CVE-2024-39552
- EPSS 0.81%
- Veröffentlicht 11.07.2024 17:15:16
- Zuletzt bearbeitet 21.11.2024 09:27:59
An Improper Handling of Exceptional Conditions vulnerability in the routing protocol daemon (RPD) of Juniper Networks Junos OS and Junos OS Evolved allows a network based, unauthenticated attacker to cause the RPD process to crash leading to a Denial...
CVE-2024-39553
- EPSS 0.08%
- Veröffentlicht 11.07.2024 17:15:16
- Zuletzt bearbeitet 21.11.2024 09:27:59
An Exposure of Resource to Wrong Sphere vulnerability in the sampling service of Juniper Networks Junos OS Evolved allows an unauthenticated network-based attacker to send arbitrary data to the device, which leads msvcsd process to crash with limited...
CVE-2024-39549
- EPSS 0.3%
- Veröffentlicht 11.07.2024 17:15:15
- Zuletzt bearbeitet 21.11.2024 09:27:59
A Missing Release of Memory after Effective Lifetime vulnerability in the routing process daemon (rpd) of Juniper Networks Junos OS and Junos OS Evolved allows an attacker to send a malformed BGP Path attribute update which allocates memory used to l...
CVE-2024-39546
- EPSS 0.08%
- Veröffentlicht 11.07.2024 17:15:14
- Zuletzt bearbeitet 08.08.2025 16:28:55
A Missing Authorization vulnerability in the Socket Intercept (SI) command file interface of Juniper Networks Junos OS Evolved allows an authenticated, low-privilege local attacker to modify certain files, allowing the attacker to cause any command t...
CVE-2024-39548
- EPSS 0.21%
- Veröffentlicht 11.07.2024 17:15:14
- Zuletzt bearbeitet 21.11.2024 09:27:59
An Uncontrolled Resource Consumption vulnerability in the aftmand process of Juniper Networks Junos OS Evolved allows an unauthenticated, network-based attacker to consume memory resources, resulting in a Denial of Service (DoS) condition. The proces...
CVE-2024-39541
- EPSS 0.06%
- Veröffentlicht 11.07.2024 17:15:13
- Zuletzt bearbeitet 21.11.2024 09:27:58
An Improper Handling of Exceptional Conditions vulnerability in the Routing Protocol Daemon (rpd) of Juniper Networks Junos OS and Junos OS Evolved allows an unauthenticated, adjacent attacker to cause a Denial-of-Service (DoS). When conflicting inf...
CVE-2024-39542
- EPSS 0.32%
- Veröffentlicht 11.07.2024 17:15:13
- Zuletzt bearbeitet 08.08.2025 16:43:44
An Improper Validation of Syntactic Correctness of Input vulnerability in the Packet Forwarding Engine (PFE) of Juniper Networks Junos OS on MX Series with MPC10/11 or LC9600, MX304, and Junos OS Evolved on ACX Series and PTX Series allows an unauthe...
CVE-2024-39543
- EPSS 0.06%
- Veröffentlicht 11.07.2024 17:15:13
- Zuletzt bearbeitet 21.11.2024 09:27:58
A Buffer Copy without Checking Size of Input vulnerability in the routing protocol daemon (rpd) of Juniper Networks Junos OS and Juniper Networks Junos OS Evolved allows an unauthenticated, adjacent attacker to send specific RPKI-RTR packets resultin...
CVE-2024-39538
- EPSS 0.07%
- Veröffentlicht 11.07.2024 17:15:12
- Zuletzt bearbeitet 21.11.2024 09:27:57
A Buffer Copy without Checking Size of Input vulnerability in the PFE management daemon (evo-pfemand) of Juniper Networks Junos OS Evolved on ACX7000 Series allows an unauthenticated, adjacent attacker to cause a Denial-of-Service (DoS).When multic...
- EPSS 0.06%
- Veröffentlicht 11.07.2024 17:15:11
- Zuletzt bearbeitet 21.11.2024 09:27:57
A Missing Release of Memory after Effective Lifetime vulnerability in the Periodic Packet Management Daemon (ppmd) of Juniper Networks Junos OS and Junos OS Evolved allows an unauthenticated adjacent attacker to cause a Denial-of-Service (DoS). W...