- EPSS 0.2%
- Veröffentlicht 10.07.2024 23:15:10
- Zuletzt bearbeitet 07.02.2025 19:36:39
An Improper Physical Access Control vulnerability in the console port control of Juniper Networks Junos OS Evolved allows an attacker with physical access to the device to get access to a user account. When the console cable is disconnected, the log...
CVE-2024-39513
- EPSS 0.07%
- Veröffentlicht 10.07.2024 23:15:10
- Zuletzt bearbeitet 07.02.2025 19:38:29
An Improper Input Validation vulnerability in the Packet Forwarding Engine (PFE) of Juniper Networks Junos OS Evolved allows a local, low-privileged attacker to cause a Denial of Service (DoS). When a specific "clear" command is run, the Advanced Fo...
CVE-2024-39514
- EPSS 0.15%
- Veröffentlicht 10.07.2024 23:15:10
- Zuletzt bearbeitet 07.02.2025 19:57:23
An Improper Check or Handling of Exceptional Conditions vulnerability in the Routing Protocol Daemon (rpd) of Juniper Networks Junos and Junos OS Evolved allows an unauthenticated, adjacent attacker to cause a Denial of Service (DoS). An attacker ca...
CVE-2024-30380
- EPSS 0.1%
- Veröffentlicht 16.04.2024 20:15:09
- Zuletzt bearbeitet 07.02.2025 20:17:11
An Improper Handling of Exceptional Conditions vulnerability in Juniper Networks Junos OS and Junos OS Evolved allows an adjacent unauthenticated attacker to cause a Denial of Service (DoS), which causes the l2cpd process to crash by sending a specif...
CVE-2024-30403
- EPSS 0.08%
- Veröffentlicht 12.04.2024 16:15:40
- Zuletzt bearbeitet 06.02.2025 20:35:23
A NULL Pointer Dereference vulnerability in the Packet Forwarding Engine (PFE) of Juniper Networks Junos OS Evolved allows an unauthenticated, adjacent attacker to cause a Denial of Service (DoS). When Layer 2 traffic is sent through a logical inter...
CVE-2024-30402
- EPSS 0.17%
- Veröffentlicht 12.04.2024 16:15:39
- Zuletzt bearbeitet 06.02.2025 20:35:36
An Improper Check for Unusual or Exceptional Conditions vulnerability in the Layer 2 Address Learning Daemon (l2ald) of Juniper Networks Junos OS and Junos OS Evolved allows an unauthenticated, adjacent attacker to cause a Denial of Service (DoS). W...
CVE-2024-30390
- EPSS 0.08%
- Veröffentlicht 12.04.2024 16:15:38
- Zuletzt bearbeitet 06.02.2025 20:36:12
An Improper Restriction of Excessive Authentication Attempts vulnerability in Juniper Networks Junos OS Evolved allows an unauthenticated, network-based attacker to cause a limited Denial of Service (DoS) to the management plane. When an incoming co...
CVE-2024-30382
- EPSS 0.49%
- Veröffentlicht 12.04.2024 16:15:37
- Zuletzt bearbeitet 06.02.2025 20:37:07
An Improper Handling of Exceptional Conditions vulnerability in the routing protocol daemon (rpd) of Juniper Networks Junos OS and Junos OS Evolved allows a network-based, unauthenticated attacker to send a specific routing update, causing an rpd cor...
CVE-2024-30386
- EPSS 0.08%
- Veröffentlicht 12.04.2024 16:15:37
- Zuletzt bearbeitet 06.02.2025 20:36:32
A Use-After-Free vulnerability in the Layer 2 Address Learning Daemon (l2ald) of Juniper Networks Junos OS and Junos OS Evolved allows an unauthenticated, adjacent attacker to cause l2ald to crash leading to a Denial-of-Service (DoS). In an EVPN-V...
CVE-2024-30406
- EPSS 0.02%
- Veröffentlicht 12.04.2024 15:15:25
- Zuletzt bearbeitet 21.11.2024 09:11:51
A Cleartext Storage in a File on Disk vulnerability in Juniper Networks Junos OS Evolved ACX Series devices using the Paragon Active Assurance Test Agent software installed on network devices allows a local, authenticated attacker with high privilege...