Lucene search

K

19 matches found

CVE
CVE
added 2024/07/11 5:15 p.m.68 views

CVE-2024-39549

A Missing Release of Memory after Effective Lifetime vulnerability in the routing process daemon (rpd) of Juniper Networks Junos OS and Junos OS Evolved allows an attacker to send a malformed BGP Path attribute update which allocates memory used to log the bad path attribute. This memory is not pro...

8.7CVSS7.5AI score0.0024EPSS
CVE
CVE
added 2024/07/11 4:15 p.m.58 views

CVE-2024-39521

An Improper Neutralization of Special Elements vulnerability in Juniper Networks Junos OS Evolved commands allows a local, authenticated attacker with low privileges to escalate their privileges to 'root' leading to a full compromise of the system. The Junos OS Evolved CLI doesn't properly handle c...

8.5CVSS7.9AI score0.00148EPSS
CVE
CVE
added 2024/07/10 11:15 p.m.52 views

CVE-2024-39514

An Improper Check or Handling of Exceptional Conditions vulnerability in the Routing Protocol Daemon (rpd) of Juniper Networks Junos and Junos OS Evolved allows an unauthenticated, adjacent attacker to cause a Denial of Service (DoS). An attacker can send specific traffic to the device, which cause...

7.1CVSS6.6AI score0.00074EPSS
CVE
CVE
added 2024/07/11 4:15 p.m.52 views

CVE-2024-39528

A Use After Free vulnerability in the Routing Protocol Daemon (rpd) of Juniper Networks Junos OS and Junos OS Evolved allows an authenticated, network-based attacker to cause a Denial of Service (DoS).On all Junos OS and Junos Evolved platforms, if a routing-instance deactivation is triggered, and ...

6CVSS5.5AI score0.00209EPSS
CVE
CVE
added 2024/07/10 11:15 p.m.52 views

CVE-2024-39558

An Unchecked Return Value vulnerability in the Routing Protocol Daemon (rpd) on Juniper Networks Junos OS and Juniper Networks Junos OS Evolved allows a logically adjacent, unauthenticated attacker sending a specific PIM packet to cause rpd to crash and restart, resulting in a Denial of Service (Do...

7.1CVSS6.4AI score0.00068EPSS
CVE
CVE
added 2024/07/11 4:15 p.m.49 views

CVE-2024-39524

An Improper Neutralization of Special Elements vulnerability in Juniper Networks Junos OS Evolved commands allows a local, authenticated attacker with low privileges to escalate their privileges to 'root' leading to a full compromise of the system. The Junos OS Evolved CLI doesn't properly handle c...

8.5CVSS7.9AI score0.00148EPSS
CVE
CVE
added 2024/07/11 4:15 p.m.48 views

CVE-2024-39520

An Improper Neutralization of Special Elements vulnerability in Juniper Networks Junos OS Evolved commands allows a local, authenticated attacker with low privileges to escalate their privileges to 'root' leading to a full compromise of the system. The Junos OS Evolved CLI doesn't properly handle c...

8.5CVSS7.9AI score0.00148EPSS
CVE
CVE
added 2024/07/10 11:15 p.m.47 views

CVE-2024-39559

An Improper Check for Unusual or Exceptional Conditions vulnerability in packet processing of Juniper Networks Junos OS Evolved may allow a network-based unauthenticated attacker to crash the device (vmcore) by sending a specific TCP packet over an established TCP session with MD5 authentication en...

8.2CVSS6AI score0.00149EPSS
CVE
CVE
added 2024/07/11 4:15 p.m.46 views

CVE-2024-39523

An Improper Neutralization of Special Elements vulnerability in Juniper Networks Junos OS Evolved commands allows a local, authenticated attacker with low privileges to escalate their privileges to 'root' leading to a full compromise of the system. The Junos OS Evolved CLI doesn't properly handle c...

8.5CVSS7.9AI score0.00148EPSS
CVE
CVE
added 2024/07/10 11:15 p.m.45 views

CVE-2024-39512

An Improper Physical Access Control vulnerability in the console port control of Juniper Networks Junos OS Evolved allows an attacker with physical access to the device to get access to a user account. When the console cable is disconnected, the logged in user is not logged out. This allows a malic...

