CVE-2014-0618
Juniper Junos before 10.4 before 10.4R16, 11.4 before 11.4R8, 12.1R before 12.1R7, 12.1X44 before 12
Juniper Junos before 10.4 before 10.4R16, 11.4 before 11.4R8, 12.1R before 12.1R7, 12.1X44 before 12
A remote, unauthenticated attacker may be able to execute code by exploiting a use-after-free defect
On SRX Series and MX Series devices with a Service PIC with any ALG enabled, a crafted TCP/IP respon
A specially crafted MPLS packet received or processed by the system, on an interface configured with
A sustained sequence of different types of normal transit traffic can trigger a high CPU consumption
QFX and EX Series switches configured to drop traffic when the MAC move limit is exceeded will forwa
A high rate of VLAN authentication attempts sent from an adjacent host on the local broadcast domain
An unauthenticated network-based attacker able to send a maliciously crafted LLDP packet to the loca
An unauthenticated root login may allow upon reboot when a commit script is used. A commit script al
On Juniper Networks SRX series devices, firewall rules configured to match custom application UUIDs
A vulnerability in the Juniper Networks Junos Space Security Director allows a user who does not hav
A local file inclusion vulnerability in Juniper Networks Junos Space Network Management Platform may
Juniper Networks ScreenOS devices do not pad Ethernet packets with zeros, and thus some packets can
A vulnerability in class-of-service (CoS) queue management in Juniper Networks Junos OS on the ACX2K
An Improper Check for Unusual or Exceptional Conditions vulnerability in BGP route processing of Jun
An Improper Handling of Unexpected Data Type vulnerability in the handling of SIP calls in Juniper N
A Missing Release of Memory after Effective Lifetime vulnerability in the kernel of Juniper Networks
An Uncontrolled Resource Consumption vulnerability in TCP processing on the Routing Engine (RE) of J
An Allocation of Resources Without Limits or Throttling weakness in the memory management of the Pac
An Access of Uninitialized Pointer vulnerability in the Routing Protocol Daemon (rpd) of Juniper Net
When sFlow is enabled and it monitors a packet forwarded via ECMP, a buffer management vulnerability
An Uncontrolled Resource Consumption vulnerability in the PFE management daemon (evo-pfemand) of Jun
An Improper Validation of Array Index vulnerability in the Advanced Forwarding Toolkit Manager daemo
A Use After Free vulnerability in the kernel of Juniper Networks Junos OS Evolved allows an unauthen
An Allocation of Resources Without Limits or Throttling vulnerability in the Packet Forwarding Engi
An Out-of-bounds Write vulnerability in the Internet Key Exchange Protocol daemon (iked) of Juniper
An Improper Preservation of Consistency Between Independent Representations of Shared State vulnerab
A Missing Release of Memory after Effective Lifetime vulnerability in the kernel of Juniper Networks
An Incomplete Cleanup vulnerability in the Routing Protocol Daemon (rpd) of Juniper Networks Junos O
An Improper Validation of Array Index vulnerability in the SIP ALG of Juniper Networks Junos OS on S
An Unchecked Input for Loop Condition vulnerability in a NAT library of Juniper Networks Junos OS al
A Missing Release of Memory after Effective Lifetime vulnerability in the Juniper Networks Junos OS
An Out-of-Bounds Write vulnerability in Flow Processing Daemon (flowd) of Juniper Networks Junos OS
An Improper Locking vulnerability in the SIP ALG of Juniper Networks Junos OS on MX Series with MS-M
An Improper Check or Handling of Exceptional Conditions vulnerability in the IPsec library of Junipe
A Missing Release of Memory after Effective Lifetime vulnerability in Flexible PIC Concentrator (FPC
An Out-of-Bounds Write vulnerability in the H.323 ALG of Juniper Networks Junos OS allows an unauthe
A Buffer Overflow vulnerability in SIP ALG of Juniper Networks Junos OS allows a network-based, unau
A Missing Release of Memory after Effective Lifetime vulnerability in the Flow Processing Daemon (fl
An Improper Check for Unusual or Exceptional Conditions vulnerability in Juniper DHCP Daemon (jdhcp
An Improper Handling of Exceptional Conditions vulnerability in BGP session processing of Juniper N
An Improper Handling of Exceptional Conditions vulnerability in the broadband edge subscriber manag
An Improper Access Control vulnerability in the Juniper Networks Paragon Active Assurance Control C
An Out-of-bounds Write vulnerability in J-Web of Juniper Networks Junos OS on SRX Series and EX Ser
A Heap-based Buffer Overflow vulnerability in the Network Services Daemon (NSD) of Juniper Networks
An Improper Validation of Syntactic Correctness of Input vulnerability in the Packet Forwarding Eng
A Heap-based Buffer Overflow vulnerability in the Routing Protocol Daemon (RPD) of Juniper Networks
An Exposure of Resource to Wrong Sphere vulnerability in the Packet Forwarding Engine (PFE) of Juni
A Missing Release of Memory after Effective Lifetime vulnerability in the Packet Forwarding Engine
An Improper Neutralization of Equivalent Special Elements vulnerability in the Packet Forwarding En
A Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition') vulne
A NULL Pointer Dereference vulnerability in Juniper Networks Junos OS Evolved on ACX7024, ACX7100-3
An Improper Check for Unusual or Exceptional Conditions vulnerability in the kernel of Juniper Netw
An Allocation of Resources Without Limits or Throttling vulnerability in the kernel of Juniper Netw
A Double Free vulnerability in the flow processing daemon (flowd) of Juniper Networks Junos OS on S
An Unsupported Feature in the UI vulnerability in Juniper Networks Junos OS on MX Series and EX9200
A Missing Release of Memory after Effective Lifetime vulnerability in the Routing Protocol Daemon (
An Improper Handling of Syntactically Invalid Structure vulnerability in Object Flooding Protoc
A Missing Release of Memory after Effective Lifetime vulnerability in Routing Protocol Daemon (RPD)
An Improper Check for Unusual or Exceptional Conditions vulnerability in Routing Protocol Daemon (R
An Improper Validation of Syntactic Correctness of Input vulnerability in Packet Forwarding Engine
An Incomplete Cleanup vulnerability in Nonstop active routing (NSR) component of Juniper Networks J