{"$ref":"https://www.cert.ssi.gouv.fr/openapi.json","affected_systems":[],"affected_systems_content":"<ul> <li>Cloud Native Router versions ant\u00e9rieures \u00e0 23.4</li> <li>cRPD versions ant\u00e9rieures \u00e0 23.4R1</li> <li>Paragon Active Assurance versions ant\u00e9rieures \u00e0 4.2.1</li> <li>Paragon Active Assurance versions ant\u00e9rieures \u00e0 4.3.0</li> <li>Junos OS gamme EX4300 versions ant\u00e9rieures \u00e0 20.4R3-S10, 21.2R3-S7 et 21.4R3-S6</li> <li>Junos OS gammes QFX5000 Series, EX4400 Series, EX4100 Series et EX4650 Series versions ant\u00e9rieures \u00e0 20.4R3-S8, 21.2R3-S6, 21.3R3-S5, 21.4R3-S4, 22.1R3-S3, 22.2R3-S1, 22.3R2-S2, 22.3R3, 22.4R2-S1, 22.4R3 et 23.2R1</li> <li>Junos OS gammes SRX Branch Series versions ant\u00e9rieures \u00e0 21.1R3-S5, 21.2R3-S5, 21.3R3-S4, 21.4R3-S3, 22.1R3-S2, 22.2R2-S2, 22.2R3, 22.3R2-S1, 22.3R3, 22.4R1-S2, 22.4R2 et 23.2R1</li> <li>Junos OS gammes MX Series avec SPC3 et MS-MPC versions ant\u00e9rieures \u00e0 21.2R3-S6, 21.3R3-S5, 21.4R3-S5, 22.1R3-S3, 22.2R3-S1, 22.3R2-S2, 22.3R3, 22.4R2-S1, 22.4R3 et 23.2R1</li> <li>Junos OS gamme SRX 5000 Series avec SPC2 versions ant\u00e9rieures \u00e0 21.2R3-S7, 21.4, 22.1, 22.2, 22.3, 22.4 et 23.2</li> <li>Junos OS gammes\u00a0MX Series versions ant\u00e9rieures \u00e0 20.4R3-S5, 21.1, 21.2R3-S1, 21.3, 21.4R3, 22.1R2, 22.2R2 et 22.3</li> <li>Junos OS gamme EX9200-15C versions ant\u00e9rieures \u00e0 21.2R3-S1, 21.4R3, 22.1R2 et 22.2R2</li> <li>Junos OS gammes\u00a0SRX4600 versions ant\u00e9rieures \u00e0 21.2R3-S7,\u00a021.4R3-S6,\u00a022.1R3-S5,\u00a022.2R3-S3,\u00a022.3R3-S2,\u00a022.4R3,\u00a023.2R1-S2, 23.2R2 et 23.4R1</li> <li>Junos OS gammes\u00a0ACX5448 et ACX710 versions ant\u00e9rieures \u00e0 20.4R3-S9, 21.2R3-S5, 21.3R3-S5, 21.4R3-S4, 22.1R3-S2, 22.2R3-S2, 22.3R2-S2, 22.3R3, 22.4R2 et 23.2R1</li> <li>Junos OS versions ant\u00e9rieures \u00e0 20.4R3-S9, 21.1R3, 21.2R3-S7, 21.3R3-S5, 21.4R3-S5, 22.1R3-S4, 22.2R3-S2, 22.3R3-S2, 22.4R3 et 23.4R2</li> <li> <div> <div> <p>Junos OS Evolved versions ant\u00e9rieures \u00e0 20.4R3-S9-EVO, 21.2R3-S7-EVO, 21.3R3-S5-EVO, 21.4R3-S6-EVO, 22.1R3-S4-EVO, 22.2R3-S2-EVO, 22.3R3-S2-EVO, 22.4R3-EVO, 23.2R2-EVO et 23.4R1-EVO</p> </div> </div> </li> </ul> ","content":"## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l'\u00e9diteur pour l'obtention des\ncorrectifs (cf. section Documentation).\n","cves":[{"name":"CVE-2023-0216","url":"https://www.cve.org/CVERecord?id=CVE-2023-0216"},{"name":"CVE-2023-40217","url":"https://www.cve.org/CVERecord?id=CVE-2023-40217"},{"name":"CVE-2023-0401","url":"https://www.cve.org/CVERecord?id=CVE-2023-0401"},{"name":"CVE-2021-37600","url":"https://www.cve.org/CVERecord?id=CVE-2021-37600"},{"name":"CVE-2024-30381","url":"https://www.cve.org/CVERecord?id=CVE-2024-30381"},{"name":"CVE-2023-46218","url":"https://www.cve.org/CVERecord?id=CVE-2023-46218"},{"name":"CVE-2020-1747","url":"https://www.cve.org/CVERecord?id=CVE-2020-1747"},{"name":"CVE-2024-30401","url":"https://www.cve.org/CVERecord?id=CVE-2024-30401"},{"name":"CVE-2021-28