7CVSS6.6AI score0.00045EPSS
CVE
CVE
added 2024/07/10 11:15 p.m.45 views

CVE-2024-39513

An Improper Input Validation vulnerability in the Packet Forwarding Engine (PFE) of Juniper Networks Junos OS Evolved allows a local, low-privileged attacker to cause a Denial of Service (DoS). When a specific "clear" command is run, the Advanced Forwarding Toolkit manager (evo-aftmand-bt or evo-af...

6.8CVSS5.5AI score0.00033EPSS
CVE
CVE
added 2024/07/10 11:15 p.m.45 views

CVE-2024-39517

An Improper Check for Unusual or Exceptional Conditions vulnerability in the Layer 2 Address Learning Daemon (l2ald) on Juniper Networks Junos OS and Junos OS Evolved allows an unauthenticated, adjacent attacker to cause Denial of Service (DoS). In an EVPN/VXLAN scenario, when a high amount specifi...

7.1CVSS6.5AI score0.00074EPSS
CVE
CVE
added 2024/07/10 11:15 p.m.44 views

CVE-2024-39556

A Stack-Based Buffer Overflow vulnerability in Juniper Networks Junos OS and Juniper Networks Junos OS Evolved may allow a local, low-privileged attacker with access to the CLI the ability to load a malicious certificate file, leading to a limited Denial of Service (DoS) or privileged code executio...

7.1CVSS6.6AI score0.0002EPSS
CVE
CVE
added 2024/07/11 4:15 p.m.42 views

CVE-2024-39522

An Improper Neutralization of Special Elements vulnerability in Juniper Networks Junos OS Evolved commands allows a local, authenticated attacker with low privileges to escalate their privileges to 'root' leading to a full compromise of the system. The Junos OS Evolved CLI doesn't properly handle c...

8.5CVSS7.9AI score0.00148EPSS
CVE
CVE
added 2024/07/10 11:15 p.m.42 views

CVE-2024-39562

A Missing Release of Resource after Effective Lifetime vulnerability the xinetd process, responsible for spawning SSH daemon (sshd) instances, of Juniper Networks Junos OS Evolved allows an unauthenticated network-based attacker to cause a Denial of Service (DoS) by blocking SSH access for legitima...

8.7CVSS7.5AI score0.00291EPSS
CVE
CVE
added 2024/07/11 4:15 p.m.41 views

CVE-2024-39519

An Improper Check for Unusual or Exceptional Conditions vulnerability in the Packet Forwarding Engine (PFE) of Juniper Networks Junos OS Evolved on ACX7000 Series allows an unauthenticated, adjacent attacker to cause a Denial-of-Service (DoS). On all ACX 7000 Series platforms running Junos OS Evolv...

7.1CVSS6.5AI score0.00074EPSS
CVE
CVE
added 2024/07/10 11:15 p.m.41 views

CVE-2024-39554

A Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition') vulnerability the Routing Protocol Daemon (rpd) of Juniper Networks Junos OS and Juniper Networks Junos OS Evolved allows an unauthenticated, network-based attacker to inject incremental routing updates wh...

8.2CVSS5.8AI score0.00269EPSS
CVE
CVE
added 2024/07/10 11:15 p.m.41 views

CVE-2024-39555

An Improper Handling of Exceptional Conditions vulnerability in the Routing Protocol Daemon (RPD) of Juniper Networks Junos OS and Junos OS Evolved allows an attacker sending a specific malformed BGP update message to cause the session to reset, resulting in a Denial of Service (DoS). Continued rec...

8.7CVSS7.7AI score0.00676EPSS
CVE
CVE
added 2024/07/10 11:15 p.m.40 views

CVE-2024-39557

An Uncontrolled Resource Consumption vulnerability in the Layer 2 Address Learning Daemon (l2ald) of Juniper Networks Junos OS Evolved allows an unauthenticated, adjacent attacker to cause a memory leak, eventually exhausting all system memory, leading to a system crash and Denial of Service (DoS)....

7.1CVSS6.6AI score0.00074EPSS