CVE-2024-47505
- EPSS 0.13%
- Veröffentlicht 11.10.2024 16:15:12
- Zuletzt bearbeitet 23.01.2026 20:03:56
An Allocation of Resources Without Limits or Throttling vulnerability in the PFE management daemon (evo-pfemand) of Juniper Networks Junos OS Evolved allows an authenticated, network-based attacker to cause an FPC crash leading to a Denial of Service...
CVE-2024-47502
- EPSS 0.43%
- Veröffentlicht 11.10.2024 16:15:11
- Zuletzt bearbeitet 26.01.2026 18:26:55
An Allocation of Resources Without Limits or Throttling vulnerability in the kernel of Juniper Networks Junos OS Evolved allows an unauthenticated, network based attacker to cause a Denial of Service (DoS). In specific cases the state of TCP session...
CVE-2024-47498
- EPSS 0.15%
- Veröffentlicht 11.10.2024 16:15:10
- Zuletzt bearbeitet 26.01.2026 18:25:35
An Unimplemented or Unsupported Feature in UI vulnerability in the CLI of Juniper Networks Junos OS Evolved on QFX5000 Series allows an unauthenticated, adjacent attacker to cause a Denial-of-Service (DoS). Several configuration statements meant to ...
CVE-2024-47495
- EPSS 0.01%
- Veröffentlicht 11.10.2024 16:15:09
- Zuletzt bearbeitet 26.01.2026 18:19:19
An Authorization Bypass Through User-Controlled Key vulnerability allows a locally authenticated attacker with shell access to gain full control of the device when Dual Routing Engines (REs) are in use on Juniper Networks Junos OS Evolved devices. T...
CVE-2024-47491
- EPSS 0.16%
- Veröffentlicht 11.10.2024 16:15:09
- Zuletzt bearbeitet 26.01.2026 18:19:28
An Improper Handling of Exceptional Conditions vulnerability in the Routing Protocol Daemon (rpd) of Juniper Networks Junos OS and Junos OS Evolved allows a network-based, unauthenticated attacker to cause Denial of Service (DoS). When a BGP UPDATE ...
CVE-2024-47490
- EPSS 0.22%
- Veröffentlicht 11.10.2024 16:15:08
- Zuletzt bearbeitet 26.01.2026 18:19:32
An Improper Restriction of Communication Channel to Intended Endpoints vulnerability in the Packet Forwarding Engine (PFE) of Juniper Networks Junos OS Evolved on ACX 7000 Series allows an unauthenticated, network based attacker to cause increased co...
CVE-2024-47489
- EPSS 0.07%
- Veröffentlicht 11.10.2024 16:15:08
- Zuletzt bearbeitet 26.01.2026 18:19:37
An Improper Handling of Exceptional Conditions vulnerability in the Packet Forwarding Engine (pfe) of the Juniper Networks Junos OS Evolved on ACX Series devices allows an unauthenticated, network based attacker sending specific transit protocol traf...
CVE-2024-39547
- EPSS 0.04%
- Veröffentlicht 11.10.2024 16:15:07
- Zuletzt bearbeitet 26.01.2026 18:19:43
An Improper Handling of Exceptional Conditions vulnerability in the rpd-server of Juniper Networks Junos OS and Junos OS Evolved within cRPD allows an unauthenticated network-based attacker sending crafted TCP traffic to the routing engine (RE) to ca...
CVE-2024-39526
- EPSS 0.08%
- Veröffentlicht 11.10.2024 16:15:06
- Zuletzt bearbeitet 23.01.2026 18:54:32
An Improper Handling of Exceptional Conditions vulnerability in packet processing of Juniper Networks Junos OS on MX Series with MPC10/MPC11/LC9600 line cards, EX9200 with EX9200-15C lines cards, MX304 devices, and Juniper Networks Junos OS Evolved o...
CVE-2024-39543
- EPSS 0.15%
- Veröffentlicht 11.07.2024 17:15:13
- Zuletzt bearbeitet 23.01.2026 19:24:02
A Buffer Copy without Checking Size of Input vulnerability in the routing protocol daemon (rpd) of Juniper Networks Junos OS and Juniper Networks Junos OS Evolved allows an unauthenticated, adjacent attacker to send specific RPKI-RTR packets resultin...