Filter
AND
AND
-Infinity
0

Junos OS EvolvedJunos OS: QFX5k: l2 loop in the overlay impacts the stability in a EVPN/VXLAN environment

7.5
First published (updated )

Junos OS EvolvedJunos OS: MX Series: PFE crash upon receipt of specific packet destined to an AMS interface

7.5
First published (updated )

Junos OS EvolvedJunos OS and Junos OS Evolved: Malformed BGP flowspec update causes RPD crash

7.5
First published (updated )

Junos OS EvolvedJunos OS: MX Series: In a BBE scenario upon receipt of specific malformed packets from subscribers the process bbe-smgd will crash

7.4
First published (updated )

Junos OS EvolvedJunos OS: QFX10002: Failure of storm control feature may lead to Denial of Service

7.5
First published (updated )

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Junos OS EvolvedJunos OS: MX Series: If a specific traffic rate goes above the DDoS threshold it will lead to an FPC crash

7.5
First published (updated )

Junos OS EvolvedJunos OS: SRX Series: The flow processing daemon (flowd) will crash when Unified Policies are used with IPv6 and certain dynamic applications are rejected by the device

7.5
First published (updated )

Junos OS EvolvedJunos OS: SRX Series and MX Series: Memory leak due to receipt of specially crafted SIP calls

7.5
First published (updated )

Junos OS EvolvedJunos OS: SRX Series: A memory leak might be observed in IPsec VPN scenario leading to an FPC crash

7.5
First published (updated )

Junos OS EvolvedJunos OS: MX Series and SRX Series: The flow processing daemon (flowd) will crash when specific H.323 packets are received

7.5
First published (updated )

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Junos OS EvolvedJunos OS: MX Series: The Multiservices PIC Management Daemon (mspmand) will crash when an IPsec6 tunnel processes specific IPv4 packets

7.5
First published (updated )

Junos OS EvolvedJunos OS: QFX10K Series: PFE crash upon receipt of specific genuine packets when sFlow is enabled

7.5
First published (updated )

Junos OS EvolvedJunos OS: ACX2K Series: Receipt of a high rate of specific traffic will lead to a Denial of Service (DoS)

7.5
First published (updated )

Junos OS EvolvedJunos OS: MX Series with MPC10/MPC11: When Suspicious Control Flow Detection (scfd) is enabled and an attacker is sending specific traffic, this causes a memory leak.

7.5
First published (updated )

Junos OS EvolvedJunos OS: QFX10K Series: An ICCP flap will be observed due to excessive specific traffic

7.5
First published (updated )

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Junos OS EvolvedJunos OS: PHP file inclusion vulnerability in J-Web

8.8
First published (updated )

Junos OS EvolvedJunos OS: SRX Series: A flowd core will be observed when malformed GPRS traffic is processed

7.5
First published (updated )

Junos OS EvolvedJunos OS: QFX10000 Series: In IP/MPLS PHP node scenarios upon receipt of certain crafted packets multiple interfaces in LAG configurations may detach.

7.5
First published (updated )

Junos OS EvolvedSRX5000 Series with SPC3, SRX4000 Series, and vSRX: When PowerMode IPsec is configured, the PFE will crash upon receipt of a malformed ESP packet

7.5
First published (updated )

Junos OS EvolvedJunos OS: SRX Series: Upon processing of a genuine packet the pkid process will crash during CMPv2 auto-re-enrollment

7.5
First published (updated )

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Junos OS EvolvedJunos OS: MX Series with MPC11: In a GNF / node slicing scenario gathering AF interface statistics can lead to a kernel crash

7.5
First published (updated )

Junos OS EvolvedJunos OS: SRX series: The PFE will crash when specific traffic is scanned by Enhanced Web Filtering safe-search

7.5
First published (updated )

Junos OS EvolvedJunos OS: SRX and EX Series: Local privilege escalation flaw in "download" functionality

7.8
First published (updated )

Junos OS EvolvedJunos OS and Junos OS Evolved: An rpd core will be observed with proxy BGP route-target filtering enabled and certain route add and delete event happening

7.5
First published (updated )

Junos OS EvolvedJunos OS: EX4650 Series: Certain traffic received by the Junos OS device on the management interface may be forwarded to egress interfaces instead of discarded

7.2
First published (updated )

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Junos OS EvolvedJunos OS: SRX Series: Denial of service vulnerability in flowd daemon upon receipt of a specific fragmented packet

7.5
First published (updated )

Junos OS EvolvedJunos OS: A XSS vulnerability allows an attacker to execute commands on a target J-Web session

8.8
First published (updated )

Junos OS EvolvedJunos OS: QFX5100/QFX5110/QFX5120/QFX5200/QFX5210/EX4600/EX4650 Series: When storm control profiling is enabled and a device is under an active storm, a Heap-based Buffer Overflow in the PFE will cause a device to hang.

7.5
First published (updated )

Junos OS EvolvedJunos OS: J-Web can be compromised through reflected XSS attacks

First published (updated )

Junos OS EvolvedJunos OS: EX2300 Series, EX2300-MP Series, EX3400 Series: A slow memory leak due to processing of specific IPv6 packets

7.5
First published (updated )

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2025 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203