Page 12 of 135 results (0.002 seconds)

CVSS: 7.8EPSS: 0%CPEs: 44EXPL: 0

09 Sep 2016 — Juniper Junos OS before 12.1X46-D45, 12.1X46-D50, 12.1X47 before 12.1X47-D35, 12.3X48 before 12.3X48-D30, 13.3 before 13.3R9-S1, 14.1 before 14.1R7, 14.2 before 14.2R6, 15.1 before 15.1F2-S5, 15.1F4 before 15.1F4-S2, 15.1R before 15.1R2-S3, 15.1 before 15.1R3, and 15.1X49 before 15.1X49-D40 allow remote attackers to cause a denial of service (kernel crash) via a crafted UDP packet destined to the interface IP address of a 64-bit OS device. Juniper Junos OS en versiones anteriores a 12.1X46-D45, 12.1X46-D50,... • http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10758 • CWE-20: Improper Input Validation •

CVSS: 6.5EPSS: 0%CPEs: 8EXPL: 0

09 Sep 2016 — Juniper Junos OS before 13.3R9, 14.1R6 before 14.1R6-S1, and 14.1 before 14.1R7, when configured with VPLS routing-instances, allows remote attackers to obtain sensitive mbuf information by injecting a flood of Ethernet frames with IPv6 MAC addresses directly into a connected interface. Juniper Junos OS en versiones anteriores a 13.3R9, 14.1R6 en versiones anteriores a 14.1R6-S1 y 14.1 en versiones anteriores a 14.1R7, cuando es configurado con enrutamiento de casos VPLS, permite a atacantes remotos obtener... • http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10750 • CWE-399: Resource Management Errors •

CVSS: 7.1EPSS: 0%CPEs: 53EXPL: 0

09 Sep 2016 — Juniper Junos OS before 12.1X46-D50, 12.1X47 before 12.1X47-D40, 12.3X48 before 12.3X48-D30, 13.3 before 13.3R9, 14.1 before 14.1R8, 14.1X53 before 14.1X53-D40, 14.2 before 14.2R6, 15.1 before 15.1F6 or 15.1R3, and 15.1X49 before 15.1X49-D40, when configured with a GRE or IPIP tunnel, allow remote attackers to cause a denial of service (kernel panic) via a crafted ICMP packet. Juniper Junos OS en versiones anteriores a 12.1X46-D50, 12.1X47 en versiones anteriores a 12.1X47-D40, 12.3X48 en versiones anterior... • http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10752 • CWE-20: Improper Input Validation •

CVSS: 10.0EPSS: 1%CPEs: 64EXPL: 0

09 Sep 2016 — J-Web in Juniper Junos OS before 12.1X46-D45, 12.1X46-D50, 12.1X47 before 12.1X47-D35, 12.3 before 12.3R12, 12.3X48 before 12.3X48-D25, 13.3 before 13.3R10, 13.3R9 before 13.3R9-S1, 14.1 before 14.1R7, 14.1X53 before 14.1X53-D35, 14.2 before 14.2R6, 15.1 before 15.1A2 or 15.1F4, 15.1X49 before 15.1X49-D30, and 15.1R before 15.1R3 might allow remote attackers to obtain sensitive information and consequently gain administrative privileges via unspecified vectors. J-Web en Juniper Junos OS en versiones anterio... • http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10754 • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor CWE-287: Improper Authentication •

CVSS: 6.5EPSS: 0%CPEs: 74EXPL: 0

09 Sep 2016 — PKId in Juniper Junos OS before 12.1X44-D52, 12.1X46 before 12.1X46-D37, 12.1X47 before 12.1X47-D30, 12.3 before 12.3R12, 12.3X48 before 12.3X48-D20, 13.3 before 13.3R10, 14.1 before 14.1R8, 14.1X53 before 14.1X53-D40, 14.2 before 14.2R7, 15.1 before 15.1R4, 15.1X49 before 15.1X49-D20, 15.1X53 before 15.1X53-D60, and 16.1 before 16.1R1 allow remote attackers to bypass an intended certificate validation mechanism via a self-signed certificate with an Issuer name that matches a valid CA certificate enrolled i... • http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10755 • CWE-297: Improper Validation of Certificate with Host Mismatch •

