Filter
AND
-Infinity
0

Junos OS EvolvedJunos OS and Junos OS Evolved: Malformed BGP flowspec update causes RPD crash

7.5
First published (updated )

Junos OS EvolvedJunos OS and Junos OS Evolved: An FPC crash might be seen due to an EVPN MAC entry moving from local to remote

First published (updated )

Junos OS EvolvedJunos OS: EX4300-MP, EX4600, QFX5000 Series: In VxLAN scenarios specific packets processed cause a memory leak leading to a PFE crash

First published (updated )

Junos OS EvolvedJunos OS: PTX Series and QFX10000 Series: 'Etherleak' memory disclosure in Ethernet padding data

First published (updated )

Junos OS EvolvedJunos OS and Junos OS Evolved: In an MPLS scenario upon receipt of a specific IPv6 packet an FPC will crash

First published (updated )

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Junos OS EvolvedJunos OS and Junos OS Evolved: An rpd core will be observed with proxy BGP route-target filtering enabled and certain route add and delete event happening

7.5
First published (updated )

Junos OS EvolvedJunos OS: SRX Series: Denial of service vulnerability in flowd daemon upon receipt of a specific fragmented packet

7.5
First published (updated )

Junos OS EvolvedJunos OS: A XSS vulnerability allows an attacker to execute commands on a target J-Web session

8.8
First published (updated )

Junos OS EvolvedJunos OS: J-Web can be compromised through reflected XSS attacks

First published (updated )

Junos OS EvolvedJunos OS: jdhcpd crashes upon receiving a specific DHCP packet

First published (updated )

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Junos OS EvolvedJunos OS: QFX5000 Series, EX4600: Device may run out of memory, causing traffic loss, upon receipt of specific IPv6 packets

7.5
First published (updated )

Junos OS EvolvedJunos OS: CRL failing to download causes a memory leak and ultimately a DoS

7.5
First published (updated )

Junos OS EvolvedJunos OS and Junos OS Evolved: OSPFv3 session might go into INIT state upon receipt of multiple crafted packets from a trusted neighbor device.

First published (updated )

Junos OS EvolvedJunos OS: MX104 might become unresponsive if the out-of-band management port receives a flood of traffic

7.5
First published (updated )

Junos OS EvolvedJunos OS: MX Series: The bbe-smgd process crashes if an unsupported configuration exists and a PPPoE client sends a specific message

First published (updated )

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Junos OS EvolvedJunos Fusion: A Satellite Device can be controlled by rewiring it to a foreign AD causing a DoS

First published (updated )

Junos OS EvolvedSRX Series and MX Series with SPC3: A high percentage of fragments might lead to high latency or packet drops

7.5
First published (updated )

Junos OS EvolvedJunos OS and Junos OS Evolved: After receiving a specific number of crafted packets snmpd will segmentation fault (SIGSEGV) requiring a manual restart.

7.5
First published (updated )

Junos OS EvolvedJunos OS: In a scenario with dhcp-security and option-82 configured jdhcpd crashes upon receipt of a malformed DHCP packet

7.4
First published (updated )

Junos OS EvolvedJunos OS: A low privileged user can elevate their privileges to the ones of the highest privileged j-web user logged in

7.8
First published (updated )

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Junos OS EvolvedJunos OS: When using J-Web with HTTP an attacker may retrieve encryption keys via Person-in-the-Middle attacks.

First published (updated )

Junos OS EvolvedJunos OS: J-Web: A path traversal vulnerability allows an authenticated attacker to elevate their privileges to root

8.8
First published (updated )

Junos OS EvolvedJunos OS: MX Series: MPC 7/8/9/10/11 cards with MAP-E: PFE halts when an attacker sends malformed IPv4 or IPv6 traffic inside the MAP-E tunnel.

7.5
First published (updated )

Junos OS EvolvedJunos OS: An attacker sending spoofed RADIUS messages to a Junos OS device configured for broadband services may cause broadband subscribers to remain stuck in a "Terminating" state.

7.5
First published (updated )

Junos OS EvolvedJunos OS and Junos OS Evolved: RPD crash while processing a specially crafted BGP UPDATE or KEEPALIVE message.

7.5
First published (updated )

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Junos OS EvolvedJunos OS: J-Web allows a locally authenticated attacker to escalate their privileges to root.

First published (updated )

Junos OS EvolvedJunos OS: QFX5000 Series and EX4600 Series: Control traffic might be dropped if a high rate of specific multicast traffic is received

First published (updated )

Junos OS EvolvedJunos OS: EX2300, EX3400 and EX4300 Series: An Aggregated Ethernet (AE) interface will go down due to a stream of specific layer 2 frames

First published (updated )

Junos OS EvolvedJunos OS: SRX Series: The flowd process will crash if log session-close is configured and specific traffic is received

First published (updated )

Junos OS EvolvedJunos OS: QFX Series and PTX Series: FPC resource usage increases when certain packets are processed which are being VXLAN encapsulated

First published (updated )

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2025 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203