831","url":"https://www.cve.org/CVERecord?id=CVE-2021-28831"},{"name":"CVE-2024-30409","url":"https://www.cve.org/CVERecord?id=CVE-2024-30409"},{"name":"CVE-2023-38546","url":"https://www.cve.org/CVERecord?id=CVE-2023-38546"},{"name":"CVE-2020-14343","url":"https://www.cve.org/CVERecord?id=CVE-2020-14343"},{"name":"CVE-2022-4304","url":"https://www.cve.org/CVERecord?id=CVE-2022-4304"},{"name":"CVE-2022-48554","url":"https://www.cve.org/CVERecord?id=CVE-2022-48554"},{"name":"CVE-2023-39975","url":"https://www.cve.org/CVERecord?id=CVE-2023-39975"},{"name":"CVE-2024-30410","url":"https://www.cve.org/CVERecord?id=CVE-2024-30410"},{"name":"CVE-2018-7738","url":"https://www.cve.org/CVERecord?id=CVE-2018-7738"},{"name":"CVE-2022-48522","url":"https://www.cve.org/CVERecord?id=CVE-2022-48522"},{"name":"CVE-2020-8285","url":"https://www.cve.org/CVERecord?id=CVE-2020-8285"},{"name":"CVE-2021-28957","url":"https://www.cve.org/CVERecord?id=CVE-2021-28957"},{"name":"CVE-2024-30380","url":"https://www.cve.org/CVERecord?id=CVE-2024-30380"},{"name":"CVE-2023-41913","url":"https://www.cve.org/CVERecord?id=CVE-2023-41913"},{"name":"CVE-2024-30392","url":"https://www.cve.org/CVERecord?id=CVE-2024-30392"},{"name":"CVE-2023-0215","url":"https://www.cve.org/CVERecord?id=CVE-2023-0215"},{"name":"CVE-2021-23240","url":"https://www.cve.org/CVERecord?id=CVE-2021-23240"},{"name":"CVE-2023-0286","url":"https://www.cve.org/CVERecord?id=CVE-2023-0286"},{"name":"CVE-2011-1676","url":"https://www.cve.org/CVERecord?id=CVE-2011-1676"},{"name":"CVE-2020-8037","url":"https://www.cve.org/CVERecord?id=CVE-2020-8037"},{"name":"CVE-2023-4807","url":"https://www.cve.org/CVERecord?id=CVE-2023-4807"},{"name":"CVE-2020-19190","url":"https://www.cve.org/CVERecord?id=CVE-2020-19190"},{"name":"CVE-2024-30391","url":"https://www.cve.org/CVERecord?id=CVE-2024-30391"},{"name":"CVE-2020-8286","url":"https://www.cve.org/CVERecord?id=CVE-2020-8286"},{"name":"CVE-2023-2253","url":"https://www.cve.org/CVERecord?id=CVE-2023-2253"},{"name":"CVE-2023-44487","url":"https://www.cve.org/CVERecord?id=CVE-2023-44487"},{"name":"CVE-2024-30389","url":"https://www.cve.org/CVERecord?id=CVE-2024-30389"},{"name":"CVE-2023-29491","url":"https://www.cve.org/CVERecord?id=CVE-2023-29491"},{"name":"CVE-2023-3592","url":"https://www.cve.org/CVERecord?id=CVE-2023-3592"},{"name":"CVE-2020-19187","url":"https://www.cve.org/CVERecord?id=CVE-2020-19187"},{"name":"CVE-2023-0466","url":"https://www.cve.org/CVERecord?id=CVE-2023-0466"},{"name":"CVE-2019-9923","url":"https://www.cve.org/CVERecord?id=CVE-2019-9923"},{"name":"CVE-2021-39534","url":"https://www.cve.org/CVERecord?id=CVE-2021-39534"},{"name":"CVE-2023-5981","url":"https://www.cve.org/CVERecord?id=CVE-2023-5981"},{"name":"CVE-2023-27043","url":"https://www.cve.org/CVERecord?id=CVE-2023-27043"},{"name":"CVE-2023-0217","url":"https://www.cve.org/CVERecord?id=CVE-2023-0217"},{"name":"CVE-2024-30398","url":"https://www.cve.org/CVERecord?id=CVE-2024-30398"},{"name":"CVE-2021-22947","url":"https://www.cve.org/CVERecord?id=CVE-2021-22