Page 30 of 148 results (0.003 seconds)

CVSS: 6.8EPSS: 11%CPEs: 52EXPL: 0

Buffer overflow in the flow daemon (flowd) in Juniper Junos 10.4 before 10.4S14, 11.4 before 11.4R7-S2, 12.1.X44 before 12.1X44-D15, 12.1X45 before 12.1X45-D10 on SRX devices, when using telnet pass-through authentication on the firewall, might allow remote attackers to execute arbitrary code via a crafted telnet message. Desbordamiento de búfer en el demonio de flujo (flowd) de Juniper Junos anterior 10.4S14 10.4, 11.4 anterior 11.4R7-S2, 12.1.X44 anterior 12.1X44-D15, anterior 12.1X45 12.1X45-D10 en dispositivos SRX, al usar telnet con autenticación pass-through en el firewall, podría permitir a atacantes remotos ejecutar código arbitrario a través de un mensaje telnet manipulado. • http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10594 http://osvdb.org/98369 http://secunia.com/advisories/55109 http://www.securityfocus.com/bid/62962 http://www.securitytracker.com/id/1029175 https://exchange.xforce.ibmcloud.com/vulnerabilities/87847 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 7.8EPSS: 2%CPEs: 9EXPL: 0

Unspecified vulnerability in Juniper JUNOS 7.3 through 8.4 allows remote attackers to cause a denial of service (crash) via malformed BGP packets, possibly BGP UPDATE packets that trigger session flapping. Una vulnerabilidad no especificada en Juniper JUNOS versiones 7.3 hasta 8.4, permite a los atacantes remotos causar una denegación de servicio (bloqueo) por medio de paquetes BGP malformados, posiblemente paquetes BGP UPDATE que desencadenan un flapping de sesión. • http://secunia.com/advisories/28100 http://www.kb.cert.org/vuls/id/929656 http://www.osvdb.org/39157 http://www.securityfocus.com/bid/26869 http://www.securityfocus.com/bid/28999 http://www.securitytracker.com/id?1019100 http://www.vupen.com/english/advisories/2007/4223 • CWE-20: Improper Input Validation •

CVSS: 5.0EPSS: 7%CPEs: 17EXPL: 0

Memory leak in Juniper JUNOS 6.4 through 8.0, built before May 10, 2006, allows remote attackers to cause a denial of service (kernel packet memory consumption and crash) via crafted IPv6 packets whose buffers are not released after they are processed. Fuga de memoria en Juniper JUNOS de 6.4 a 8.0, construidos antes del 10 de mayo de 2006, permite a atacantes remotos provocar una denegación de servicio (agotamiento del paquete de memoria del núcleo y caída) a través de paquetes IPv6 manipulados cuyos búfers no se liberan después de ser procesados. • http://secunia.com/advisories/21003 http://securitytracker.com/id?1016460 http://www.juniper.net/support/security/alerts/EXT-PSN-2006-06-017.txt http://www.juniper.net/support/security/alerts/IPv6_bug.txt http://www.kb.cert.org/vuls/id/294036 http://www.osvdb.org/27132 http://www.securityfocus.com/bid/18930 http://www.vupen.com/english/advisories/2006/2742 https://exchange.xforce.ibmcloud.com/vulnerabilities/27654 •