Vulnerabilities > Juniper > Junos OS Evolved > 19.2
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2020-07-17 | CVE-2020-1644 | Improper Input Validation vulnerability in Juniper Junos On Juniper Networks Junos OS and Junos OS Evolved devices, the receipt of a specific BGP UPDATE packet causes an internal counter to be incremented incorrectly, which over time can lead to the routing protocols process (RPD) crash and restart. | 5.0 |
2020-04-15 | CVE-2020-1632 | Improper Handling of Exceptional Conditions vulnerability in Juniper Junos In a certain condition, receipt of a specific BGP UPDATE message might cause Juniper Networks Junos OS and Junos OS Evolved devices to advertise an invalid BGP UPDATE message to other peers, causing the other peers to terminate the established BGP session, creating a Denial of Service (DoS) condition. | 7.8 |
2020-04-08 | CVE-2020-1638 | Unspecified vulnerability in Juniper Junos and Junos OS Evolved The FPC (Flexible PIC Concentrator) of Juniper Networks Junos OS and Junos OS Evolved may restart after processing a specific IPv4 packet. | 5.0 |
2020-04-08 | CVE-2020-1623 | Information Exposure Through Log Files vulnerability in Juniper Junos OS Evolved 18.3/19.1/19.2 A local, authenticated user with shell can view sensitive configuration information via the ev.ops configuration file. | 2.1 |
2020-04-08 | CVE-2020-1621 | Information Exposure Through Log Files vulnerability in Juniper Junos OS Evolved A local, authenticated user with shell can obtain the hashed values of login passwords via configd traces. | 2.1 |
2020-04-08 | CVE-2020-1620 | Information Exposure Through Log Files vulnerability in Juniper Junos OS Evolved A local, authenticated user with shell can obtain the hashed values of login passwords via configd streamer log. | 2.1 |