Page 28 of 164 results (0.005 seconds)

CVSS: 7.8EPSS: 1%CPEs: 18EXPL: 1

Juniper Junos 11.4 before R11, 12.1 before R9, 12.1X44 before D30, 12.1X45 before D20, 12.1X46 before D15, 12.1X47 before D10, 12.2 before R8, 12.2X50 before D70, 12.3 before R6, 13.1 before R4, 13.1X49 before D55, 13.1X50 before D30, 13.2 before R4, 13.2X50 before D20, 13.2X51 before D15, 13.2X52 before D15, 13.3 before R1, when using an em interface to connect to a certain internal network, allows remote attackers to cause a denial of service (em driver bock and FPC reset or "go offline") via a series of crafted (1) CLNP fragmented packets, when clns-routing or ESIS is configured, or (2) IPv4 or (3) IPv6 fragmented packets. Juniper Junos 11.4 anterior a R11, 12.1 anterior a R9, 12.1X44 anterior a D30, 12.1X45 anterior a D20, 12.1X46 anterior a D15, 12.1X47 anterior a D10, 12.2 anterior a R8, 12.2X50 anterior a D70, 12.3 anterior a R6, 13.1 anterior a R4, 13.1X49 anterior a D55, 13.1X50 anterior a D30, 13.2 anterior a R4, 13.2X50 anterior a D20, 13.2X51 anterior a D15, 13.2X52 anterior a D15, 13.3 anterior a R1, cuando utiliza una interfaz em para conectar con cierta red interna, permite a atacantes remotos causar una denegación de servicio (reconfiguración del controlador em bock y FPC o 'salir fuera de línea') a través de una serie de (1) paquetes fragmentados CLNP manipulados, cuando clns-routing o ESIS está configurado, o (2) paquetes fragmentados IPv4 o (3) paquetes fragmentados IPv6. • http://www.securityfocus.com/bid/70369 http://www.securitytracker.com/id/1031011 https://exchange.xforce.ibmcloud.com/vulnerabilities/96904 https://kb.juniper.net/InfoCenter/index?page=content&id=JSA10655 •

CVSS: 7.8EPSS: 0%CPEs: 22EXPL: 0

Juniper Junos 11.4 before R12-S4, 12.1X44 before D35, 12.1X45 before D30, 12.1X46 before D25, 12.1X47 before D10, 12.2 before R9, 12.2X50 before D70, 12.3 before R7, 13.1 before R4 before S3, 13.1X49 before D55, 13.1X50 before D30, 13.2 before R5, 13.2X50 before D20, 13.2X51 before D26 and D30, 13.2X52 before D15, 13.3 before R3, and 14.1 before R1 allows remote attackers to cause a denial of service (router protocol daemon crash) via a crafted RSVP PATH message. Juniper Junos 11.4 anhterior a R12-S4, 12.1X44 anterior a D35, 12.1X45 anterior a D30, 12.1X46 anterior a D25, 12.1X47 anterior a D10, 12.2 anterior a R9, 12.2X50 anterior a D70, 12.3 anterior a R7, 13.1 anterior a R4 anterior a S3, 13.1X49 anterior a D55, 13.1X50 anterior a D30, 13.2 anterior a R5, 13.2X50 anterior a D20, 13.2X51 anterior a D26 y D30, 13.2X52 anterior a D15, 13.3 anterior a R3, y 14.1 anterior a R1 permite a atacantes remotos causar una denegación de servicio (caída del demonio del protocolo del router) a través de un mensaje RSVP PATH manipulado. • http://www.securityfocus.com/bid/70363 http://www.securitytracker.com/id/1031008 https://exchange.xforce.ibmcloud.com/vulnerabilities/96906 https://kb.juniper.net/InfoCenter/index?page=content&id=JSA10652 • CWE-399: Resource Management Errors •

