Vulnerabilities > Juniper
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2018-07-11 | CVE-2018-0032 | Improper Input Validation vulnerability in Juniper Junos The receipt of a crafted BGP UPDATE can lead to a routing process daemon (RPD) crash and restart. | 7.5 |
2018-07-11 | CVE-2018-0031 | Resource Exhaustion vulnerability in Juniper Junos Receipt of specially crafted UDP/IP packets over MPLS may be able to bypass a stateless firewall filter. | 5.9 |
2018-07-11 | CVE-2018-0030 | Resource Exhaustion vulnerability in Juniper Junos Receipt of a specific MPLS packet may cause MPC7/8/9, PTX-FPC3 (FPC-P1, FPC-P2) line cards or PTX1K to crash and restart. | 7.5 |
2018-07-11 | CVE-2018-0029 | Resource Exhaustion vulnerability in Juniper Junos While experiencing a broadcast storm, placing the fxp0 interface into promiscuous mode via the 'monitor traffic interface fxp0' can cause the system to crash and restart (vmcore). | 6.5 |
2018-07-11 | CVE-2018-0027 | Improper Input Validation vulnerability in Juniper Junos 16.1 Receipt of a crafted or malformed RSVP PATH message may cause the routing protocol daemon (RPD) to hang or crash. | 5.9 |
2018-07-11 | CVE-2018-0026 | Unspecified vulnerability in Juniper Junos 15.1/15.1X8 After Junos OS device reboot or upgrade, the stateless firewall filter configuration may not take effect. | 7.5 |
2018-07-11 | CVE-2018-0025 | Unspecified vulnerability in Juniper Junos 12.1X46/12.3X48/15.1X49 When an SRX Series device is configured to use HTTP/HTTPS pass-through authentication services, a client sending authentication credentials in the initial HTTP/HTTPS session is at risk that these credentials may be captured during follow-on HTTP/HTTPS requests by a malicious actor through a man-in-the-middle attack or by authentic servers subverted by malicious actors. | 8.1 |
2018-07-11 | CVE-2018-0024 | Improper Privilege Management vulnerability in Juniper Junos An Improper Privilege Management vulnerability in a shell session of Juniper Networks Junos OS allows an authenticated unprivileged attacker to gain full control of the system. | 7.8 |
2018-04-11 | CVE-2018-0023 | Incorrect Default Permissions vulnerability in Juniper Jsnapy JSNAPy is an open source python version of Junos Snapshot Administrator developed by Juniper available through github. | 5.5 |
2018-04-11 | CVE-2018-0022 | Resource Exhaustion vulnerability in Juniper Junos A Junos device with VPLS routing-instances configured on one or more interfaces may be susceptible to an mbuf leak when processing a specific MPLS packet. | 7.5 |