947"},{"name":"CVE-2018-1000120","url":"https://www.cve.org/CVERecord?id=CVE-2018-1000120"},{"name":"CVE-2023-48795","url":"https://www.cve.org/CVERecord?id=CVE-2023-48795"},{"name":"CVE-2019-17041","url":"https://www.cve.org/CVERecord?id=CVE-2019-17041"},{"name":"CVE-2020-19188","url":"https://www.cve.org/CVERecord?id=CVE-2020-19188"},{"name":"CVE-2020-19186","url":"https://www.cve.org/CVERecord?id=CVE-2020-19186"},{"name":"CVE-2021-22946","url":"https://www.cve.org/CVERecord?id=CVE-2021-22946"},{"name":"CVE-2020-25659","url":"https://www.cve.org/CVERecord?id=CVE-2020-25659"},{"name":"CVE-2021-39531","url":"https://www.cve.org/CVERecord?id=CVE-2021-39531"},{"name":"CVE-2020-8284","url":"https://www.cve.org/CVERecord?id=CVE-2020-8284"},{"name":"CVE-2023-23915","url":"https://www.cve.org/CVERecord?id=CVE-2023-23915"},{"name":"CVE-2011-1675","url":"https://www.cve.org/CVERecord?id=CVE-2011-1675"},{"name":"CVE-2023-28366","url":"https://www.cve.org/CVERecord?id=CVE-2023-28366"},{"name":"CVE-2024-30378","url":"https://www.cve.org/CVERecord?id=CVE-2024-30378"},{"name":"CVE-2023-23931","url":"https://www.cve.org/CVERecord?id=CVE-2023-23931"},{"name":"CVE-2021-34434","url":"https://www.cve.org/CVERecord?id=CVE-2021-34434"},{"name":"CVE-2016-10009","url":"https://www.cve.org/CVERecord?id=CVE-2016-10009"},{"name":"CVE-2023-1428","url":"https://www.cve.org/CVERecord?id=CVE-2023-1428"},{"name":"CVE-2023-3978","url":"https://www.cve.org/CVERecord?id=CVE-2023-3978"},{"name":"CVE-2024-30402","url":"https://www.cve.org/CVERecord?id=CVE-2024-30402"},{"name":"CVE-2018-1000215","url":"https://www.cve.org/CVERecord?id=CVE-2018-1000215"},{"name":"CVE-2023-23914","url":"https://www.cve.org/CVERecord?id=CVE-2023-23914"},{"name":"CVE-2019-17042","url":"https://www.cve.org/CVERecord?id=CVE-2019-17042"},{"name":"CVE-2024-30403","url":"https://www.cve.org/CVERecord?id=CVE-2024-30403"},{"name":"CVE-2021-36159","url":"https://www.cve.org/CVERecord?id=CVE-2021-36159"},{"name":"CVE-2018-1000654","url":"https://www.cve.org/CVERecord?id=CVE-2018-1000654"},{"name":"CVE-2023-5156","url":"https://www.cve.org/CVERecord?id=CVE-2023-5156"},{"name":"CVE-2022-2795","url":"https://www.cve.org/CVERecord?id=CVE-2022-2795"},{"name":"CVE-2021-30139","url":"https://www.cve.org/CVERecord?id=CVE-2021-30139"},{"name":"CVE-2024-30384","url":"https://www.cve.org/CVERecord?id=CVE-2024-30384"},{"name":"CVE-2023-2603","url":"https://www.cve.org/CVERecord?id=CVE-2023-2603"},{"name":"CVE-2024-30387","url":"https://www.cve.org/CVERecord?id=CVE-2024-30387"},{"name":"CVE-2017-18018","url":"https://www.cve.org/CVERecord?id=CVE-2017-18018"},{"name":"CVE-2024-30406","url":"https://www.cve.org/CVERecord?id=CVE-2024-30406"},{"name":"CVE-2023-43804","url":"https://www.cve.org/CVERecord?id=CVE-2023-43804"},{"name":"CVE-2022-4450","url":"https://www.cve.org/CVERecord?id=CVE-2022-4450"},{"name":"CVE-2023-32732","url":"https://www.cve.org/CVERecord?id=CVE-2023-32732"},{"name":"CVE-2024-30394","url":"https://www.cve.org/CVERecord?id=CVE-2024-30394"},{"name":"CVE-2023-2650","