{"vulnerability": "CVE-2024-39540", "sightings": [{"uuid": "289f6e97-7800-4dc0-aac3-c4d06f7da3a9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-39540", "type": "seen", "source": "https://t.me/cvedetector/689", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-39540 - An Improper Check for Unusual or Exceptional Condi\", \n  \"Content\": \"CVE ID : CVE-2024-39540 \nPublished : July 11, 2024, 5:15 p.m. | 42\u00a0minutes ago \nDescription : An Improper Check for Unusual or Exceptional Conditions vulnerability in the Packet Forwarding Engine (pfe) of Juniper Networks Junos OS on SRX Series, and MX Series with SPC3 allows an unauthenticated, network-based attacker to cause a Denial-of-Service (DoS).  \n  \nWhen an affected device receives specific valid TCP traffic, the pfe crashes and restarts leading to a momentary but complete service outage.  \n  \nThis issue affects Junos OS:  \n  \n21.2 releases from 21.2R3-S5 before 21.2R3-S6.  \n  \nThis issue does not affect earlier or later releases. \nSeverity: 7.5 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"11 Jul 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-07-11T20:00:07.000000Z"}]}