Vulnerabilities > Juniper > Junos > 11.2
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2014-01-23 | CVE-2013-7313 | Unspecified vulnerability in Juniper Junos, Junose and Screenos The OSPF implementation in Juniper Junos through 13.x, JunosE, and ScreenOS through 6.3.x does not consider the possibility of duplicate Link State ID values in Link State Advertisement (LSA) packets before performing operations on the LSA database, which allows remote attackers to cause a denial of service (routing disruption) or obtain sensitive packet information via a crafted LSA packet, a related issue to CVE-2013-0149. | 5.4 |
2013-10-17 | CVE-2013-6170 | Improper Input Validation vulnerability in Juniper Junos Juniper Junos 10.0 before 10.0S28, 10.4 before 10.4R7, 11.1 before 11.1R5, 11.2 before 11.2R2, and 11.4 before 11.4R1, when in a Next-Generation Multicast VPN (NGEN MVPN) environment, allows remote attackers to cause a denial of service (RPD routing daemon crash) via a large number of crafted PIM (S,G) join requests. | 4.3 |
2013-07-11 | CVE-2013-4687 | Denial of Service vulnerability in Juniper Networks Junos SRX Series Services Gateway flowd in Juniper Junos 10.4 before 10.4S14, 11.2 and 11.4 before 11.4R6-S2, and 12.1 before 12.1R6 on SRX devices, when certain Application Layer Gateways (ALGs) are enabled, allows remote attackers to cause a denial of service (daemon crash) via crafted TCP packets, aka PRs 727980, 806269, and 835593. | 7.8 |