Vulnerabilities > Juniper > Junos > 17.2x75
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2018-10-10 | CVE-2018-0048 | Resource Exhaustion vulnerability in Juniper Junos A vulnerability in the Routing Protocols Daemon (RPD) with Juniper Extension Toolkit (JET) support can allow a network based unauthenticated attacker to cause a severe memory exhaustion condition on the device. | 7.5 |
2018-10-10 | CVE-2018-0043 | Improper Input Validation vulnerability in Juniper Junos Receipt of a specific MPLS packet may cause the routing protocol daemon (RPD) process to crash and restart or may lead to remote code execution. | 8.8 |
2018-07-11 | CVE-2018-0032 | Improper Input Validation vulnerability in Juniper Junos The receipt of a crafted BGP UPDATE can lead to a routing process daemon (RPD) crash and restart. | 7.5 |
2018-07-11 | CVE-2018-0031 | Resource Exhaustion vulnerability in Juniper Junos Receipt of specially crafted UDP/IP packets over MPLS may be able to bypass a stateless firewall filter. | 5.9 |
2018-07-11 | CVE-2018-0030 | Resource Exhaustion vulnerability in Juniper Junos Receipt of a specific MPLS packet may cause MPC7/8/9, PTX-FPC3 (FPC-P1, FPC-P2) line cards or PTX1K to crash and restart. | 7.5 |
2018-07-11 | CVE-2018-0029 | Resource Exhaustion vulnerability in Juniper Junos While experiencing a broadcast storm, placing the fxp0 interface into promiscuous mode via the 'monitor traffic interface fxp0' can cause the system to crash and restart (vmcore). | 6.5 |
2018-04-11 | CVE-2018-0020 | Improper Input Validation vulnerability in Juniper Junos Junos OS may be impacted by the receipt of a malformed BGP UPDATE which can lead to a routing process daemon (rpd) crash and restart. | 7.5 |
2018-01-10 | CVE-2018-0003 | Unspecified vulnerability in Juniper Junos A specially crafted MPLS packet received or processed by the system, on an interface configured with MPLS, will store information in the system memory. low complexity juniper | 6.5 |
2017-10-13 | CVE-2017-10618 | Unspecified vulnerability in Juniper Junos When the 'bgp-error-tolerance' feature â€" designed to help mitigate remote session resets from malformed path attributes â€" is enabled, a BGP UPDATE containing a specifically crafted set of transitive attributes can cause the RPD routing process to crash and restart. | 5.9 |
2017-10-13 | CVE-2017-10611 | Unspecified vulnerability in Juniper Junos If extended statistics are enabled via 'set chassis extended-statistics', when executing any operation that fetches interface statistics, including but not limited to SNMP GET requests, the pfem process or the FPC may crash and restart. | 5.9 |