Логотип exploitDog
bind:CVE-2019-0007
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2019-0007

Количество 3

Количество 3

nvd логотип

CVE-2019-0007

около 7 лет назад

The vMX Series software uses a predictable IP ID Sequence Number. This leaves the system as well as clients connecting through the device susceptible to a family of attacks which rely on the use of predictable IP ID sequence numbers as their base method of attack. This issue was found during internal product security testing. Affected releases are Juniper Networks Junos OS: 15.1 versions prior to 15.1F5 on vMX Series.

CVSS3: 9.3
EPSS: Низкий
github логотип

GHSA-87m6-hv55-49cw

больше 3 лет назад

The vMX Series software uses a predictable IP ID Sequence Number. This leaves the system as well as clients connecting through the device susceptible to a family of attacks which rely on the use of predictable IP ID sequence numbers as their base method of attack. This issue was found during internal product security testing. Affected releases are Juniper Networks Junos OS: 15.1 versions prior to 15.1F5 on vMX Series.

CVSS3: 10
EPSS: Низкий
fstec логотип

BDU:2019-00251

около 7 лет назад

Уязвимость операционной системы JunOS, позволяющая нарушителю выполнять атаки с использованием предсказуемых IP ID

CVSS3: 9.3
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2019-0007

The vMX Series software uses a predictable IP ID Sequence Number. This leaves the system as well as clients connecting through the device susceptible to a family of attacks which rely on the use of predictable IP ID sequence numbers as their base method of attack. This issue was found during internal product security testing. Affected releases are Juniper Networks Junos OS: 15.1 versions prior to 15.1F5 on vMX Series.

CVSS3: 9.3
1%
Низкий
около 7 лет назад
github логотип
GHSA-87m6-hv55-49cw

The vMX Series software uses a predictable IP ID Sequence Number. This leaves the system as well as clients connecting through the device susceptible to a family of attacks which rely on the use of predictable IP ID sequence numbers as their base method of attack. This issue was found during internal product security testing. Affected releases are Juniper Networks Junos OS: 15.1 versions prior to 15.1F5 on vMX Series.

CVSS3: 10
1%
Низкий
больше 3 лет назад
fstec логотип
BDU:2019-00251

Уязвимость операционной системы JunOS, позволяющая нарушителю выполнять атаки с использованием предсказуемых IP ID

CVSS3: 9.3
1%
Низкий
около 7 лет назад

Уязвимостей на страницу