Severity High Analysis Summary CVE-2018-5379 The shipped version of the Quagga BGP daemon (bgpd) can double free memory when processing certain forms of UPDATE messages, containing […]
Severity High Analysis Summary CVE-2018-14618 The HTTP client curl is vulnerable to a buffer overrun. The vulnerability could be exploited by an attacker providing a malicious […]
Severity Medium Analysis Summary Specially crafted network packets sent to affected devices on Port 4840/TCP could allow an unauthenticated remote attacker to cause a denial-of-service condition […]
Severity High Analysis Summary An attacker with network access to the web server on Port 80/TCP or 443/TCP could execute system commands with administrative privileges. Impact […]
Severity Medium Analysis Summary Specially crafted packets sent to Port 161/UDP could cause a denial-of-service condition. The affected devices must be restarted manually. Impact Denial of […]
Severity Medium Analysis Summary An error when handling DHCPv6 solicit messages can be exploited to crash the jdhcpd daemon. Impact Denial of Service Affected Vendors Juniper […]
Severity Medium Analysis Summary In MPLS environments, receipt of a specific SNMP packet may cause the routing protocol daemon (RPD) process to crash and restart. By […]
Severity Low Analysis Summary On Junos OS, rpcbind should only be listening to port 111 on the internal routing instance (IRI). External packets destined to port […]
Severity Medium Analysis Summary Certain sequence of valid BGP or IPv6 BFD packets may trigger a stack based buffer overflow in the Junos OS Packet Forwarding […]