CVEs
Settings
Links
Tenable Cloud
Tenable Community & Support
Tenable University
Severity
CVSS v2
CVSS v3
Theme
Light
Dark
Auto
Help
Plugins
Overview
Plugins Pipeline
Newest
Updated
Search
Nessus Families
WAS Families
NNM Families
LCE Families
Tenable OT Security Families
About Plugin Families
Release Notes
Audits
Overview
Newest
Updated
Search Audit Files
Search Items
References
Authorities
Documentation
Download All Audit Files
Indicators
Overview
Search
Indicators of Attack
Indicators of Exposure
CVEs
Overview
Newest
Updated
Search
Attack Path Techniques
Overview
Search
Links
Tenable Cloud
Tenable Community & Support
Tenable University
Settings
Severity
CVSS v2
CVSS v3
Theme
Light
Dark
Auto
Detections
Plugins
Overview
Plugins Pipeline
Release Notes
Newest
Updated
Search
Nessus Families
WAS Families
NNM Families
LCE Families
Tenable OT Security Families
About Plugin Families
Audits
Overview
Newest
Updated
Search Audit Files
Search Items
References
Authorities
Documentation
Download All Audit Files
Indicators
Overview
Search
Indicators of Attack
Indicators of Exposure
Analytics
CVEs
Overview
Newest
Updated
Search
Attack Path Techniques
Overview
Search
CVEs
CVE-2024-39516
Plugins
CVE-2024-39516
CVE-2024-39516
high
Information
CPEs
Plugins
Coming Soon
juniper JSA88106: JSA88106 : 2024-10 Security Bulletin: Junos OS Evolved: Low privileged local user able to view NETCONF traceoptions files (CVE-2024-39544)
(Last Updated: 10/16/2024)
juniper JSA88136: JSA88136 : 2024-10 Security Bulletin: Junos OS Evolved: Specific low privileged CLI commands and SNMP GET requests can trigger a resource leak
(Last Updated: 10/16/2024)
juniper JSA88138: JSA88138 : 2024-10 Security Bulletin: Junos OS and Junos OS Evolved: BGP update message containing aggregator attribute with an ASN value of zero (0) is accepted (CVE-2024-47507)
(Last Updated: 10/16/2024)
juniper JSA88105: JSA88105 : 2024-10 Security Bulletin: Junos OS Evolved: Connections to the network and broadcast address accepted (CVE-2024-39534)
(Last Updated: 10/16/2024)
juniper JSA88121: JSA88121 : 2024-10 Security Bulletin: Junos OS: Due to a race condition AgentD process causes a memory corruption and FPC reset (CVE-2024-47494)
(Last Updated: 10/16/2024)
juniper JSA88099: JSA88099 : 2024-10 Security Bulletin: Junos OS and Junos OS Evolved: With BGP traceoptions enabled, receipt of specially crafted BGP update causes RPD crash (CVE-2024-39515)
(Last Updated: 10/16/2024)
juniper JSA88134: JSA88134 : 2024-10 Security Bulletin: Junos OS: SRX5000 Series: Receipt of a specific malformed packet will cause a flowd crash (CVE-2024-47504)
(Last Updated: 10/16/2024)
juniper JSA88108: JSA88108 : 2024-10 Security Bulletin: Junos OS and Junos OS Evolved: cRPD: Receipt of crafted TCP traffic can trigger high CPU utilization (CVE-2024-39547)
(Last Updated: 10/16/2024)
juniper JSA88102: JSA88102 : 2024-10 Security Bulletin: Junos OS and Junos OS Evolved: When BGP nexthop traceoptions is enabled, receipt of specially crafted BGP packet causes RPD crash (CVE-2024-3952
(Last Updated: 10/16/2024)
juniper JSA88100: JSA88100 : 2024-10 Security Bulletin: Junos OS and Junos OS Evolved: Junos OS and Junos OS Evolved: Receipt of a specifically malformed BGP packet causes RPD crash when segment routi
(Last Updated: 10/16/2024)
juniper JSA88129: JSA88129 : 2024-10 Security Bulletin: Junos OS and Junos OS Evolved: In a BMP scenario receipt of a malformed AS PATH attribute can cause an RPD core (CVE-2024-47499)
(Last Updated: 10/16/2024)
juniper JSA88104: JSA88104 : 2024-10 Security Bulletin: Junos OS: SRX Series: Low privileged user able to access sensitive information on file system (CVE-2024-39527)
(Last Updated: 10/16/2024)
juniper JSA88100: JSA88100 : 2024-10 Security Bulletin: Junos OS and Junos OS Evolved: With BGP traceoptions enabled, receipt of specifically malformed BGP update causes RPD crash (CVE-2024-39516)
(Last Updated: 10/16/2024)