Filters

Juniper JUNOSJunos OS: QFX5k: l2 loop in the overlay impacts the stability in a EVPN/VXLAN environment

7.5
First published (updated )

Juniper JUNOSAn Improper Check for Unusual or Exceptional Conditions vulnerability in the Packet Forwarding Engin…

7.5
First published (updated )

Juniper JUNOSJunos OS and Junos OS Evolved: In a BGP rib sharding scenario when a route is frequently updated an rpd memory leak will occur

7.5
First published (updated )

Juniper JUNOSJunos OS: MX Series: In a BBE scenario upon receipt of specific malformed packets from subscribers the process bbe-smgd will crash

7.4
First published (updated )

Juniper JUNOSJunos OS: SRX Series: The flow processing daemon (flowd) will crash when Unified Policies are used with IPv6 and certain dynamic applications are rejected by the device

7.5
First published (updated )

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Juniper JUNOSJunos OS: SRX Series and MX Series: Memory leak due to receipt of specially crafted SIP calls

7.5
First published (updated )

Juniper JUNOSJunos OS: SRX Series: A memory leak might be observed in IPsec VPN scenario leading to an FPC crash

7.5
First published (updated )

Juniper JUNOSJunos OS: MX Series and SRX Series: The flow processing daemon (flowd) will crash when specific H.323 packets are received

7.5
First published (updated )

Juniper JUNOSJunos OS: MX Series: The Multiservices PIC Management Daemon (mspmand) will crash when an IPsec6 tunnel processes specific IPv4 packets

7.5
First published (updated )

Juniper JUNOSJunos OS: QFX10K Series: PFE crash upon receipt of specific genuine packets when sFlow is enabled

7.5
First published (updated )

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Juniper JUNOSJunos OS: ACX2K Series: Receipt of a high rate of specific traffic will lead to a Denial of Service (DoS)

7.5
First published (updated )

Juniper JUNOSJunos OS: MX Series with MPC10/MPC11: When Suspicious Control Flow Detection (scfd) is enabled and an attacker is sending specific traffic, this causes a memory leak.

7.5
First published (updated )

Juniper JUNOSJunos OS: PHP file inclusion vulnerability in J-Web

8.8
First published (updated )

Juniper JUNOSJunos OS: SRX Series: A flowd core will be observed when malformed GPRS traffic is processed

7.5
First published (updated )

Juniper JUNOSJunos OS: QFX10000 Series: In IP/MPLS PHP node scenarios upon receipt of certain crafted packets multiple interfaces in LAG configurations may detach.

7.5
First published (updated )

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Juniper JUNOSSRX5000 Series with SPC3, SRX4000 Series, and vSRX: When PowerMode IPsec is configured, the PFE will crash upon receipt of a malformed ESP packet

7.5
First published (updated )

Juniper JUNOSJunos OS: SRX Series: Upon processing of a genuine packet the pkid process will crash during CMPv2 auto-re-enrollment

7.5
First published (updated )

Juniper JUNOSJunos OS: MX Series with MPC11: In a GNF / node slicing scenario gathering AF interface statistics can lead to a kernel crash

7.5
First published (updated )

Juniper JUNOSJunos OS: SRX series: The PFE will crash when specific traffic is scanned by Enhanced Web Filtering safe-search

7.5
First published (updated )

Juniper JUNOSJunos OS: SRX Series: An FPC memory leak can occur in an APBR scenario

7.5
First published (updated )

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Juniper JUNOSJunos OS: SRX and EX Series: Local privilege escalation flaw in "download" functionality

7.8
First published (updated )

Juniper JUNOSJunos OS: EX4650 Series: Certain traffic received by the Junos OS device on the management interface may be forwarded to egress interfaces instead of discarded

7.2
First published (updated )

Juniper JUNOSJunos OS: SRX Series: Denial of service vulnerability in flowd daemon upon receipt of a specific fragmented packet

7.5
First published (updated )

Juniper JUNOSJunos OS: A XSS vulnerability allows an attacker to execute commands on a target J-Web session

