mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-07-29 05:56:59 +00:00
Juniper 2020-01-08 CVE publication, For more information see https://advisory.juniper.net
This commit is contained in:
parent
e9710cc7f1
commit
14caa1490e
@ -3,7 +3,7 @@
|
||||
"ASSIGNER": "sirt@juniper.net",
|
||||
"DATE_PUBLIC": "2020-01-08T17:00:00.000Z",
|
||||
"ID": "CVE-2020-1600",
|
||||
"STATE": "READY",
|
||||
"STATE": "PUBLIC",
|
||||
"TITLE": "Junos OS: A specific SNMP command can trigger a high CPU usage Denial of Service in the RPD daemon."
|
||||
},
|
||||
"affects": {
|
||||
|
@ -3,7 +3,7 @@
|
||||
"ASSIGNER": "sirt@juniper.net",
|
||||
"DATE_PUBLIC": "2020-01-08T17:00:00.000Z",
|
||||
"ID": "CVE-2020-1601",
|
||||
"STATE": "READY",
|
||||
"STATE": "PUBLIC",
|
||||
"TITLE": "Junos OS: Upon receipt of certain types of malformed PCEP packets the pccd process may crash."
|
||||
},
|
||||
"affects": {
|
||||
|
@ -3,7 +3,7 @@
|
||||
"ASSIGNER": "sirt@juniper.net",
|
||||
"DATE_PUBLIC": "2020-01-08T17:00:00.000Z",
|
||||
"ID": "CVE-2020-1602",
|
||||
"STATE": "READY",
|
||||
"STATE": "PUBLIC",
|
||||
"TITLE": "Junos OS and Junos OS Evolved: A vulnerability in JDHCPD allows an attacker to send crafted IPv4 packets may take over the code execution of the JDHCPD process."
|
||||
},
|
||||
"affects": {
|
||||
|
@ -3,7 +3,7 @@
|
||||
"ASSIGNER": "sirt@juniper.net",
|
||||
"DATE_PUBLIC": "2020-01-08T17:00:00.000Z",
|
||||
"ID": "CVE-2020-1603",
|
||||
"STATE": "READY",
|
||||
"STATE": "PUBLIC",
|
||||
"TITLE": "Junos OS: Improper handling of specific IPv6 packets sent by clients eventually kernel crash (vmcore) the device."
|
||||
},
|
||||
"affects": {
|
||||
|
@ -3,7 +3,7 @@
|
||||
"ASSIGNER": "sirt@juniper.net",
|
||||
"DATE_PUBLIC": "2020-01-08T17:00:00.000Z",
|
||||
"ID": "CVE-2020-1604",
|
||||
"STATE": "READY",
|
||||
"STATE": "PUBLIC",
|
||||
"TITLE": "Junos OS: EX4300/EX4600/QFX3500/QFX5100 Series: Stateless IP firewall filter may fail to evaluate certain packets"
|
||||
},
|
||||
"affects": {
|
||||
|
@ -3,7 +3,7 @@
|
||||
"ASSIGNER": "sirt@juniper.net",
|
||||
"DATE_PUBLIC": "2020-01-08T17:00:00.000Z",
|
||||
"ID": "CVE-2020-1605",
|
||||
"STATE": "READY",
|
||||
"STATE": "PUBLIC",
|
||||
"TITLE": "Junos OS and Junos OS Evolved: A vulnerability in JDHCPD allows an attacker to send crafted IPv4 packets and arbitrarily execute commands on the target device."
|
||||
},
|
||||
"affects": {
|
||||
|
@ -3,7 +3,7 @@
|
||||
"ASSIGNER": "sirt@juniper.net",
|
||||
"DATE_PUBLIC": "2020-01-08T17:00:00.000Z",
|
||||
"ID": "CVE-2020-1606",
|
||||
"STATE": "READY",
|
||||
"STATE": "PUBLIC",
|
||||
"TITLE": "Junos OS: Path traversal vulnerability in J-Web"
|
||||
},
|
||||
"affects": {
|
||||
|
@ -3,7 +3,7 @@
|
||||
"ASSIGNER": "sirt@juniper.net",
|
||||
"DATE_PUBLIC": "2020-01-08T17:00:00.000Z",
|
||||
"ID": "CVE-2020-1607",
|
||||
"STATE": "READY",
|
||||
"STATE": "PUBLIC",
|
||||
"TITLE": "Junos OS: Cross-Site Scripting (XSS) in J-Web"
|
||||
},
|
||||
"affects": {
|
||||
|
@ -3,7 +3,7 @@
|
||||
"ASSIGNER": "sirt@juniper.net",
|
||||
"DATE_PUBLIC": "2020-01-08T17:00:00.000Z",
|
||||
"ID": "CVE-2020-1608",
|
||||
"STATE": "READY",
|
||||
"STATE": "PUBLIC",
|
||||
"TITLE": "Junos OS: MX Series: In BBE configurations, receipt of a specific MPLS or IPv6 packet causes a Denial of Service"
|
||||
},
|
||||
"affects": {
|
||||
|
@ -3,7 +3,7 @@
|
||||
"ASSIGNER": "sirt@juniper.net",
|
||||
"DATE_PUBLIC": "2020-01-08T17:00:00.000Z",
|
||||
"ID": "CVE-2020-1609",
|
||||
"STATE": "READY",
|
||||
"STATE": "PUBLIC",
|
||||
"TITLE": "Junos OS and Junos OS Evolved: A vulnerability in JDHCPD allows an attacker to send crafted IPv6 packets and arbitrarily execute commands on the target device."
|
||||
},
|
||||
"affects": {
|
||||
|
@ -3,7 +3,7 @@
|
||||
"ASSIGNER": "sirt@juniper.net",
|
||||
"DATE_PUBLIC": "2020-01-08T17:00:00.000Z",
|
||||
"ID": "CVE-2020-1611",
|
||||
"STATE": "READY",
|
||||
"STATE": "PUBLIC",
|
||||
"TITLE": "Junos Space: Malicious HTTP packets sent to Junos Space allow an attacker to view all files on the device."
|
||||
},
|
||||
"affects": {
|
||||
|
Loading…
x
Reference in New Issue
Block a user