url":"https://www.cve.org/CVERecord?id=CVE-2023-2650"},{"name":"CVE-2022-3996","url":"https://www.cve.org/CVERecord?id=CVE-2022-3996"},{"name":"CVE-2024-30407","url":"https://www.cve.org/CVERecord?id=CVE-2024-30407"},{"name":"CVE-2020-36242","url":"https://www.cve.org/CVERecord?id=CVE-2020-36242"},{"name":"CVE-2023-4785","url":"https://www.cve.org/CVERecord?id=CVE-2023-4785"},{"name":"CVE-2020-22916","url":"https://www.cve.org/CVERecord?id=CVE-2020-22916"},{"name":"CVE-2023-38408","url":"https://www.cve.org/CVERecord?id=CVE-2023-38408"},{"name":"CVE-2020-27350","url":"https://www.cve.org/CVERecord?id=CVE-2020-27350"},{"name":"CVE-2023-36054","url":"https://www.cve.org/CVERecord?id=CVE-2023-36054"},{"name":"CVE-2021-39533","url":"https://www.cve.org/CVERecord?id=CVE-2021-39533"},{"name":"CVE-2024-30390","url":"https://www.cve.org/CVERecord?id=CVE-2024-30390"},{"name":"CVE-2020-19185","url":"https://www.cve.org/CVERecord?id=CVE-2020-19185"},{"name":"CVE-2023-0809","url":"https://www.cve.org/CVERecord?id=CVE-2023-0809"},{"name":"CVE-2021-20193","url":"https://www.cve.org/CVERecord?id=CVE-2021-20193"},{"name":"CVE-2023-4806","url":"https://www.cve.org/CVERecord?id=CVE-2023-4806"},{"name":"CVE-2016-2781","url":"https://www.cve.org/CVERecord?id=CVE-2016-2781"},{"name":"CVE-2020-19189","url":"https://www.cve.org/CVERecord?id=CVE-2020-19189"},{"name":"CVE-2023-32731","url":"https://www.cve.org/CVERecord?id=CVE-2023-32731"},{"name":"CVE-2023-49083","url":"https://www.cve.org/CVERecord?id=CVE-2023-49083"},{"name":"CVE-2024-30388","url":"https://www.cve.org/CVERecord?id=CVE-2024-30388"},{"name":"CVE-2019-18276","url":"https://www.cve.org/CVERecord?id=CVE-2019-18276"},{"name":"CVE-2024-30386","url":"https://www.cve.org/CVERecord?id=CVE-2024-30386"},{"name":"CVE-2021-33560","url":"https://www.cve.org/CVERecord?id=CVE-2021-33560"},{"name":"CVE-2011-1677","url":"https://www.cve.org/CVERecord?id=CVE-2011-1677"},{"name":"CVE-2018-20225","url":"https://www.cve.org/CVERecord?id=CVE-2018-20225"},{"name":"CVE-2020-28928","url":"https://www.cve.org/CVERecord?id=CVE-2020-28928"},{"name":"CVE-2021-41039","url":"https://www.cve.org/CVERecord?id=CVE-2021-41039"},{"name":"CVE-2024-30382","url":"https://www.cve.org/CVERecord?id=CVE-2024-30382"},{"name":"CVE-2018-20482","url":"https://www.cve.org/CVERecord?id=CVE-2018-20482"},{"name":"CVE-2021-40528","url":"https://www.cve.org/CVERecord?id=CVE-2021-40528"},{"name":"CVE-2023-32681","url":"https://www.cve.org/CVERecord?id=CVE-2023-32681"},{"name":"CVE-2023-3446","url":"https://www.cve.org/CVERecord?id=CVE-2023-3446"},{"name":"CVE-2020-28493","url":"https://www.cve.org/CVERecord?id=CVE-2020-28493"},{"name":"CVE-2020-27783","url":"https://www.cve.org/CVERecord?id=CVE-2020-27783"},{"name":"CVE-2018-1000122","url":"https://www.cve.org/CVERecord?id=CVE-2018-1000122"},{"name":"CVE-2011-1089","url":"https://www.cve.org/CVERecord?id=CVE-2011-1089"},{"name":"CVE-2024-30405","url":"https://www.cve.org/CVERecord?id=CVE-2024-30405"},{"name":"CVE-2024-30397","url":"https://www.cve.org/CVERecord?id=CVE-2024-30397"},{"name":"CVE-2023-38545","url":"https://www.cve.org/CVERecord?id=CVE-2023-38545"},{"name":"CVE-2024-30395","url":"https://www.cve.org/CVERecord?id=CVE-2024-30395"}],"links":[],"reference":"CERTFR-2024-AVI-0297","revisions":[{"description":"Version