Juniper

Junos Os Evolved

196 vulnerabilities found.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.08%
  • Published 12.04.2024 16:15:40
  • Last modified 06.02.2025 20:35:23

A NULL Pointer Dereference vulnerability in the Packet Forwarding Engine (PFE) of Juniper Networks Junos OS Evolved allows an unauthenticated, adjacent attacker to cause a Denial of Service (DoS). When Layer 2 traffic is sent through a logical inter...

  • EPSS 0.17%
  • Published 12.04.2024 16:15:39
  • Last modified 06.02.2025 20:35:36

An Improper Check for Unusual or Exceptional Conditions vulnerability in the Layer 2 Address Learning Daemon (l2ald) of Juniper Networks Junos OS and Junos OS Evolved allows an unauthenticated, adjacent attacker to cause a Denial of Service (DoS). W...

  • EPSS 0.08%
  • Published 12.04.2024 16:15:38
  • Last modified 06.02.2025 20:36:12

An Improper Restriction of Excessive Authentication Attempts vulnerability in Juniper Networks Junos OS Evolved allows an unauthenticated, network-based attacker to cause a limited Denial of Service (DoS) to the management plane. When an incoming co...

  • EPSS 0.49%
  • Published 12.04.2024 16:15:37
  • Last modified 06.02.2025 20:37:07

An Improper Handling of Exceptional Conditions vulnerability in the routing protocol daemon (rpd) of Juniper Networks Junos OS and Junos OS Evolved allows a network-based, unauthenticated attacker to send a specific routing update, causing an rpd cor...

  • EPSS 0.08%
  • Published 12.04.2024 16:15:37
  • Last modified 06.02.2025 20:36:32

A Use-After-Free vulnerability in the Layer 2 Address Learning Daemon (l2ald) of Juniper Networks Junos OS and Junos OS Evolved allows an unauthenticated, adjacent attacker to cause l2ald to crash leading to a Denial-of-Service (DoS). In an EVPN-V...

  • EPSS 0.02%
  • Published 12.04.2024 15:15:25
  • Last modified 21.11.2024 09:11:51

A Cleartext Storage in a File on Disk vulnerability in Juniper Networks Junos OS Evolved ACX Series devices using the Paragon Active Assurance Test Agent software installed on network devices allows a local, authenticated attacker with high privilege...

  • EPSS 0.09%
  • Published 12.04.2024 15:15:25
  • Last modified 06.02.2025 18:32:50

An Improper Check for Unusual or Exceptional Conditions vulnerability in telemetry processing of Juniper Networks Junos OS and Junos OS Evolved allows a network-based authenticated attacker to cause the forwarding information base telemetry daemon (f...

  • EPSS 0.04%
  • Published 12.04.2024 15:15:24
  • Last modified 06.02.2025 18:39:32

An Incorrect Default Permissions vulnerability in Juniper Networks Junos OS and Junos OS Evolved allows a local, low-privileged attacker to access confidential information on the system. On all Junos OS and Junos OS Evolved platforms, when NETCONF t...

  • EPSS 0.12%
  • Published 12.04.2024 15:15:24
  • Last modified 06.02.2025 18:39:21

An Access of Memory Location After End of Buffer vulnerability in the Layer-2 Control Protocols Daemon (l2cpd) of Juniper Networks Junos OS and Junos OS Evolved allows an adjacent, unauthenticated attacker to cause Denial of Service (DoS). On all Ju...

  • EPSS 0.25%
  • Published 12.04.2024 15:15:24
  • Last modified 06.02.2025 18:39:12

A Stack-based Buffer Overflow vulnerability in the Routing Protocol Daemon (RPD) component of Junos OS and Junos OS Evolved allows an unauthenticated, network-based attacker to cause an rpd crash, leading to Denial of Service (DoS). On all Junos OS ...