Latest CVE Feed
-
5.5
MEDIUMCVE-2021-0304
In several functions of GlobalScreenshot.java, there is a possible permission bypass due to an unsafe PendingIntent. This could lead to local information disclosure of the user's contacts with User execution privileges needed. User interaction is not need... Read more
Affected Products : android- Published: Jan. 11, 2021
- Modified: Nov. 21, 2024
-
7.0
HIGHCVE-2021-0303
In dispatchGraphTerminationMessage() of packages/services/Car/computepipe/runner/graph/StreamSetObserver.cpp, there is a possible use after free due to a race condition. This could lead to local escalation of privilege with User execution privileges neede... Read more
Affected Products : android- Published: Jan. 11, 2021
- Modified: Nov. 21, 2024
-
9.3
HIGHCVE-2021-0302
In PackageInstaller, there is a possible tapjacking attack due to an insecure default value. This could lead to local escalation of privilege and permissions with no additional execution privileges needed. User interaction is needed for exploitation.Produ... Read more
Affected Products : android- Published: Feb. 10, 2021
- Modified: Nov. 21, 2024
-
6.7
MEDIUMCVE-2021-0301
In ged, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Product: Android; Versions: Android S... Read more
Affected Products : android- Published: Jan. 11, 2021
- Modified: Nov. 21, 2024
-
7.5
HIGHCVE-2021-0299
An Improper Handling of Exceptional Conditions vulnerability in the processing of a transit or directly received malformed IPv6 packet in Juniper Networks Junos OS results in a kernel crash, causing the device to restart, leading to a Denial of Service (D... Read more
Affected Products : junos- Published: Oct. 19, 2021
- Modified: Nov. 21, 2024
-
4.7
MEDIUMCVE-2021-0298
A Race Condition in the 'show chassis pic' command in Juniper Networks Junos OS Evolved may allow an attacker to crash the port interface concentrator daemon (picd) process on the FPC, if the command is executed coincident with other system events outside... Read more
- Published: Oct. 19, 2021
- Modified: Nov. 21, 2024
-
6.5
MEDIUMCVE-2021-0297
A vulnerability in the processing of TCP MD5 authentication in Juniper Networks Junos OS Evolved may allow a BGP or LDP session configured with MD5 authentication to succeed, even if the peer does not have TCP MD5 authentication enabled. This could lead t... Read more
Affected Products : junos_os_evolved- Published: Oct. 19, 2021
- Modified: Nov. 21, 2024
-
7.4
HIGHCVE-2021-0296
The Juniper Networks CTPView server is not enforcing HTTP Strict Transport Security (HSTS). HSTS is an optional response header which allows servers to indicate that content from the requested domain will only be served over HTTPS. The lack of HSTS may le... Read more
Affected Products : ctpview- Published: Oct. 19, 2021
- Modified: Nov. 21, 2024
-
6.1
MEDIUMCVE-2021-0295
A vulnerability in the Distance Vector Multicast Routing Protocol (DVMRP) of Juniper Networks Junos OS on the QFX10K Series switches allows an attacker to trigger a packet forwarding loop, leading to a partial Denial of Service (DoS). The issue is caused ... Read more
- Published: Jul. 15, 2021
- Modified: Nov. 21, 2024
-
5.3
MEDIUMCVE-2021-0294
A vulnerability in Juniper Networks Junos OS, which only affects the release 18.4R2-S5, where a function is inconsistently implemented on Juniper Networks Junos QFX5000 Series and EX4600 Series, and if "storm-control enhanced" is configured, can lead to t... Read more
- Published: Jul. 15, 2021
- Modified: Nov. 21, 2024
-
5.5
MEDIUMCVE-2021-0293
