CVE-2024-39520
- EPSS 0.23%
- Veröffentlicht 11.07.2024 16:15:02
- Zuletzt bearbeitet 21.11.2024 09:27:54
An Improper Neutralization of Special Elements vulnerability in Juniper Networks Junos OS Evolved commands allows a local, authenticated attacker with low privileges to escalate their privileges to 'root' leading to a full compromise of the system. ...
CVE-2024-39560
- EPSS 0.08%
- Veröffentlicht 10.07.2024 23:15:13
- Zuletzt bearbeitet 21.11.2024 09:28:00
An Improper Handling of Exceptional Conditions vulnerability in the routing protocol daemon (rpd) of Juniper Networks Junos OS and Junos OS Evolved allows a logically adjacent downstream RSVP neighbor to cause kernel memory exhaustion, leading to a k...
CVE-2024-39562
- EPSS 0.4%
- Veröffentlicht 10.07.2024 23:15:13
- Zuletzt bearbeitet 07.02.2025 20:05:34
A Missing Release of Resource after Effective Lifetime vulnerability the xinetd process, responsible for spawning SSH daemon (sshd) instances, of Juniper Networks Junos OS Evolved allows an unauthenticated network-based attacker to cause a Denial of ...
- EPSS 0.05%
- Veröffentlicht 10.07.2024 23:15:12
- Zuletzt bearbeitet 07.02.2025 20:09:15
A Stack-Based Buffer Overflow vulnerability in Juniper Networks Junos OS and Juniper Networks Junos OS Evolved may allow a local, low-privileged attacker with access to the CLI the ability to load a malicious certificate file, leading to a limited De...
CVE-2024-39557
- EPSS 0.23%
- Veröffentlicht 10.07.2024 23:15:12
- Zuletzt bearbeitet 07.02.2025 20:07:26
An Uncontrolled Resource Consumption vulnerability in the Layer 2 Address Learning Daemon (l2ald) of Juniper Networks Junos OS Evolved allows an unauthenticated, adjacent attacker to cause a memory leak, eventually exhausting all system memory, l...
CVE-2024-39558
- EPSS 0.25%
- Veröffentlicht 10.07.2024 23:15:12
- Zuletzt bearbeitet 07.02.2025 20:06:51
An Unchecked Return Value vulnerability in the Routing Protocol Daemon (rpd) on Juniper Networks Junos OS and Juniper Networks Junos OS Evolved allows a logically adjacent, unauthenticated attacker sending a specific PIM packet to cause rpd to crash ...
CVE-2024-39559
- EPSS 0.55%
- Veröffentlicht 10.07.2024 23:15:12
- Zuletzt bearbeitet 07.02.2025 20:06:04
An Improper Check for Unusual or Exceptional Conditions vulnerability in packet processing of Juniper Networks Junos OS Evolved may allow a network-based unauthenticated attacker to crash the device (vmcore) by sending a specific TCP packet over an e...
CVE-2024-39517
- EPSS 0.15%
- Veröffentlicht 10.07.2024 23:15:11
- Zuletzt bearbeitet 07.02.2025 19:59:34
An Improper Check for Unusual or Exceptional Conditions vulnerability in the Layer 2 Address Learning Daemon (l2ald) on Juniper Networks Junos OS and Junos OS Evolved allows an unauthenticated, adjacent attacker to cause Denial of Service (DoS). In ...
CVE-2024-39554
- EPSS 0.42%
- Veröffentlicht 10.07.2024 23:15:11
- Zuletzt bearbeitet 07.02.2025 20:01:23
A Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition') vulnerability the Routing Protocol Daemon (rpd) of Juniper Networks Junos OS and Juniper Networks Junos OS Evolved allows an unauthenticated, network-ba...
CVE-2024-39555
- EPSS 1.59%
- Veröffentlicht 10.07.2024 23:15:11
- Zuletzt bearbeitet 07.02.2025 20:02:54
An Improper Handling of Exceptional Conditions vulnerability in the Routing Protocol Daemon (RPD) of Juniper Networks Junos OS and Junos OS Evolved allows an attacker sending a specific malformed BGP update message to cause the session to reset, resu...