Page 10 of 50155 results (0.006 seconds)

CVSS: 8.7EPSS: 0%CPEs: 6EXPL: 0

09 Apr 2025 — An Improper Input Validation vulnerability in the syslog stream TCP transport of Juniper Networks Junos OS on MX240, MX480 and MX960 devices with MX-SPC3 Security Services Card allows an unauthenticated, network-based attacker, to send specific spoofed packets to cause a CPU Denial of Service (DoS) to the MX-SPC3 SPUs. Continued receipt and processing of these specific packets will sustain the DoS condition. Continued receipt and processing of these specific packets will sustain the ... • https://supportportal.juniper.net/JSA96459 • CWE-20: Improper Input Validation •

CVSS: 7.4EPSS: 0%CPEs: 11EXPL: 0

09 Apr 2025 — An Improper Input Validation vulnerability in the Juniper DHCP Daemon (jdhcpd) of Juniper Networks Junos OS and Junos OS Evolved allows an unauthenticated, adjacent attacker to cause the jdhcpd process to crash resulting in a Denial of Service (DoS). An Improper Input Validation vulnerability in the Juniper DHCP Daemon (jdhcpd) of Juniper Networks Junos OS and Junos OS Evolved allows an unauthenticated, adjacent attacker to cause the jdhcpd process to crash resulting in a Denial of Service<... • https://supportportal.juniper.net/JSA96458 • CWE-20: Improper Input Validation •

CVSS: 7.1EPSS: 0%CPEs: 7EXPL: 0

09 Apr 2025 — A Missing Release of Memory after Effective Lifetime vulnerability in the packet forwarding engine (PFE) of Juniper Networks Junos OS on MX Series allows an unauthenticated adjacent attacker to cause a Denial-of-Service (DoS). ... A Missing Release of Memory after Effective Lifetime vulnerability in the packet forwarding engine (PFE) of Juniper Networks Junos OS on MX Series allows an unauthenticated adjacent attacker to cause a Denial-of-Service (DoS). • https://supportportal.juniper.net/JSA96457 • CWE-401: Missing Release of Memory after Effective Lifetime •

CVSS: 7.1EPSS: 0%CPEs: 13EXPL: 0

09 Apr 2025 — A Signed to Unsigned Conversion Error vulnerability in the Layer 2 Control Protocol daemon (l2cpd) of Juniper Networks Junos OS and Juniper Networks Junos OS Evolved allows an unauthenticated adjacent attacker sending a specifically malformed LLDP TLV to cause the l2cpd process to crash and restart, causing a Denial of Service (DoS). Continued receipt and processing of this packet will create a sustained Denial of Service (DoS) condition. • https://supportportal.juniper.net/JSA96456 • CWE-195: Signed to Unsigned Conversion Error •

CVSS: 8.7EPSS: 0%CPEs: 6EXPL: 0

09 Apr 2025 — A NULL Pointer Dereference vulnerability in the flow daemon (flowd) of Juniper Networks Junos OS on SRX Series allows an attacker causing specific, valid control traffic to be sent out of a Dual-Stack (DS) Lite tunnel to crash the flowd process, resulting in a Denial of Service (DoS). Continuous triggering of specific control traffic will create a sustained Denial of Service (DoS) condition. • https://supportportal.juniper.net/JSA96455 • CWE-476: NULL Pointer Dereference •

CVSS: 7.7EPSS: 0%CPEs: 6EXPL: 0

09 Apr 2025 — A Heap-based Buffer Overflow vulnerability in the flexible PIC concentrator (FPC) of Juniper Networks Junos OS on EX2300, EX3400, EX4100, EX4300, EX4300MP, EX4400, EX4600, EX4650-48Y, and QFX5k Series allows an attacker to send a specific DHCP packet to the device, leading to an FPC crash and restart, resulting in a Denial of Service (DoS). A Heap-based Buffer Overflow vulnerability in the flexible PIC concentrator (FPC) of Juniper Networks Junos OS on EX2300, EX3400, EX4100, EX4300, EX4300MP,... • https://supportportal.juniper.net/JSA96453 • CWE-122: Heap-based Buffer Overflow •

CVSS: 8.7EPSS: 0%CPEs: 7EXPL: 0

09 Apr 2025 — Continuous receipt of these packets will create a sustained Denial of Service (DoS) condition. ... Continuous receipt of these packets will create a sustained Denial of Service (DoS) condition. • https://supportportal.juniper.net/JSA96452 • CWE-573: Improper Following of Specification by Caller •

CVSS: 6.0EPSS: 0%CPEs: 15EXPL: 0

09 Apr 2025 — An Improper Check for Unusual or Exceptional Conditions vulnerability in routing protocol daemon (rpd) of Juniper Networks Junos OS and Junos OS Evolved allows an unauthenticated, logically adjacent BGP peer to cause Denial of Service (DoS). An Improper Check for Unusual or Exceptional Conditions vulnerability in routing protocol daemon (rpd) of Juniper Networks Junos OS and Junos OS Evolved allows an unauthenticated, logically adjacent BGP peer to cause Denial of Service (DoS). • https://kb.juniper.net/JSA96451 • CWE-754: Improper Check for Unusual or Exceptional Conditions •

CVSS: 7.1EPSS: 0%CPEs: 11EXPL: 0

09 Apr 2025 — A Missing Release of Memory after Effective Lifetime vulnerability in the Packet Forwarding Engine (PFE) of Juniper Networks Junos OS and Junos OS Evolved allows an adjacent, unauthenticated attacker to cause an FPC to crash, leading to Denial of Service (DoS). A Missing Release of Memory after Effective Lifetime vulnerability in the Packet Forwarding Engine (PFE) of Juniper Networks Junos OS and Junos OS Evolved allows an adjacent, unauthenticated attacker to cause an FPC to crash, leading to... • https://supportportal.juniper.net/JSA96450 • CWE-401: Missing Release of Memory after Effective Lifetime •

CVSS: 8.7EPSS: 0%CPEs: 9EXPL: 0

09 Apr 2025 — An Improper Check for Unusual or Exceptional Conditions vulnerability in the pfe (packet forwarding engine) of Juniper Networks Junos OS on MX Series causes a port within a pool to be blocked leading to Denial of Service (DoS). ... An Improper Check for Unusual or Exceptional Conditions vulnerability in the pfe (packet forwarding engine) of Juniper Networks Junos OS on MX Series causes a port within a pool to be blocked leading to Denial of Service (DoS). • https://supportportal.juniper.net/JSA96449 • CWE-754: Improper Check for Unusual or Exceptional Conditions •