A vulnerability in Juniper Networks Junos OS caused by Missing Release of Memory after Effective Lifetime leads to a memory leak each time the CLI command 'show system connections extensive' is executed. The amount of memory leaked on each execution depen... Read more
Affected Products : junos- Published: Jul. 15, 2021
- Modified: Nov. 21, 2024
-
6.5
MEDIUMCVE-2021-0292
An Uncontrolled Resource Consumption vulnerability in the ARP daemon (arpd) and Network Discovery Protocol (ndp) process of Juniper Networks Junos OS Evolved allows a malicious attacker on the local network to consume memory resources, ultimately resultin... Read more
Affected Products : junos_os_evolved- Published: Jul. 15, 2021
- Modified: Nov. 21, 2024
-
6.5
MEDIUMCVE-2021-0291
An Exposure of System Data vulnerability in Juniper Networks Junos OS and Junos OS Evolved, where a sensitive system-level resource is not being sufficiently protected, allows a network-based unauthenticated attacker to send specific traffic which partial... Read more
- Published: Jul. 15, 2021
- Modified: Nov. 21, 2024
-
6.5
MEDIUMCVE-2021-0290
Improper Handling of Exceptional Conditions in Ethernet interface frame processing of Juniper Networks Junos OS allows an attacker to send specially crafted frames over the local Ethernet segment, causing the interface to go into a down state, resulting i... Read more
- Published: Jul. 15, 2021
- Modified: Nov. 21, 2024
-
6.5
MEDIUMCVE-2021-0289
When user-defined ARP Policer is configured and applied on one or more Aggregated Ethernet (AE) interface units, a Time-of-check Time-of-use (TOCTOU) Race Condition vulnerability between the Device Control Daemon (DCD) and firewall process (dfwd) daemons ... Read more
- Published: Jul. 15, 2021
- Modified: Nov. 21, 2024
-
6.5
MEDIUMCVE-2021-0288
A vulnerability in the processing of specific MPLS packets in Juniper Networks Junos OS on MX Series and EX9200 Series devices with Trio-based MPCs (Modular Port Concentrators) may cause FPC to crash and lead to a Denial of Service (DoS) condition. Contin... Read more
- Published: Jul. 15, 2021
- Modified: Nov. 21, 2024
-
6.5
MEDIUMCVE-2021-0287
In a Segment Routing ISIS (SR-ISIS)/MPLS environment, on Juniper Networks Junos OS and Junos OS Evolved devices, configured with ISIS Flexible Algorithm for Segment Routing and sensor-based statistics, a flap of a ISIS link in the network, can lead to a r... Read more
- Published: Jul. 15, 2021
- Modified: Nov. 21, 2024
-
7.8
HIGHCVE-2021-0286
A vulnerability in the handling of exceptional conditions in Juniper Networks Junos OS Evolved (EVO) allows an attacker to send specially crafted packets to the device, causing the Advanced Forwarding Toolkit manager (evo-aftmand-bt or evo-aftmand-zx) pro... Read more
Affected Products : junos_os_evolved- Published: Jul. 15, 2021
- Modified: Nov. 21, 2024
-
7.5
HIGHCVE-2021-0285
An uncontrolled resource consumption vulnerability in Juniper Networks Junos OS on QFX5000 Series and EX4600 Series switches allows an attacker sending large amounts of legitimate traffic destined to the device to cause Interchassis Control Protocol (ICCP... Read more
Affected Products : junos ex4200 ex4200-vc ex4300 ex4300-24p ex4300-24p-s ex4300-24t ex4300-24t-s ex4300-32f ex4300-32f-dc +36 more products- Published: Jul. 15, 2021
- Modified: Nov. 21, 2024
-
7.8
HIGHCVE-2021-0284
A buffer overflow vulnerability in the TCP/IP stack of Juniper Networks Junos OS allows an attacker to send specific sequences of packets to the device thereby causing a Denial of Service (DoS). By repeatedly sending these sequences of packets to the devi... Read more
Affected Products : junos- Published: Aug. 17, 2021
- Modified: Nov. 21, 2024