Vulnerabilities > Juniper > Junos > 17.2x75
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2019-04-10 | CVE-2019-0028 | Unspecified vulnerability in Juniper Junos On Junos devices with the BGP graceful restart helper mode enabled or the BGP graceful restart mechanism enabled, a BGP session restart on a remote peer that has the graceful restart mechanism enabled may cause the local routing protocol daemon (RPD) process to crash and restart. | 7.5 |
2019-01-15 | CVE-2019-0014 | Data Processing Errors vulnerability in Juniper Junos 17.2X75/17.4/18.2 On QFX and PTX Series, receipt of a malformed packet for J-Flow sampling might crash the FPC (Flexible PIC Concentrator) process which causes all interfaces to go down. | 7.5 |
2019-01-15 | CVE-2019-0011 | Unspecified vulnerability in Juniper Junos The Junos OS kernel crashes after processing a specific incoming packet to the out of band management interface (such as fxp0, me0, em0, vme0) destined for another address. low complexity juniper | 6.5 |
2018-10-10 | CVE-2018-0061 | Resource Exhaustion vulnerability in Juniper Junos A denial of service vulnerability in the telnetd service on Junos OS allows remote unauthenticated users to cause high CPU usage which may affect system performance. | 5.3 |
2018-10-10 | CVE-2018-0054 | Resource Exhaustion vulnerability in Juniper Junos On QFX5000 Series and EX4600 switches, a high rate of Ethernet pause frames or an ARP packet storm received on the management interface (fxp0) can cause egress interface congestion, resulting in routing protocol packet drops, such as BGP, leading to peering flaps. | 6.5 |
2018-10-10 | CVE-2018-0052 | Improper Authentication vulnerability in Juniper Junos If RSH service is enabled on Junos OS and if the PAM authentication is disabled, a remote unauthenticated attacker can obtain root access to the device. | 8.1 |
2018-10-10 | CVE-2018-0049 | NULL Pointer Dereference vulnerability in Juniper Junos A NULL Pointer Dereference vulnerability in Juniper Networks Junos OS allows an attacker to cause the Junos OS kernel to crash. | 7.5 |
2018-10-10 | CVE-2018-0048 | Resource Exhaustion vulnerability in Juniper Junos A vulnerability in the Routing Protocols Daemon (RPD) with Juniper Extension Toolkit (JET) support can allow a network based unauthenticated attacker to cause a severe memory exhaustion condition on the device. | 7.5 |
2018-10-10 | CVE-2018-0043 | Improper Input Validation vulnerability in Juniper Junos Receipt of a specific MPLS packet may cause the routing protocol daemon (RPD) process to crash and restart or may lead to remote code execution. | 8.8 |
2018-07-11 | CVE-2018-0032 | Improper Input Validation vulnerability in Juniper Junos The receipt of a crafted BGP UPDATE can lead to a routing process daemon (RPD) crash and restart. | 7.5 |