initiale","revision_date":"2024-04-11T00:00:00.000000"}],"risks":[{"description":"D\u00e9ni de service \u00e0 distance"},{"description":"Injection de code indirecte \u00e0 distance (XSS)"},{"description":"Ex\u00e9cution de code arbitraire \u00e0 distance"},{"description":"Atteinte \u00e0 l'int\u00e9grit\u00e9 des donn\u00e9es"},{"description":"Non sp\u00e9cifi\u00e9 par l'\u00e9diteur"},{"description":"Contournement de la politique de s\u00e9curit\u00e9"},{"description":"Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"},{"description":"\u00c9l\u00e9vation de privil\u00e8ges"}],"summary":"De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans Juniper. Certaines\nd'entre elles permettent \u00e0 un attaquant de provoquer un probl\u00e8me de\ns\u00e9curit\u00e9 non sp\u00e9cifi\u00e9 par l'\u00e9diteur, une ex\u00e9cution de code arbitraire \u00e0\ndistance et un d\u00e9ni de service \u00e0 distance.\n","title":"Multiples vuln\u00e9rabilit\u00e9s dans Juniper","vendor_advisories":[{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 Juniper JSA79102 du 10 avril 2024","url":"https://supportportal.juniper.net/s/article/2024-04-Security-Bulletin-Junos-OS-Evolved-libslax-Multiple-vulnerabilities-in-libslax-resolved?language=en_US"},{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 Juniper JSA79106 du 10 avril 2024","url":"https://supportportal.juniper.net/s/article/2024-04-Security-Bulletin-Juniper-Cloud-Native-Router-Multiple-vulnerabilities-resolved-in-23-4-release?language=en_US"},{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 Juniper JSA79181 du 10 avril 2024","url":"https://supportportal.juniper.net/s/article/2024-04-Security-Bulletin-Junos-OS-Evolved-When-MAC-learning-happens-and-an-interface-gets-flapped-the-PFE-crashes-CVE-2024-30403?language=en_US"},{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 Juniper JSA79186 du 10 avril 2024","url":"https://supportportal.juniper.net/s/article/2024-04-Security-Bulletin-Junos-OS-EX4300-Series-If-a-specific-CLI-command-is-issued-PFE-crashes-will-occur-CVE-2024-30384?language=en_US"},{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 Juniper JSA79089 du 10 avril 2024","url":"https://supportportal.juniper.net/s/article/2024-04-Security-Bulletin-Junos-OS-QFX5000-Series-and-EX-Series-Specific-malformed-LACP-packets-will-cause-flaps-CVE-2024-30388?language=en_US"},{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 Juniper JSA79173 du 10 avril 2024","url":"https://supportportal.juniper.net/s/article/2024-04-Security-Bulletin-Paragon-Active-Assurance-probe-serviced-exposes-internal-objects-to-local-users-CVE-2024-30381?language=en_US"},{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 Juniper JSA79104 du 10 avril 