CVSS: 7.8EPSS: 0%CPEs: 1EXPL: 0

05 Aug 2016 — Juniper Junos OS before 12.1X46-D50 on SRX Series devices reverts to "safe mode" authentication and allows root CLI logins without a password after a failed upgrade to 12.1X46, which might allow local users to gain privileges by leveraging use of the "request system software" command with the "partition" option. Juniper Junos OS en versiones anteriores a 12.1X46-D50 en dispositivos SRX Series revierte a atenticación "modo seguro" y permite inicios de sesión root CLI sin una contraseña despues de un fallo de... • http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10753 • CWE-287: Improper Authentication •

CVSS: 8.8EPSS: 0%CPEs: 79EXPL: 0

15 Apr 2016 — Race condition in the Op command in Juniper Junos OS before 12.1X44-D55, 12.1X46 before 12.1X46-D40, 12.1X47 before 12.1X47-D25, 12.3 before 12.3R11, 12.3X48 before 12.3X48-D20, 12.3X50 before 12.3X50-D50, 13.2 before 13.2R8, 13.2X51 before 13.2X51-D39, 13.2X52 before 13.2X52-D30, 13.3 before 13.3R7, 14.1 before 14.1R6, 14.1X53 before 14.1X53-D30, 14.2 before 14.2R4, 15.1 before 15.1F2 or 15.1R2, 15.1X49 before 15.1X49-D10 or 15.1X49-D20, and 16.1 before 16.1R1 allows remote authenticated users to gain priv... • http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10725 • CWE-264: Permissions, Privileges, and Access Controls •

CVSS: 6.7EPSS: 0%CPEs: 68EXPL: 0

15 Apr 2016 — Race condition in the RPC functionality in Juniper Junos OS before 12.1X44-D55, 12.1X46 before 12.1X46-D40, 12.1X47 before 12.1X47-D25, 12.3 before 12.3R11, 12.3X48 before 12.3X48-D20, 13.2 before 13.2R8, 13.2X51 before 13.2X51-D39, 13.3 before 13.3R7, 14.1 before 14.1R6, 14.1X53 before 14.1X53-D30, 14.2 before 14.2R3-S4, 15.1 before 15.1F2, or 15.1R2, 15.1X49 before 15.1X49-D20, and 16.1 before 16.1R1 allows local users to read, delete, or modify arbitrary files via unspecified vectors. Condición de carrer... • http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10730 • CWE-362: Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition') •

CVSS: 7.8EPSS: 2%CPEs: 72EXPL: 0

15 Apr 2016 — Juniper Junos OS before 12.1X44-D60, 12.1X46 before 12.1X46-D40, 12.1X47 before 12.1X47-D30, 12.3 before 12.3R11, 12.3X48 before 12.3X48-D20, 13.2 before 13.2R9, 13.2X51 before 13.2X51-D39, 13.3 before 13.3R8, 14.1 before 14.1R6, 14.1X53 before 14.1X53-D30, 14.2 before 14.2R4-S1, 15.1 before 15.1R2, 15.1X49 before 15.1X49-D30, and 16.1 before 16.1R1 allow remote attackers to cause a denial of service (socket consumption) via crafted TCP timestamps. Juniper Junos OS en versiones anteriores a 12.1X44-D60, 12.... • http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10736 • CWE-399: Resource Management Errors •

CVSS: 7.5EPSS: 0%CPEs: 51EXPL: 0

15 Apr 2016 — The rpd daemon in Juniper Junos OS before 12.1X44-D60, 12.1X46 before 12.1X46-D45, 12.1X47 before 12.1X47-D30, 12.3 before 12.3R9, 12.3X48 before 12.3X48-D20, 13.2 before 13.2R7, 13.2X51 before 13.2X51-D40, 13.3 before 13.3R6, 14.1 before 14.1R4, and 14.2 before 14.2R2, when configured with BGP-based L2VPN or VPLS, allows remote attackers to cause a denial of service (daemon restart) via a crafted L2VPN family BGP update. El demonio rpd en Juniper Junos OS en versiones anteriores a 12.1X44-D60, 12.1X46 en v... • http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10737 • CWE-19: Data Processing Errors •