, allows a network-based unauthenticated attacker to send specific traffic which pa...

  • EPSS 0.27%
  • Veröffentlicht 22.04.2021 20:15:10
  • Zuletzt bearbeitet 21.11.2024 05:42:22

An always-incorrect control flow implementation in the implicit filter terms of Juniper Networks Junos OS and Junos OS Evolved on ACX5800, EX9200 Series, MX10000 Series, MX240, MX480, MX960 devices with affected Trio line cards allows an attacker to ...

  • EPSS 0.39%
  • Veröffentlicht 22.04.2021 20:15:09
  • Zuletzt bearbeitet 21.11.2024 05:42:18

In segment routing traffic engineering (SRTE) environments where the BGP Monitoring Protocol (BMP) feature is enable, a vulnerability in the Routing Protocol Daemon (RPD) process of Juniper Networks Junos OS allows an attacker to send a specific craf...

  • EPSS 0.11%
  • Veröffentlicht 22.04.2021 20:15:09
  • Zuletzt bearbeitet 21.11.2024 05:42:20

Due to a vulnerability in DDoS protection in Juniper Networks Junos OS and Junos OS Evolved on QFX5K Series switches in a VXLAN configuration, instability might be experienced in the underlay network as a consequence of exceeding the default ddos-pro...

  • EPSS 0.24%
  • Veröffentlicht 22.04.2021 20:15:09
  • Zuletzt bearbeitet 21.11.2024 05:42:21

A vulnerability in the processing of traffic matching a firewall filter containing a syslog action in Juniper Networks Junos OS on MX Series with MPC10/MPC11 cards installed, PTX10003 and PTX10008 Series devices, will cause the line card to crash and...

  • EPSS 0.19%
  • Veröffentlicht 22.04.2021 20:15:08
  • Zuletzt bearbeitet 21.11.2024 05:42:14

An Improper Check for Unusual or Exceptional Conditions in Juniper Networks Junos OS Evolved may cause the stateless firewall filter configuration which uses the action 'policer' in certain combinations with other options to not take effect. An admin...