2024","url":"https://supportportal.juniper.net/s/article/2024-04-Security-Bulletin-Junos-OS-Evolved-ACX-Series-with-Paragon-Active-Assurance-Test-Agent-A-local-high-privileged-attacker-can-recover-other-administrators-credentials-CVE-2024-30406?language=en_US"},{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 Juniper JSA79094 du 10 avril 2024","url":"https://supportportal.juniper.net/s/article/2024-04-Security-Bulletin-Junos-OS-A-specific-EVPN-type-5-route-causes-rpd-crash-CVE-2024-30394?language=en_US"},{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 Juniper JSA79183 du 10 avril 2024","url":"https://supportportal.juniper.net/s/article/2024-04-Security-Bulletin-Junos-OS-Evolved-Connection-limits-is-not-being-enforced-while-the-resp-rate-limit-is-being-enforced-CVE-2024-30390?language=en_US"},{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 Juniper JSA79176 du 10 avril 2024","url":"https://supportportal.juniper.net/s/article/2024-04-Security-Bulletin-Junos-OS-SRX4600-Series-A-high-amount-of-specific-traffic-causes-packet-drops-and-an-eventual-PFE-crash-CVE-2024-30398?language=en_US"},{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 Juniper JSA79179 du 10 avril 2024","url":"https://supportportal.juniper.net/s/article/2024-04-Security-Bulletin-Junos-OS-An-invalid-certificate-causes-a-Denial-of-Service-in-the-Internet-Key-Exchange-IKE-process-CVE-2024-30397?language=en_US"},{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 Juniper JSA79187 du 10 avril 2024","url":"https://supportportal.juniper.net/s/article/2024-04-Security-Bulletin-Junos-OS-ACX5448-ACX710-Due-to-the-interface-flaps-the-PFE-process-can-crash-CVE-2024-30387?language=en_US"},{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 Juniper JSA79109 du 10 avril 2024","url":"https://supportportal.juniper.net/s/article/2024-04-Security-Bulletin-Junos-OS-MX-Series-bbe-smgd-process-crash-upon-execution-of-specific-CLI-commands-CVE-2024-30378?language=en_US"},{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 Juniper JSA79171 du 10 avril 2024","url":"https://supportportal.juniper.net/s/article/2024-04-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-l2cpd-crash-upon-receipt-of-a-specific-TLV-CVE-2024-30380?language=en_US"},{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 Juniper JSA79188 du 10 avril 2024","url":"https://supportportal.juniper.net/s/article/2024-04-Security-Bulletin-Junos-OS-MX-Series-with-SPC3-and-SRX-Series-When-IPsec-authentication-is-configured-with-hmac-sha-384-and-hmac-sha-512-no-authentication-of-traffic-is-performed-CVE-2024-30391?language=en_US"},{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 Juniper JSA79099 du 10 avril 2024","url":"https://supportportal.juniper.net/s/article/2024-04-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-Higher-CPU-consumption-on-routing-engine-leads-to-Denial-of-Service-DoS-CVE-2024-30409?language=en_US"},{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 Juniper JSA79184 du 10 avril 