Page 9 of 50154 results (0.012 seconds)

CVSS: 9.0EPSS: 0%CPEs: 1EXPL: 0

10 Apr 2025 — This allows attackers to cause a denial of service (application crash) or possibly execute arbitrary code, because those lookup values lead to incorrect length calculations and incorrect memcpy operations. • https://lapis-sawfish-be3.notion.site/0-click-Vulnerability-in-Comman-1-43_v3-1cadc00d01d080b0b3b9c46a6da584cc • CWE-392: Missing Report of Error Condition •

CVSS: 8.7EPSS: 0%CPEs: 6EXPL: 0

09 Apr 2025 — An Improper Check for Unusual or Exceptional Conditions vulnerability in the Packet Forwarding Engine (pfe) of Juniper Networks Junos OS on MX Series allows an unauthenticated, network-based attacker to cause a Denial-of-Service (DoS).When processing a high rate of specific GRE traffic destined to the device, the respective PFE will hang causing traffic forwarding to stop. An Improper Check for Unusual or Exceptional Conditions vulnerability in the Packet Forwarding Engine (pfe) of Juniper Net... • https://supportportal.juniper.net/JSA96471 • CWE-754: Improper Check for Unusual or Exceptional Conditions •

CVSS: 8.7EPSS: 0%CPEs: 6EXPL: 0

09 Apr 2025 — An Improper Handling of Length Parameter Inconsistency vulnerability in the Packet Forwarding Engine (PFE) of Juniper Networks Junos OS on SRX Series allows an unauthenticated, network-based attacker to cause a Denial-of-Service (DoS). ... An Improper Handling of Length Parameter Inconsistency vulnerability in the Packet Forwarding Engine (PFE) of Juniper Networks Junos OS on SRX Series allows an unauthenticated, network-based attacker to cause a Denial-of-Service (DoS). • https://supportportal.juniper.net/JSA96470 • CWE-130: Improper Handling of Length Parameter Inconsistency •

CVSS: 8.7EPSS: 0%CPEs: 7EXPL: 0

09 Apr 2025 — A Missing Release of Memory after Effective Lifetime vulnerability in the Anti-Virus processing of Juniper Networks Junos OS on SRX Series allows an unauthenticated, network-based attacker to cause a Denial-of-Service (DoS). ... A Missing Release of Memory after Effective Lifetime vulnerability in the Anti-Virus processing of Juniper Networks Junos OS on SRX Series allows an unauthenticated, network-based attacker to cause a Denial-of-Service (DoS). • https://supportportal.juniper.net/JSA96469 • CWE-401: Missing Release of Memory after Effective Lifetime •

CVSS: 6.9EPSS: 0%CPEs: 6EXPL: 0

09 Apr 2025 — An Improper Encoding or Escaping of Output vulnerability in the Sampling Route Record Daemon (SRRD) of Juniper Networks Junos OS allows an unauthenticated, network-based attacker to cause a Denial-of-Service (DoS). ... An Improper Encoding or Escaping of Output vulnerability in the Sampling Route Record Daemon (SRRD) of Juniper Networks Junos OS allows an unauthenticated, network-based attacker to cause a Denial-of-Service (DoS). • https://supportportal.juniper.net/JSA96467 • CWE-116: Improper Encoding or Escaping of Output •

CVSS: 8.7EPSS: 0%CPEs: 8EXPL: 0

09 Apr 2025 — An Improper Handling of Additional Special Element vulnerability in the Packet Forwarding Engine (PFE) of Juniper Networks Junos OS on MX Series with MS-MPC, MS-MIC and SPC3, and SRX Series, allows an unauthenticated, network-based attacker to cause a Denial-of-Service (DoS). ... Although the system will automatically recover with the restart of the FPC, subsequent SIP invites will cause the crash again and lead to a sustained DoS. • https://supportportal.juniper.net/JSA96466 • CWE-167: Improper Handling of Additional Special Element •

CVSS: 6.8EPSS: 0%CPEs: 12EXPL: 0

09 Apr 2025 — An Improper Check for Unusual or Exceptional Conditions vulnerability in the Routing Protocol Daemon (rpd) of Juniper Networks Junos OS and Junos OS Evolved allows a local, low-privileged attacker to cause a Denial-of-Service (DoS). An Improper Check for Unusual or Exceptional Conditions vulnerability in the Routing Protocol Daemon (rpd) of Juniper Networks Junos OS and Junos OS Evolved allows a local, low-privileged attacker to cause a Denial-of-Service (DoS). ... Repeated use o... • https://supportportal.juniper.net/JSA96465 • CWE-754: Improper Check for Unusual or Exceptional Conditions •

CVSS: 6.5EPSS: 0%CPEs: 8EXPL: 0

09 Apr 2025 — An Expired Pointer Dereference vulnerability in Routing Protocol Daemon (rpd) of Juniper Networks Junos OS and Junos OS Evolved allows an unauthenticated, adjacent attacker to cause Denial of Service (DoS).On all Junos OS and Junos OS Evolved platforms, when an MPLS Label-Switched Path (LSP) is configured with node-link-protection and transport-class, and an LSP flaps, rpd crashes and restarts. Continuous flapping of LSP can cause a sustained Denial of Service (DoS) condition. • https://supportportal.juniper.net/JSA96463 • CWE-825: Expired Pointer Dereference •

CVSS: 6.8EPSS: 0%CPEs: 14EXPL: 0

09 Apr 2025 — An Improper Handling of Exceptional Conditions vulnerability in routing protocol daemon (rpd) of Juniper Networks Junos OS and Junos OS Evolved allows a local, low-privileged attacker executing a CLI command to cause a Denial of Service (DoS). An Improper Handling of Exceptional Conditions vulnerability in routing protocol daemon (rpd) of Juniper Networks Junos OS and Junos OS Evolved allows a local, low-privileged attacker executing a CLI command to cause a Denial of Service (DoS

CVSS: 8.7EPSS: 0%CPEs: 12EXPL: 0

09 Apr 2025 — A Buffer Access with Incorrect Length Value vulnerability in the routing protocol daemon (rpd) of Juniper Networks Junos OS and Junos OS Evolved allows an unauthenticated, network-based attacker to cause a Denial of Service (DoS). A Buffer Access with Incorrect Length Value vulnerability in the routing protocol daemon (rpd) of Juniper Networks Junos OS and Junos OS Evolved allows an unauthenticated, network-based attacker to cause a Denial of Service (DoS). • https://supportportal.juniper.net/JSA96461 • CWE-805: Buffer Access with Incorrect Length Value •