Vulnerabilities > Juniper > Junos > 14.1x53
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2019-01-15 | CVE-2019-0012 | Resource Exhaustion vulnerability in Juniper Junos A Denial of Service (DoS) vulnerability in BGP in Juniper Networks Junos OS configured as a VPLS PE allows an attacker to craft a specific BGP message to cause the routing protocol daemon (rpd) process to crash and restart. | 4.3 |
2019-01-15 | CVE-2019-0006 | Use of Uninitialized Resource vulnerability in Juniper Junos 14.1X53/15.1/15.1X53 A certain crafted HTTP packet can trigger an uninitialized function pointer deference vulnerability in the Packet Forwarding Engine manager (fxpc) on all EX, QFX and MX Series devices in a Virtual Chassis configuration. | 7.5 |
2019-01-15 | CVE-2019-0005 | Allocation of Resources Without Limits or Throttling vulnerability in Juniper Junos On EX2300, EX3400, EX4600, QFX3K and QFX5K series, firewall filter configuration cannot perform packet matching on any IPv6 extension headers. | 5.0 |
2019-01-15 | CVE-2019-0003 | Improper Input Validation vulnerability in Juniper Junos When a specific BGP flowspec configuration is enabled and upon receipt of a specific matching BGP packet meeting a specific term in the flowspec configuration, a reachable assertion failure occurs, causing the routing protocol daemon (rpd) process to crash with a core file being generated. | 4.3 |
2018-10-10 | CVE-2018-0060 | Improper Input Validation vulnerability in Juniper Junos An improper input validation weakness in the device control daemon process (dcd) of Juniper Networks Junos OS allows an attacker to cause a Denial of Service to the dcd process and interfaces and connected clients when the Junos device is requesting an IP address for itself. | 4.3 |
2018-10-10 | CVE-2018-0054 | Resource Exhaustion vulnerability in Juniper Junos On QFX5000 Series and EX4600 switches, a high rate of Ethernet pause frames or an ARP packet storm received on the management interface (fxp0) can cause egress interface congestion, resulting in routing protocol packet drops, such as BGP, leading to peering flaps. | 3.3 |
2018-10-10 | CVE-2018-0052 | Improper Authentication vulnerability in Juniper Junos If RSH service is enabled on Junos OS and if the PAM authentication is disabled, a remote unauthenticated attacker can obtain root access to the device. | 9.3 |
2018-10-10 | CVE-2018-0050 | Improper Input Validation vulnerability in Juniper Junos 14.1/14.1X53/14.2 An error handling vulnerability in Routing Protocols Daemon (RPD) of Juniper Networks Junos OS allows an attacker to cause RPD to crash. | 4.3 |
2018-10-10 | CVE-2018-0049 | NULL Pointer Dereference vulnerability in Juniper Junos A NULL Pointer Dereference vulnerability in Juniper Networks Junos OS allows an attacker to cause the Junos OS kernel to crash. | 7.1 |
2018-10-10 | CVE-2018-0043 | Improper Input Validation vulnerability in Juniper Junos Receipt of a specific MPLS packet may cause the routing protocol daemon (RPD) process to crash and restart or may lead to remote code execution. | 5.8 |