2024","url":"https://supportportal.juniper.net/s/article/2024-04-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-In-a-EVPN-VXLAN-scenario-state-changes-on-adjacent-systems-can-cause-an-l2ald-process-crash-CVE-2024-30386?language=en_US"},{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 Juniper JSA79110 du 10 avril 2024","url":"https://supportportal.juniper.net/s/article/2024-04-Security-Bulletin-Junos-OS-MX-Series-and-EX9200-15C-Stack-based-buffer-overflow-in-aftman-CVE-2024-30401?language=en_US"},{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 Juniper JSA79174 du 10 avril 2024","url":"https://supportportal.juniper.net/s/article/2024-04-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-Junos-OS-and-Junos-OS-Evolved-RPD-crash-when-CoS-based-forwarding-CBF-policy-is-configured-CVE-2024-30382?language=en_US"},{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 Juniper JSA79095 du 10 avril 2024","url":"https://supportportal.juniper.net/s/article/2024-04-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-A-malformed-BGP-tunnel-encapsulation-attribute-will-lead-to-an-rpd-crash-CVE-2024-30395?language=en_US"},{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 Juniper JSA79100 du 10 avril 2024","url":"https://supportportal.juniper.net/s/article/2024-04-Security-Bulletin-Junos-OS-EX4300-Series-Loopback-filter-not-blocking-traffic-despite-having-discard-term-CVE-2024-30410?language=en_US"},{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 Juniper JSA79107 du 10 avril 2024","url":"https://supportportal.juniper.net/s/article/2024-04-Security-Bulletin-cRPD-Multiple-vulnerabilities-resolved-in-23-4R1-release?language=en_US"},{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 Juniper JSA79092 du 10 avril 2024","url":"https://supportportal.juniper.net/s/article/2024-04-Security-Bulletin-Junos-OS-MX-Series-with-SPC3-and-MS-MPC-MIC-When-URL-filtering-is-enabled-and-a-specific-URL-request-is-received-a-flowd-crash-occurs-CVE-2024-30392?language=en_US"},{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 Juniper JSA79185 du 10 avril 2024","url":"https://supportportal.juniper.net/s/article/2024-04-Security-Bulletin-Junos-OS-EX4300-Series-Firewall-filter-not-blocking-egress-traffic-CVE-2024-30389?language=en_US"},{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 Juniper JSA79108 du 10 avril 2024","url":"https://supportportal.juniper.net/s/article/2024-04-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-Multiple-cURL-vulnerabilities-resolved?language=en_US"},{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 Juniper JSA79091 du 10 avril 2024","url":"https://supportportal.juniper.net/s/article/2024-04-Security-Bulletin-Junos-OS-SRX-Branch-Series-When-DNS-proxy-is-configured-and-specific-DNS-queries-are-received-resolver-s-performance-is-degraded-CVE-2022-2795?language=en_US"},{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 Juniper JSA79180 du 10 avril 2024","url":"https://supportportal.juniper.net/s/article/2024-04-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-The-l2ald-crashes-on-receiving-telemetry-messages-from-a-specific-subscription-CVE-2024-30402?language=en_US"}]}
