Vulnerabilities > Juniper
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2023-07-14 | CVE-2023-36831 | Improper Check or Handling of Exceptional Conditions vulnerability in Juniper Junos 22.2/22.3/22.4 An Improper Check or Handling of Exceptional Conditions vulnerability in the UTM (Unified Threat Management) Web-Filtering feature of Juniper Networks Junos OS on SRX Series causes a jbuf memory leak to occur when accessing certain websites, eventually leading to a Denial of Service (DoS) condition. | 7.5 |
2023-06-21 | CVE-2023-0026 | Improper Input Validation vulnerability in Juniper Junos An Improper Input Validation vulnerability in the Routing Protocol Daemon (rpd) of Juniper Networks Junos OS and Junos OS Evolved allows an unauthenticated, network-based attacker to cause a Denial of Service (DoS). | 7.5 |
2023-04-17 | CVE-2023-28976 | Improper Check for Unusual or Exceptional Conditions vulnerability in Juniper Junos An Improper Check for Unusual or Exceptional Conditions vulnerability in the packet forwarding engine (pfe) of Juniper Networks Junos OS on MX Series allows an unauthenticated, network-based attacker to cause a Denial of Service (DoS). | 7.5 |
2023-04-17 | CVE-2023-28978 | Insecure Default Initialization of Resource vulnerability in Juniper Junos OS Evolved An Insecure Default Initialization of Resource vulnerability in Juniper Networks Junos OS Evolved allows an unauthenticated, network based attacker to read certain confidential information. | 5.3 |
2023-04-17 | CVE-2023-28979 | Improper Check for Unusual or Exceptional Conditions vulnerability in Juniper Junos An Improper Check for Unusual or Exceptional Conditions vulnerability in the kernel of Juniper Networks Junos OS allows an adjacent unauthenticated attacker to bypass an integrity check. | 4.7 |
2023-04-17 | CVE-2023-28980 | Use After Free vulnerability in Juniper Junos and Junos OS Evolved A Use After Free vulnerability in the routing protocol daemon of Juniper Networks Junos OS and Junos OS Evolved allows a locally authenticated attacker with low privileges to cause Denial of Service (DoS). | 5.5 |
2023-04-17 | CVE-2023-28981 | Improper Input Validation vulnerability in Juniper Junos An Improper Input Validation vulnerability in the kernel of Juniper Networks Junos OS and Junos OS Evolved allows an unauthenticated, adjacent attacker to cause a Denial of Service (DoS). | 6.5 |
2023-04-17 | CVE-2023-28982 | Memory Leak vulnerability in Juniper Junos and Junos OS Evolved A Missing Release of Memory after Effective Lifetime vulnerability in the routing protocol daemon of Juniper Networks Junos OS and Junos OS Evolved allows an unauthenticated, network based attacker to cause a Denial of Service (DoS). | 7.5 |
2023-04-17 | CVE-2023-28983 | OS Command Injection vulnerability in Juniper Junos OS Evolved 21.4 An OS Command Injection vulnerability in gRPC Network Operations Interface (gNOI) server module of Juniper Networks Junos OS Evolved allows an authenticated, low privileged, network based attacker to inject shell commands and execute code. | 8.8 |
2023-04-17 | CVE-2023-28984 | Use After Free vulnerability in Juniper Junos A Use After Free vulnerability in the Layer 2 Address Learning Manager (l2alm) of Juniper Networks Junos OS on QFX Series allows an adjacent attacker to cause the Packet Forwarding Engine to crash and restart, leading to a Denial of Service (DoS). | 5.3 |