Vulnerabilities > Juniper > Junos
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2019-01-15 | CVE-2019-0005 | Allocation of Resources Without Limits or Throttling vulnerability in Juniper Junos On EX2300, EX3400, EX4600, QFX3K and QFX5K series, firewall filter configuration cannot perform packet matching on any IPv6 extension headers. | 5.3 |
2019-01-15 | CVE-2019-0003 | Reachable Assertion vulnerability in Juniper Junos When a specific BGP flowspec configuration is enabled and upon receipt of a specific matching BGP packet meeting a specific term in the flowspec configuration, a reachable assertion failure occurs, causing the routing protocol daemon (rpd) process to crash with a core file being generated. | 5.9 |
2019-01-15 | CVE-2019-0002 | Unspecified vulnerability in Juniper Junos 15.1X53/18.1/18.2 On EX2300 and EX3400 series, stateless firewall filter configuration that uses the action 'policer' in combination with other actions might not take effect. | 9.8 |
2019-01-15 | CVE-2019-0001 | Uncontrolled Recursion vulnerability in multiple products Receipt of a malformed packet on MX Series devices with dynamic vlan configuration can trigger an uncontrolled recursion loop in the Broadband Edge subscriber management daemon (bbe-smgd), and lead to high CPU usage and a crash of the bbe-smgd service. | 7.5 |
2018-10-10 | CVE-2018-0063 | Resource Exhaustion vulnerability in Juniper Junos 17.3 A vulnerability in the IP next-hop index database in Junos OS 17.3R3 may allow a flood of ARP requests, sent to the management interface, to exhaust the private Internal routing interfaces (IRIs) next-hop limit. | 6.5 |
2018-10-10 | CVE-2018-0062 | Improper Input Validation vulnerability in Juniper Junos A Denial of Service vulnerability in J-Web service may allow a remote unauthenticated user to cause Denial of Service which may prevent other users to authenticate or to perform J-Web operations. | 7.5 |
2018-10-10 | CVE-2018-0061 | Resource Exhaustion vulnerability in Juniper Junos A denial of service vulnerability in the telnetd service on Junos OS allows remote unauthenticated users to cause high CPU usage which may affect system performance. | 5.3 |
2018-10-10 | CVE-2018-0060 | Improper Input Validation vulnerability in Juniper Junos An improper input validation weakness in the device control daemon process (dcd) of Juniper Networks Junos OS allows an attacker to cause a Denial of Service to the dcd process and interfaces and connected clients when the Junos device is requesting an IP address for itself. | 5.9 |
2018-10-10 | CVE-2018-0058 | Improper Input Validation vulnerability in Juniper Junos Receipt of a specially crafted IPv6 exception packet may be able to trigger a kernel crash (vmcore), causing the device to reboot. | 7.5 |
2018-10-10 | CVE-2018-0057 | Unspecified vulnerability in Juniper Junos On MX Series and M120/M320 platforms configured in a Broadband Edge (BBE) environment, subscribers logging in with DHCP Option 50 to request a specific IP address will be assigned the requested IP address, even if there is a static MAC to IP address binding in the access profile. | 9.6 |