CVE-2024-39524
- EPSS 0.18%
- Veröffentlicht 11.07.2024 16:15:03
- Zuletzt bearbeitet 21.11.2024 09:27:55
An Improper Neutralization of Special Elements vulnerability in Juniper Networks Junos OS Evolved commands allows a local, authenticated attacker with low privileges to escalate their privileges to 'root' leading to a full compromise of the system. ...
CVE-2024-39519
- EPSS 0.24%
- Veröffentlicht 11.07.2024 16:15:02
- Zuletzt bearbeitet 21.11.2024 09:27:54
An Improper Check for Unusual or Exceptional Conditions vulnerability in the Packet Forwarding Engine (PFE) of Juniper Networks Junos OS Evolved on ACX7000 Series allows an unauthenticated, adjacent attacker to cause a Denial-of-Service (DoS). On ...
CVE-2024-39520
- EPSS 0.18%
- Veröffentlicht 11.07.2024 16:15:02
- Zuletzt bearbeitet 21.11.2024 09:27:54
An Improper Neutralization of Special Elements vulnerability in Juniper Networks Junos OS Evolved commands allows a local, authenticated attacker with low privileges to escalate their privileges to 'root' leading to a full compromise of the system. ...
CVE-2024-39560
- EPSS 0.15%
- Veröffentlicht 10.07.2024 23:15:13
- Zuletzt bearbeitet 22.01.2026 21:41:25
An Improper Handling of Exceptional Conditions vulnerability in the routing protocol daemon (rpd) of Juniper Networks Junos OS and Junos OS Evolved allows a logically adjacent downstream RSVP neighbor to cause kernel memory exhaustion, leading to a k...
CVE-2024-39562
- EPSS 0.4%
- Veröffentlicht 10.07.2024 23:15:13
- Zuletzt bearbeitet 07.02.2025 20:05:34
A Missing Release of Resource after Effective Lifetime vulnerability the xinetd process, responsible for spawning SSH daemon (sshd) instances, of Juniper Networks Junos OS Evolved allows an unauthenticated network-based attacker to cause a Denial of ...
- EPSS 0.05%
- Veröffentlicht 10.07.2024 23:15:12
- Zuletzt bearbeitet 07.02.2025 20:09:15
A Stack-Based Buffer Overflow vulnerability in Juniper Networks Junos OS and Juniper Networks Junos OS Evolved may allow a local, low-privileged attacker with access to the CLI the ability to load a malicious certificate file, leading to a limited De...
CVE-2024-39557
- EPSS 0.18%
- Veröffentlicht 10.07.2024 23:15:12
- Zuletzt bearbeitet 07.02.2025 20:07:26
An Uncontrolled Resource Consumption vulnerability in the Layer 2 Address Learning Daemon (l2ald) of Juniper Networks Junos OS Evolved allows an unauthenticated, adjacent attacker to cause a memory leak, eventually exhausting all system memory, l...
CVE-2024-39558
- EPSS 0.19%
- Veröffentlicht 10.07.2024 23:15:12
- Zuletzt bearbeitet 07.02.2025 20:06:51
An Unchecked Return Value vulnerability in the Routing Protocol Daemon (rpd) on Juniper Networks Junos OS and Juniper Networks Junos OS Evolved allows a logically adjacent, unauthenticated attacker sending a specific PIM packet to cause rpd to crash ...
CVE-2024-39559
- EPSS 0.42%
- Veröffentlicht 10.07.2024 23:15:12
- Zuletzt bearbeitet 07.02.2025 20:06:04
An Improper Check for Unusual or Exceptional Conditions vulnerability in packet processing of Juniper Networks Junos OS Evolved may allow a network-based unauthenticated attacker to crash the device (vmcore) by sending a specific TCP packet over an e...
CVE-2024-39517
- EPSS 0.15%
- Veröffentlicht 10.07.2024 23:15:11
- Zuletzt bearbeitet 07.02.2025 19:59:34
An Improper Check for Unusual or Exceptional Conditions vulnerability in the Layer 2 Address Learning Daemon (l2ald) on Juniper Networks Junos OS and Junos OS Evolved allows an unauthenticated, adjacent attacker to cause Denial of Service (DoS). In ...