Vulnerabilities > Juniper > Ex3400
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2019-01-15 | CVE-2019-0003 | Improper Input Validation vulnerability in Juniper Junos When a specific BGP flowspec configuration is enabled and upon receipt of a specific matching BGP packet meeting a specific term in the flowspec configuration, a reachable assertion failure occurs, causing the routing protocol daemon (rpd) process to crash with a core file being generated. | 4.3 |
2018-10-10 | CVE-2018-0062 | Improper Input Validation vulnerability in Juniper Junos A Denial of Service vulnerability in J-Web service may allow a remote unauthenticated user to cause Denial of Service which may prevent other users to authenticate or to perform J-Web operations. | 5.0 |
2018-10-10 | CVE-2018-0061 | Resource Exhaustion vulnerability in Juniper Junos A denial of service vulnerability in the telnetd service on Junos OS allows remote unauthenticated users to cause high CPU usage which may affect system performance. | 5.0 |
2018-10-10 | CVE-2018-0060 | Improper Input Validation vulnerability in Juniper Junos An improper input validation weakness in the device control daemon process (dcd) of Juniper Networks Junos OS allows an attacker to cause a Denial of Service to the dcd process and interfaces and connected clients when the Junos device is requesting an IP address for itself. | 4.3 |
2018-10-10 | CVE-2018-0054 | Resource Exhaustion vulnerability in Juniper Junos On QFX5000 Series and EX4600 switches, a high rate of Ethernet pause frames or an ARP packet storm received on the management interface (fxp0) can cause egress interface congestion, resulting in routing protocol packet drops, such as BGP, leading to peering flaps. | 3.3 |
2018-10-10 | CVE-2018-0052 | Improper Authentication vulnerability in Juniper Junos If RSH service is enabled on Junos OS and if the PAM authentication is disabled, a remote unauthenticated attacker can obtain root access to the device. | 9.3 |
2018-10-10 | CVE-2018-0045 | Improper Input Validation vulnerability in Juniper Junos Receipt of a specific Draft-Rosen MVPN control packet may cause the routing protocol daemon (RPD) process to crash and restart or may lead to remote code execution. | 5.8 |
2018-07-11 | CVE-2018-0031 | Resource Exhaustion vulnerability in Juniper Junos Receipt of specially crafted UDP/IP packets over MPLS may be able to bypass a stateless firewall filter. | 4.3 |
2018-07-11 | CVE-2018-0029 | Resource Exhaustion vulnerability in Juniper Junos While experiencing a broadcast storm, placing the fxp0 interface into promiscuous mode via the 'monitor traffic interface fxp0' can cause the system to crash and restart (vmcore). | 6.1 |
2018-07-11 | CVE-2018-0024 | Improper Privilege Management vulnerability in Juniper Junos An Improper Privilege Management vulnerability in a shell session of Juniper Networks Junos OS allows an authenticated unprivileged attacker to gain full control of the system. | 7.2 |