CVE-2024-39557
- EPSS 0.23%
- Veröffentlicht 10.07.2024 23:15:12
- Zuletzt bearbeitet 07.02.2025 20:07:26
An Uncontrolled Resource Consumption vulnerability in the Layer 2 Address Learning Daemon (l2ald) of Juniper Networks Junos OS Evolved allows an unauthenticated, adjacent attacker to cause a memory leak, eventually exhausting all system memory, l...
CVE-2024-39558
- EPSS 0.25%
- Veröffentlicht 10.07.2024 23:15:12
- Zuletzt bearbeitet 07.02.2025 20:06:51
An Unchecked Return Value vulnerability in the Routing Protocol Daemon (rpd) on Juniper Networks Junos OS and Juniper Networks Junos OS Evolved allows a logically adjacent, unauthenticated attacker sending a specific PIM packet to cause rpd to crash ...
CVE-2024-39559
- EPSS 0.55%
- Veröffentlicht 10.07.2024 23:15:12
- Zuletzt bearbeitet 07.02.2025 20:06:04
An Improper Check for Unusual or Exceptional Conditions vulnerability in packet processing of Juniper Networks Junos OS Evolved may allow a network-based unauthenticated attacker to crash the device (vmcore) by sending a specific TCP packet over an e...
CVE-2024-39517
- EPSS 0.15%
- Veröffentlicht 10.07.2024 23:15:11
- Zuletzt bearbeitet 07.02.2025 19:59:34
An Improper Check for Unusual or Exceptional Conditions vulnerability in the Layer 2 Address Learning Daemon (l2ald) on Juniper Networks Junos OS and Junos OS Evolved allows an unauthenticated, adjacent attacker to cause Denial of Service (DoS). In ...
CVE-2024-39554
- EPSS 0.42%
- Veröffentlicht 10.07.2024 23:15:11
- Zuletzt bearbeitet 07.02.2025 20:01:23
A Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition') vulnerability the Routing Protocol Daemon (rpd) of Juniper Networks Junos OS and Juniper Networks Junos OS Evolved allows an unauthenticated, network-ba...
CVE-2024-39555
- EPSS 1.84%
- Veröffentlicht 10.07.2024 23:15:11
- Zuletzt bearbeitet 07.02.2025 20:02:54
An Improper Handling of Exceptional Conditions vulnerability in the Routing Protocol Daemon (RPD) of Juniper Networks Junos OS and Junos OS Evolved allows an attacker sending a specific malformed BGP update message to cause the session to reset, resu...
- EPSS 0.15%
- Veröffentlicht 10.07.2024 23:15:10
- Zuletzt bearbeitet 07.02.2025 19:36:39
An Improper Physical Access Control vulnerability in the console port control of Juniper Networks Junos OS Evolved allows an attacker with physical access to the device to get access to a user account. When the console cable is disconnected, the log...
CVE-2024-39513
- EPSS 0.07%
- Veröffentlicht 10.07.2024 23:15:10
- Zuletzt bearbeitet 07.02.2025 19:38:29
An Improper Input Validation vulnerability in the Packet Forwarding Engine (PFE) of Juniper Networks Junos OS Evolved allows a local, low-privileged attacker to cause a Denial of Service (DoS). When a specific "clear" command is run, the Advanced Fo...
CVE-2024-39514
- EPSS 0.15%
- Veröffentlicht 10.07.2024 23:15:10
- Zuletzt bearbeitet 07.02.2025 19:57:23
An Improper Check or Handling of Exceptional Conditions vulnerability in the Routing Protocol Daemon (rpd) of Juniper Networks Junos and Junos OS Evolved allows an unauthenticated, adjacent attacker to cause a Denial of Service (DoS). An attacker ca...
CVE-2024-30380
- EPSS 0.1%
- Veröffentlicht 16.04.2024 20:15:09
- Zuletzt bearbeitet 07.02.2025 20:17:11
An Improper Handling of Exceptional Conditions vulnerability in Juniper Networks Junos OS and Junos OS Evolved allows an adjacent unauthenticated attacker to cause a Denial of Service (DoS), which causes the l2cpd process to crash by sending a specif...