Juniper

Junos Evolved

40 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.16%
  • Veröffentlicht 11.10.2024 16:15:08
  • Zuletzt bearbeitet 21.11.2024 09:39:49

An Improper Handling of Exceptional Conditions vulnerability in the Packet Forwarding Engine (pfe) of the Juniper Networks Junos OS Evolved on ACX Series devices allows an unauthenticated, network based attacker sending specific transit protocol traf...

  • EPSS 0.05%
  • Veröffentlicht 11.10.2024 16:15:07
  • Zuletzt bearbeitet 15.10.2024 12:58:51

An Improper Handling of Exceptional Conditions vulnerability in the rpd-server of Juniper Networks Junos OS and Junos OS Evolved within cRPD allows an unauthenticated network-based attacker sending crafted TCP traffic to the routing engine (RE) to ca...

  • EPSS 0.07%
  • Veröffentlicht 11.10.2024 16:15:06
  • Zuletzt bearbeitet 15.10.2024 12:58:51

An Improper Handling of Exceptional Conditions vulnerability in packet processing of Juniper Networks Junos OS on MX Series with MPC10/MPC11/LC9600 line cards, EX9200 with EX9200-15C lines cards, MX304 devices, and Juniper Networks Junos OS Evolved o...

  • EPSS 0.06%
  • Veröffentlicht 11.07.2024 17:15:13
  • Zuletzt bearbeitet 21.11.2024 09:27:58

A Buffer Copy without Checking Size of Input vulnerability in the routing protocol daemon (rpd) of Juniper Networks Junos OS and Juniper Networks Junos OS Evolved allows an unauthenticated, adjacent attacker to send specific RPKI-RTR packets resultin...

  • EPSS 0.06%
  • Veröffentlicht 11.07.2024 17:15:13
  • Zuletzt bearbeitet 21.11.2024 09:27:58

An Improper Handling of Exceptional Conditions vulnerability in the Routing Protocol Daemon (rpd) of Juniper Networks Junos OS and Junos OS Evolved allows an unauthenticated, adjacent attacker to cause a Denial-of-Service (DoS). When conflicting inf...

  • EPSS 0.07%
  • Veröffentlicht 11.07.2024 17:15:12
  • Zuletzt bearbeitet 21.11.2024 09:27:57

A Buffer Copy without Checking Size of Input vulnerability in the PFE management daemon (evo-pfemand) of Juniper Networks Junos OS Evolved on ACX7000 Series allows an unauthenticated, adjacent attacker to cause a  Denial-of-Service (DoS).When multic...

  • EPSS 0.07%
  • Veröffentlicht 11.07.2024 17:15:10
  • Zuletzt bearbeitet 21.11.2024 09:27:57

An Improper Check for Unusual or Exceptional Conditions vulnerability in the Packet Forwarding Engine (PFE) of Juniper Networks Junos OS Evolved on ACX 7000 Series allows an unauthenticated, adjacent attacker to cause a Denial-of-Service (DoS). When...

  • EPSS 0.04%
  • Veröffentlicht 11.07.2024 17:15:10
  • Zuletzt bearbeitet 07.01.2025 21:15:11

An Insertion of Sensitive Information into Log File vulnerability in Juniper Networks Junos OS and Junos OS Evolved allows a local, authenticated attacker with high privileges to access sensitive information. When another user performs a specific op...

  • EPSS 0.08%
  • Veröffentlicht 10.07.2024 23:15:13
  • Zuletzt bearbeitet 21.11.2024 09:28:00

An Improper Handling of Exceptional Conditions vulnerability in the routing protocol daemon (rpd) of Juniper Networks Junos OS and Junos OS Evolved allows a logically adjacent downstream RSVP neighbor to cause kernel memory exhaustion, leading to a k...

  • EPSS 0.02%
  • Veröffentlicht 12.04.2024 15:15:25
  • Zuletzt bearbeitet 21.11.2024 09:11:51

A Cleartext Storage in a File on Disk vulnerability in Juniper Networks Junos OS Evolved ACX Series devices using the Paragon Active Assurance Test Agent software installed on network devices allows a local, authenticated attacker with high privilege...