Vulnerabilities > Juniper

DATE CVE VULNERABILITY TITLE RISK
2021-09-20 CVE-2021-39531 Out-of-bounds Write vulnerability in Juniper Libslax
An issue was discovered in libslax through v0.22.1.
network
low complexity
juniper CWE-787
8.8
2021-09-20 CVE-2021-39532 NULL Pointer Dereference vulnerability in Juniper Libslax
An issue was discovered in libslax through v0.22.1.
network
low complexity
juniper CWE-476
6.5
2021-09-20 CVE-2021-39533 Out-of-bounds Write vulnerability in Juniper Libslax
An issue was discovered in libslax through v0.22.1.
network
low complexity
juniper CWE-787
8.8
2021-09-20 CVE-2021-39534 Out-of-bounds Write vulnerability in Juniper Libslax
An issue was discovered in libslax through v0.22.1.
network
low complexity
juniper CWE-787
8.8
2021-07-15 CVE-2021-0278 Improper Input Validation vulnerability in Juniper Junos
An Improper Input Validation vulnerability in J-Web of Juniper Networks Junos OS allows a locally authenticated attacker to escalate their privileges to root over the target device.
local
low complexity
juniper CWE-20
7.8
2021-07-15 CVE-2021-0279 Use of Hard-coded Credentials vulnerability in Juniper Contrail Cloud
Juniper Networks Contrail Cloud (CC) releases prior to 13.6.0 have RabbitMQ service enabled by default with hardcoded credentials.
network
low complexity
juniper CWE-798
5.5
2021-07-15 CVE-2021-0281 Improper Check for Unusual or Exceptional Conditions vulnerability in Juniper Junos
On Juniper Networks Junos OS devices configured with BGP origin validation using Resource Public Key Infrastructure (RPKI) receipt of a specific packet from the RPKI cache server may cause routing process daemon (RPD) to crash and restart, creating a Denial of Service (DoS) condition.
network
low complexity
juniper CWE-754
7.5
2021-07-15 CVE-2021-0289 Time-of-check Time-of-use (TOCTOU) Race Condition vulnerability in Juniper Junos
When user-defined ARP Policer is configured and applied on one or more Aggregated Ethernet (AE) interface units, a Time-of-check Time-of-use (TOCTOU) Race Condition vulnerability between the Device Control Daemon (DCD) and firewall process (dfwd) daemons of Juniper Networks Junos OS allows an attacker to bypass the user-defined ARP Policer.
high complexity
juniper CWE-367
5.3
2021-07-15 CVE-2021-0291 Information Exposure vulnerability in Juniper Junos 15.1/17.3/17.4
An Exposure of System Data vulnerability in Juniper Networks Junos OS and Junos OS Evolved, where a sensitive system-level resource is not being sufficiently protected, allows a network-based unauthenticated attacker to send specific traffic which partially reaches this resource.
network
low complexity
juniper CWE-200
6.5
2021-07-15 CVE-2021-0292 Resource Exhaustion vulnerability in Juniper Junos OS Evolved 19.4/20.1/20.2
An Uncontrolled Resource Consumption vulnerability in the ARP daemon (arpd) and Network Discovery Protocol (ndp) process of Juniper Networks Junos OS Evolved allows a malicious attacker on the local network to consume memory resources, ultimately resulting in a Denial of Service (DoS) condition.
low complexity
juniper CWE-400
6.5