CVE-2024-39532
- EPSS 0.04%
- Veröffentlicht 11.07.2024 17:15:10
- Zuletzt bearbeitet 07.01.2025 21:15:11
An Insertion of Sensitive Information into Log File vulnerability in Juniper Networks Junos OS and Junos OS Evolved allows a local, authenticated attacker with high privileges to access sensitive information. When another user performs a specific op...
CVE-2024-39560
- EPSS 0.08%
- Veröffentlicht 10.07.2024 23:15:13
- Zuletzt bearbeitet 21.11.2024 09:28:00
An Improper Handling of Exceptional Conditions vulnerability in the routing protocol daemon (rpd) of Juniper Networks Junos OS and Junos OS Evolved allows a logically adjacent downstream RSVP neighbor to cause kernel memory exhaustion, leading to a k...
CVE-2024-30406
- EPSS 0.02%
- Veröffentlicht 12.04.2024 15:15:25
- Zuletzt bearbeitet 21.11.2024 09:11:51
A Cleartext Storage in a File on Disk vulnerability in Juniper Networks Junos OS Evolved ACX Series devices using the Paragon Active Assurance Test Agent software installed on network devices allows a local, authenticated attacker with high privilege...