Vulnerabilities (CVE)

Filtered by vendor Juniper Subscribe
Filtered by product Northstar Controller
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2017-2327 1 Juniper 1 Northstar Controller 2019-10-03 4.9 MEDIUM 5.5 MEDIUM
A denial of service vulnerability in Juniper Networks NorthStar Controller Application prior to version 2.1.0 Service Pack 1 may allow an authenticated malicious user to consume large amounts of system resources leading to a cascading denial of services.
CVE-2017-2333 1 Juniper 1 Northstar Controller 2019-10-03 4.0 MEDIUM 6.5 MEDIUM
A persistent denial of service vulnerability in Juniper Networks NorthStar Controller Application prior to version 2.1.0 Service Pack 1 may allow a malicious, network-based, authenticated attacker to consume enough system resources to cause a persistent denial of service by visiting certain specific URLs on the server.
CVE-2017-2322 1 Juniper 1 Northstar Controller 2019-10-03 2.1 LOW 5.5 MEDIUM
A denial of service vulnerability in Juniper Networks NorthStar Controller Application prior to version 2.1.0 Service Pack 1, may allow an authenticated user to cause widespread denials of service to system services by consuming TCP and UDP ports which are normally reserved for other system services.
CVE-2017-2330 1 Juniper 1 Northstar Controller 2019-10-03 4.9 MEDIUM 6.2 MEDIUM
A denial of service vulnerability in Juniper Networks NorthStar Controller Application prior to version 2.1.0 Service Pack 1 may allow an unauthenticated, local user, to create a fork bomb scenario, also known as a rabbit virus, or wabbit, which will create processes that replicate themselves, until all resources are consumed on the system, leading to a denial of service to the entire system until it is restarted. Continued attacks by an unauthenticated, local user, can lead to persistent denials of services.
CVE-2017-2326 1 Juniper 1 Northstar Controller 2017-04-28 6.8 MEDIUM 6.5 MEDIUM
An information disclosure vulnerability in Juniper Networks NorthStar Controller Application prior to version 2.1.0 Service Pack 1 may allow an unprivileged, authenticated, network-based attacker to replicate the underlying Junos OS VM and all data it maintains to their local system for future analysis.
CVE-2017-2316 1 Juniper 1 Northstar Controller 2017-04-27 2.1 LOW 6.5 MEDIUM
A buffer overflow vulnerability in Juniper Networks NorthStar Controller Application prior to version 2.1.0 Service Pack 1 may allow an authenticated malicious user to cause a buffer overflow leading to a denial of service.
CVE-2017-2324 1 Juniper 1 Northstar Controller 2017-04-27 5.0 MEDIUM 5.3 MEDIUM
A command injection vulnerability in Juniper Networks NorthStar Controller Application prior to version 2.1.0 Service Pack 1 may allow a network-based malicious attacker to cause a denial of service condition.
CVE-2017-2318 1 Juniper 1 Northstar Controller 2017-04-27 4.0 MEDIUM 6.5 MEDIUM
A vulnerability in Juniper Networks NorthStar Controller Application prior to version 2.1.0 Service Pack 1 may allow an authenticated malicious user to read log files which will compromise the integrity of the system, or provide elevation of privileges.
CVE-2017-2329 1 Juniper 1 Northstar Controller 2017-04-27 2.1 LOW 6.2 MEDIUM
An insufficient authentication vulnerability in Juniper Networks NorthStar Controller Application prior to version 2.1.0 Service Pack 1 may allow an unprivileged, authenticated, user to execute certain specific unprivileged system files capable of causing widespread denials of system services.
CVE-2017-2328 1 Juniper 1 Northstar Controller 2017-04-27 2.1 LOW 5.5 MEDIUM
An information leak vulnerability in Juniper Networks NorthStar Controller Application prior to version 2.1.0 Service Pack 1 may allow an unprivileged, authenticated, user to elevate their permissions through reading unprivileged information stored in the NorthStar controller.
CVE-2017-2325 1 Juniper 1 Northstar Controller 2017-04-27 4.0 MEDIUM 6.5 MEDIUM
A buffer overflow vulnerability in Juniper Networks NorthStar Controller Application prior to version 2.1.0 Service Pack 1 may allow an authenticated malicious user to cause a buffer overflow leading to a denial of service.