Vulnerabilities > Juniper
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2018-07-11 | CVE-2018-0041 | Use of Hard-coded Credentials vulnerability in Juniper Contrail Service Orchestration Juniper Networks Contrail Service Orchestration releases prior to 3.3.0 use hardcoded credentials to access Keystone service. | 9.8 |
2018-07-11 | CVE-2018-0040 | Use of Hard-coded Credentials vulnerability in Juniper Contrail Service Orchestration Juniper Networks Contrail Service Orchestrator versions prior to 4.0.0 use hardcoded cryptographic certificates and keys in some cases, which may allow network based attackers to gain unauthorized access to services. | 9.8 |
2018-07-11 | CVE-2018-0039 | Use of Hard-coded Credentials vulnerability in Juniper Contrail Service Orchestration Juniper Networks Contrail Service Orchestration releases prior to 4.0.0 have Grafana service enabled by default with hardcoded credentials. | 9.8 |
2018-07-11 | CVE-2018-0038 | Use of Hard-coded Credentials vulnerability in Juniper Contrail Service Orchestration Juniper Networks Contrail Service Orchestration releases prior to 3.3.0 have Cassandra service enabled by default with hardcoded credentials. | 9.8 |
2018-07-11 | CVE-2018-0037 | Improper Input Validation vulnerability in Juniper Junos 15.1 Junos OS routing protocol daemon (RPD) process may crash and restart or may lead to remote code execution while processing specific BGP NOTIFICATION messages. | 9.8 |
2018-07-11 | CVE-2018-0035 | Unspecified vulnerability in Juniper Junos 15.1X53 QFX5200 and QFX10002 devices that have been shipped with Junos OS 15.1X53-D21, 15.1X53-D30, 15.1X53-D31, 15.1X53-D32, 15.1X53-D33 and 15.1X53-D60 or have been upgraded to these releases using the .bin or .iso images may contain an unintended additional Open Network Install Environment (ONIE) partition. | 9.8 |
2018-07-11 | CVE-2018-0034 | Improper Input Validation vulnerability in Juniper Junos A Denial of Service vulnerability exists in the Juniper Networks Junos OS JDHCPD daemon which allows an attacker to core the JDHCPD daemon by sending a crafted IPv6 packet to the system. | 5.9 |
2018-07-11 | CVE-2018-0032 | Improper Input Validation vulnerability in Juniper Junos The receipt of a crafted BGP UPDATE can lead to a routing process daemon (RPD) crash and restart. | 7.5 |
2018-07-11 | CVE-2018-0031 | Resource Exhaustion vulnerability in Juniper Junos Receipt of specially crafted UDP/IP packets over MPLS may be able to bypass a stateless firewall filter. | 5.9 |
2018-07-11 | CVE-2018-0030 | Resource Exhaustion vulnerability in Juniper Junos Receipt of a specific MPLS packet may cause MPC7/8/9, PTX-FPC3 (FPC-P1, FPC-P2) line cards or PTX1K to crash and restart. | 7.5 |