CVSS: 7.5EPSS: 0%CPEs: 21EXPL: 0

Juniper Junos 11.4 before R12, 12.1 before R10, 12.1X44 before D35, 12.1X45 before D25, 12.1X46 before D20, 12.1X47 before D10, 12.2 before R8, 12.2X50 before D70, 12.3 before R6, 13.1 before R4-S3, 13.1X49 before D55, 13.1X50 before D30, 13.2 before R4, 13.2X50 before D20, 13.2X51 before D26 and D30, 13.2X52 before D15, 13.3 before R2, and 14.1 before R1, when a RADIUS accounting server is configured as [system accounting destination radius], creates an entry in /var/etc/pam_radius.conf, which might allow remote attackers to bypass authentication via unspecified vectors. Juniper Junos 11.4 anterior a R12, 12.1 anterior a R10, 12.1X44 anterior a D35, 12.1X45 anterior a D25, 12.1X46 anterior a D20, 12.1X47 anterior a D10, 12.2 anterior a R8, 12.2X50 anterior a D70, 12.3 anterior a R6, 13.1 anterior a R4-S3, 13.1X49 anterior a D55, 13.1X50 anterior a D30, 13.2 anterior a R4, 13.2X50 anterior a D20, 13.2X51 anterior a D26 y D30, 13.2X52 anterior a D15, 13.3 anterior a R2, y 14.1 anterior a R1, cunado un servidor de contabilidad RADIUS está configurado como [system accounting destination radius], crea una entrada en /var/etc/pam_radius.conf, lo que podría permitir a atacantes remotos evadir la autenticación a través de vectores no especificados. • http://www.securityfocus.com/bid/70365 http://www.securitytracker.com/id/1031010 https://exchange.xforce.ibmcloud.com/vulnerabilities/96905 https://kb.juniper.net/InfoCenter/index?page=content&id=JSA10654 • CWE-287: Improper Authentication •

CVSS: 9.0EPSS: 0%CPEs: 12EXPL: 0

Juniper Junos 11.4 before 11.4R12, 12.1 before 12.1R11, 12.1X44 before 12.1X44-D35, 12.1X45 before 12.1X45-D30, 12.1X46 before 12.1X46-D20, 12.1X47 before 12.1X47-D10, 12.2 before 12.2R8-S2, 12.3 before 12.3R7, 13.1 before 13.1R4-S2, 13.2 before 13.2R5, 13.3 before 13.3R2-S2, and 14.1 before 14.1R1 allows remote authenticated users to gain privileges via unspecified combinations of CLI commands and arguments. Juniper Junos 11.4 anterior a 11.4R12, 12.1 anterior a 12.1R11, 12.1X44 anterior a 12.1X44-D35, 12.1X45 anterior a 12.1X45-D30, 12.1X46 anterior a 12.1X46-D20, 12.1X47 anterior a 12.1X47-D10, 12.2 anterior a 12.2R8-S2, 12.3 anterior a 12.3R7, 13.1 anterior a 13.1R4-S2, 13.2 anterior a 13.2R5, 13.3 anterior a 13.3R2-S2 y 14.1 anterior a 14.1R1 permite a usuarios remotos autenticados ganar privilegios a través de combinaciones no especificadas de comandos y argumentos CLI. • http://www.securitytracker.com/id/1030559 https://kb.juniper.net/InfoCenter/index?page=content&id=JSA10634 • CWE-264: Permissions, Privileges, and Access Controls •

CVSS: 5.4EPSS: 0%CPEs: 18EXPL: 0

Juniper Junos 11.4 before 11.4R8, 12.1 before 12.1R5, 12.1X44 before 12.1X44-D20, 12.1X45 before 12.1X45-D15, 12.1X46 before 12.1X46-D10, and 12.1X47 before 12.1X47-D10 on SRX Series devices, allows remote attackers to cause a denial of service (flowd crash) via a malformed packet, related to translating IPv6 to IPv4. Juniper Junos 11.4 anterior a 11.4R8, 12.1 anterior a 12.1R5, 12.1X44 anterior a 12.1X44-D20, 12.1X45 anterior a 12.1X45-D15, 12.1X46 anterior a 12.1X46-D10 y 12.1X47 anterior a 12.1X47-D10 en dispositivos de la serie SRX, permite a atacantes remotos causar una denegación de servicio (caída del demonio de flujo) a través de un paquete malformado, relacionado con la traducción de IPv6 a IPv4. • http://www.securitytracker.com/id/1030560 https://kb.juniper.net/InfoCenter/index?page=content&id=JSA10641 • CWE-20: Improper Input Validation •