Page 101 of 503 results (0.007 seconds)

CVSS: 7.8EPSS: 2%CPEs: 9EXPL: 0

Unspecified vulnerability in Juniper JUNOS 7.3 through 8.4 allows remote attackers to cause a denial of service (crash) via malformed BGP packets, possibly BGP UPDATE packets that trigger session flapping. Una vulnerabilidad no especificada en Juniper JUNOS versiones 7.3 hasta 8.4, permite a los atacantes remotos causar una denegación de servicio (bloqueo) por medio de paquetes BGP malformados, posiblemente paquetes BGP UPDATE que desencadenan un flapping de sesión. • http://secunia.com/advisories/28100 http://www.kb.cert.org/vuls/id/929656 http://www.osvdb.org/39157 http://www.securityfocus.com/bid/26869 http://www.securityfocus.com/bid/28999 http://www.securitytracker.com/id?1019100 http://www.vupen.com/english/advisories/2007/4223 • CWE-20: Improper Input Validation •

CVSS: 5.0EPSS: 7%CPEs: 17EXPL: 0

Memory leak in Juniper JUNOS 6.4 through 8.0, built before May 10, 2006, allows remote attackers to cause a denial of service (kernel packet memory consumption and crash) via crafted IPv6 packets whose buffers are not released after they are processed. Fuga de memoria en Juniper JUNOS de 6.4 a 8.0, construidos antes del 10 de mayo de 2006, permite a atacantes remotos provocar una denegación de servicio (agotamiento del paquete de memoria del núcleo y caída) a través de paquetes IPv6 manipulados cuyos búfers no se liberan después de ser procesados. • http://secunia.com/advisories/21003 http://securitytracker.com/id?1016460 http://www.juniper.net/support/security/alerts/EXT-PSN-2006-06-017.txt http://www.juniper.net/support/security/alerts/IPv6_bug.txt http://www.kb.cert.org/vuls/id/294036 http://www.osvdb.org/27132 http://www.securityfocus.com/bid/18930 http://www.vupen.com/english/advisories/2006/2742 https://exchange.xforce.ibmcloud.com/vulnerabilities/27654 •

CVSS: 5.0EPSS: 5%CPEs: 11EXPL: 0

Juniper JUNOS 5.x through JUNOS 7.x allows remote attackers to cause a denial of service (routing disabled) via a large number of MPLS packets, which are not filtered or verified before being sent to the Routing Engine, which reduces the speed at which other packets are processed. • http://secunia.com/advisories/14049 http://securitytracker.com/id?1013039 http://www.kb.cert.org/vuls/id/409555 http://www.kb.cert.org/vuls/id/JSHA-68ZJCQ http://www.niscc.gov.uk/niscc/docs/al-20050126-00067.html?lang=en http://www.redhat.com/support/errata/RHSA-2005-081.html http://www.securityfocus.com/bid/12379 https://exchange.xforce.ibmcloud.com/vulnerabilities/19094 •