Vulnerabilities > Juniper > Medium
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2019-01-15 | CVE-2019-0003 | Reachable Assertion vulnerability in Juniper Junos When a specific BGP flowspec configuration is enabled and upon receipt of a specific matching BGP packet meeting a specific term in the flowspec configuration, a reachable assertion failure occurs, causing the routing protocol daemon (rpd) process to crash with a core file being generated. | 5.9 |
2018-10-10 | CVE-2018-0063 | Resource Exhaustion vulnerability in Juniper Junos 17.3 A vulnerability in the IP next-hop index database in Junos OS 17.3R3 may allow a flood of ARP requests, sent to the management interface, to exhaust the private Internal routing interfaces (IRIs) next-hop limit. | 6.5 |
2018-10-10 | CVE-2018-0061 | Resource Exhaustion vulnerability in Juniper Junos A denial of service vulnerability in the telnetd service on Junos OS allows remote unauthenticated users to cause high CPU usage which may affect system performance. | 5.3 |
2018-10-10 | CVE-2018-0060 | Improper Input Validation vulnerability in Juniper Junos An improper input validation weakness in the device control daemon process (dcd) of Juniper Networks Junos OS allows an attacker to cause a Denial of Service to the dcd process and interfaces and connected clients when the Junos device is requesting an IP address for itself. | 5.9 |
2018-10-10 | CVE-2018-0059 | Cross-site Scripting vulnerability in Juniper Netscreen Screenos A persistent cross-site scripting vulnerability in the graphical user interface of ScreenOS may allow a remote authenticated user to inject web script or HTML and steal sensitive data and credentials from a web administration session, possibly tricking a follow-on administrative user to perform administrative actions on the device. | 5.4 |
2018-10-10 | CVE-2018-0056 | Improper Input Validation vulnerability in Juniper Junos If a duplicate MAC address is learned by two different interfaces on an MX Series device, the MAC address learning function correctly flaps between the interfaces. | 5.3 |
2018-10-10 | CVE-2018-0055 | Improper Input Validation vulnerability in Juniper Junos Receipt of a specially crafted DHCPv6 message destined to a Junos OS device configured as a DHCP server in a Broadband Edge (BBE) environment may result in a jdhcpd daemon crash. | 5.3 |
2018-10-10 | CVE-2018-0054 | Resource Exhaustion vulnerability in Juniper Junos On QFX5000 Series and EX4600 switches, a high rate of Ethernet pause frames or an ARP packet storm received on the management interface (fxp0) can cause egress interface congestion, resulting in routing protocol packet drops, such as BGP, leading to peering flaps. | 6.5 |
2018-10-10 | CVE-2018-0053 | Improper Authentication vulnerability in Juniper Junos 15.1X49 An authentication bypass vulnerability in the initial boot sequence of Juniper Networks Junos OS on vSRX Series may allow an attacker to gain full control of the system without authentication when the system is initially booted up. | 6.8 |
2018-10-10 | CVE-2018-0051 | Improper Input Validation vulnerability in Juniper Junos A Denial of Service vulnerability in the SIP application layer gateway (ALG) component of Junos OS based platforms allows an attacker to crash MS-PIC, MS-MIC, MS-MPC, MS-DPC or SRX flow daemon (flowd) process. | 5.9 |