Lucene search

K
JuniperJunos23.4

8 matches found

CVE
CVE
added 2025/03/12 2:15 p.m.189 views

CVE-2025-21590

An Improper Isolation or Compartmentalization vulnerability in the kernel of Juniper Networks Junos OS allows a local attacker with high privileges to compromise the integrity of the device. A local attacker with access to the shell is able to inject arbitrary code which can compromise an affected ...

6.7CVSS4.9AI score0.01009EPSS
CVE
CVE
added 2024/07/11 5:15 p.m.68 views

CVE-2024-39549

A Missing Release of Memory after Effective Lifetime vulnerability in the routing process daemon (rpd) of Juniper Networks Junos OS and Junos OS Evolved allows an attacker to send a malformed BGP Path attribute update which allocates memory used to log the bad path attribute. This memory is not pro...

8.7CVSS7.5AI score0.0024EPSS
CVE
CVE
added 2024/01/25 11:15 p.m.55 views

CVE-2024-21620

An Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in J-Web of Juniper Networks Junos OS on SRX Series and EX Series allows an attacker to construct a URL that when visited by another user enables the attacker to execute commands with the target's ...

8.8CVSS7.1AI score0.00345EPSS
CVE
CVE
added 2024/07/11 5:15 p.m.55 views

CVE-2024-39550

A Missing Release of Memory after Effective Lifetime vulnerability in the rtlogd process of Juniper Networks Junos OS on MX Series with SPC3 allows an unauthenticated, adjacent attacker to trigger internal events cause ( which can be done by repeated port flaps) to cause a slow memory leak, ultimat...

7.1CVSS6.4AI score0.00074EPSS
CVE
CVE
added 2024/07/10 11:15 p.m.52 views

CVE-2024-39561

An Improper Check for Unusual or Exceptional Conditions vulnerability in the flow daemon (flowd) of Juniper Networks Junos OS on SRX4600 and SRX5000 Series allows an attacker to send TCP packets with SYN/FIN or SYN/RST flags, bypassing the expected blocking of these packets. A TCP packet with SYN/F...

6.9CVSS5.7AI score0.00148EPSS
CVE
CVE
added 2024/07/10 11:15 p.m.45 views

CVE-2024-39517

An Improper Check for Unusual or Exceptional Conditions vulnerability in the Layer 2 Address Learning Daemon (l2ald) on Juniper Networks Junos OS and Junos OS Evolved allows an unauthenticated, adjacent attacker to cause Denial of Service (DoS). In an EVPN/VXLAN scenario, when a high amount specifi...

7.1CVSS6.5AI score0.00074EPSS
CVE
CVE
added 2024/07/10 11:15 p.m.44 views

CVE-2024-39556

A Stack-Based Buffer Overflow vulnerability in Juniper Networks Junos OS and Juniper Networks Junos OS Evolved may allow a local, low-privileged attacker with access to the CLI the ability to load a malicious certificate file, leading to a limited Denial of Service (DoS) or privileged code executio...

7.1CVSS6.6AI score0.0002EPSS
CVE
CVE
added 2024/07/10 11:15 p.m.41 views

CVE-2024-39555

An Improper Handling of Exceptional Conditions vulnerability in the Routing Protocol Daemon (RPD) of Juniper Networks Junos OS and Junos OS Evolved allows an attacker sending a specific malformed BGP update message to cause the session to reset, resulting in a Denial of Service (DoS). Continued rec...

8.7CVSS7.7AI score0.00676EPSS