8.8
First published (updated )

Juniper JUNOSJunos OS: J-Web can be compromised through reflected XSS attacks

First published (updated )

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Juniper JUNOSJunos OS: EX2300 Series, EX2300-MP Series, EX3400 Series: A slow memory leak due to processing of specific IPv6 packets

7.5
First published (updated )

Juniper JUNOSJunos OS: QFX5000 Series, EX4600: Device may run out of memory, causing traffic loss, upon receipt of specific IPv6 packets

7.5
First published (updated )

Juniper JUNOSJunos OS: CRL failing to download causes a memory leak and ultimately a DoS

7.5
First published (updated )

Juniper JUNOSJunos OS: Specific packets over VXLAN cause FPC reset

7.5
First published (updated )

Juniper JUNOSJunos OS: MX104 might become unresponsive if the out-of-band management port receives a flood of traffic

7.5
First published (updated )

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Juniper JUNOSJunos OS: Certificate validation is skipped when fetching system scripts from a HTTPS URL

7.4
First published (updated )

Juniper JUNOSJunos OS and Junos OS Evolved: After receiving a specific number of crafted packets snmpd will segmentation fault (SIGSEGV) requiring a manual restart.

7.5
First published (updated )

Juniper JUNOSJunos OS: In a scenario with dhcp-security and option-82 configured jdhcpd crashes upon receipt of a malformed DHCP packet

7.4
First published (updated )

Juniper JUNOSJunos OS: Specific packets over VXLAN cause FPC memory leak and ultimately reset

7.5
First published (updated )

Juniper JUNOSJunos OS: jdhcpd crashes upon receipt of a specific DHCPv6 packet

7.4
First published (updated )

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Juniper JUNOSJunos OS: A low privileged user can elevate their privileges to the ones of the highest privileged j-web user logged in

7.8
First published (updated )

Juniper JUNOSJunos OS: J-Web: A path traversal vulnerability allows an authenticated attacker to elevate their privileges to root

8.8
First published (updated )

Juniper JUNOSJunos OS: An attacker sending spoofed RADIUS messages to a Junos OS device configured for broadband services may cause broadband subscribers to remain stuck in a "Terminating" state.

7.5
First published (updated )

Juniper JUNOSJunos OS and Junos OS Evolved: Denial of Service vulnerability in local file processing

7.1
First published (updated )

Juniper JUNOSJunos OS and Junos OS Evolved: A vulnerability in the Juniper Agile License Client may allow an attacker to perform Remote Code Execution (RCE)

8.8
First published (updated )

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Juniper JUNOSJunos OS and Junos OS Evolved: RPD core upon receipt of specific BGP update

7.5
First published (updated )

Juniper JUNOSJunos OS: MX Series: Receipt of specific packet on MS-MPC/MS-MIC causes line card reset

7.5
First published (updated )

Juniper JUNOSJunos OS: EX2300 Series, EX3400 Series, and ACX710 might become unresponsive if the out-of-band management port receives a flood of traffic

7.8
First published (updated )

Juniper JUNOSJunos OS: SRX Series: Persistent XSS vulnerability in J-Web

First published (updated )

Juniper JUNOSJunos OS and Junos OS Evolved: Local Privilege Escalation vulnerability

7.8
First published (updated )

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Juniper JUNOSJunos OS: Upon receipt of specific sequences of genuine packets destined to the device the kernel will crash and restart (vmcore)

7.8
First published (updated )

Juniper JUNOSJunos OS: Upon receipt of specific sequences of genuine packets destined to the device the kernel will crash and restart (vmcore)

7.8
First published (updated )

Juniper JUNOSJunos OS: J-Web allows a locally authenticated attacker to escalate their privileges to root.

8.8
First published (updated )

Juniper JUNOSJunos OS and Junos OS Evolved: LLDP Out-of-Bounds Read vulnerability in l2cpd

8.8
First published (updated )

Juniper JUNOSJunos OS and Junos OS Evolved: MX Series with MPC10/MPC11, PTX10003, PTX10008: Line card may crash and restart when traffic is hitting a firewall filter having a term with syslog action configured

7.5
First published (updated )

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2024 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203