Vulmon
Recent Vulnerabilities
Product List
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
juniper junos 15.1x49 vulnerabilities and exploits
(subscribe to this query)
5.9
CVSSv3
CVE-2016-1257
The Routing Engine in Juniper Junos OS 13.2R5 up to and including 13.2R8, 13.3R1 prior to 13.3R8, 13.3R7 prior to 13.3R7-S3, 14.1R1 prior to 14.1R6, 14.1R3 prior to 14.1R3-S9, 14.1R4 prior to 14.1R4-S7, 14.1X51 prior to 14.1X51-D65, 14.1X53 prior to 14.1X53-D12, 14.1X53 prior to ...
Juniper Junos 14.1
Juniper Junos 13.3
Juniper Junos 14.2
Juniper Junos 14.1x53
Juniper Junos 13.2
Juniper Junos 15.1
Juniper Junos 14.1x51
Juniper Junos 15.1x49
9.8
CVSSv3
CVE-2021-0249
On SRX Series devices configured with UTM services a buffer overflow vulnerability in the Packet Forwarding Engine (PFE) of Juniper Networks Junos OS may allow an malicious user to arbitrarily execute code or commands on the target to take over or otherwise impact the device by s...
Juniper Junos 15.1x49
Juniper Junos 17.4
Juniper Junos 18.1
Juniper Junos 18.2
Juniper Junos 18.3
Juniper Junos 18.4
Juniper Junos 19.1
Juniper Junos 19.2
7.5
CVSSv3
CVE-2019-0052
The srxpfe process may crash on SRX Series services gateways when the UTM module processes a specific fragmented HTTP packet. The packet is misinterpreted as a regular TCP packet which causes the processor to crash. This issue affects all SRX Series platforms that support URL-Fil...
Juniper Junos 12.3x48
Juniper Junos 15.1x49
Juniper Junos 17.3
Juniper Junos 17.4
Juniper Junos 18.1
Juniper Junos 18.2
Juniper Junos 18.3
Juniper Junos 18.4
7.5
CVSSv3
CVE-2019-0066
An unexpected status return value weakness in the Next-Generation Multicast VPN (NG-mVPN) service of Juniper Networks Junos OS allows malicious user to cause a Denial of Service (DoS) condition and core the routing protocol daemon (rpd) process when a specific malformed IPv4 pack...
Juniper Junos 15.1
Juniper Junos 15.1x49
Juniper Junos 15.1x53
Juniper Junos 16.1
Juniper Junos 16.2
Juniper Junos 17.1
Juniper Junos 17.2
Juniper Junos 17.3
8.8
CVSSv3
CVE-2018-0021
If all 64 digits of the connectivity association name (CKN) key or all 32 digits of the connectivity association key (CAK) key are not configured, all remaining digits will be auto-configured to 0. Hence, Juniper devices configured with short MacSec keys are at risk to an increas...
Juniper Junos 15.1x49
Juniper Junos 14.1
Juniper Junos 14.1x53
Juniper Junos 15.1x53
Juniper Junos 16.1
Juniper Junos 16.2
Juniper Junos 17.1
Juniper Junos 15.1
5.9
CVSSv3
CVE-2016-1277
Juniper Junos OS prior to 12.1X46-D50, 12.1X47 prior to 12.1X47-D40, 12.3X48 prior to 12.3X48-D30, 13.3 prior to 13.3R9, 14.1 prior to 14.1R8, 14.1X53 prior to 14.1X53-D40, 14.2 prior to 14.2R6, 15.1 prior to 15.1F6 or 15.1R3, and 15.1X49 prior to 15.1X49-D40, when configured wit...
Juniper Junos 14.1
Juniper Junos 13.3
Juniper Junos 14.2
Juniper Junos 14.1x53
Juniper Junos 12.3x48
Juniper Junos 12.1x47
Juniper Junos 15.1
Juniper Junos 15.1x49
Juniper Junos
1 Article
7.5
CVSSv3
CVE-2017-2347
A denial of service vulnerability in rpd daemon of Juniper Networks Junos OS allows a malformed MPLS ping packet to crash the rpd daemon if MPLS OAM is configured. Repeated crashes of the rpd daemon can result in an extended denial of service condition for the device. The affecte...
Juniper Junos 12.3x48
Juniper Junos 13.3
Juniper Junos 14.1
Juniper Junos 14.1x53
Juniper Junos 14.2
Juniper Junos 15.1
Juniper Junos 15.1x49
Juniper Junos 15.1x53
Juniper Junos 16.1
5.9
CVSSv3
CVE-2018-0002
On SRX Series and MX Series devices with a Service PIC with any ALG enabled, a crafted TCP/IP response packet processed through the device results in memory corruption leading to a flowd daemon crash. Sustained crafted response packets lead to repeated crashes of the flowd daemon...
Juniper Junos 12.1x46
Juniper Junos 12.3x48
Juniper Junos 14.1
Juniper Junos 14.2
Juniper Junos 15.1x49
Juniper Junos 15.1
Juniper Junos 16.1
Juniper Junos 16.2
Juniper Junos 17.1
1 Github repository
6.2
CVSSv3
CVE-2018-0008
An unauthenticated root login may allow upon reboot when a commit script is used. A commit script allows a device administrator to execute certain instructions during commit, which is configured under the [system scripts commit] stanza. Certain commit scripts that work without a ...
Juniper Junos 12.1x46
Juniper Junos 12.3x48
Juniper Junos 15.1x49
Juniper Junos 14.1
Juniper Junos 14.1x53
Juniper Junos 14.2
Juniper Junos 15.1
Juniper Junos 15.1x53
Juniper Junos 16.1
5.5
CVSSv3
CVE-2017-10613
A vulnerability in a specific loopback filter action command, processed in a specific logical order of operation, in a running configuration of Juniper Networks Junos OS, allows an attacker with CLI access and the ability to initiate remote sessions to the loopback interface with...
Juniper Junos 12.1x46
Juniper Junos 12.3x48
Juniper Junos 14.1
Juniper Junos 14.1x53
Juniper Junos 14.2
Juniper Junos 15.1
Juniper Junos 15.1x49
Juniper Junos 15.1x53
Juniper Junos 16.1
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-5834
CVE-2024-30100
CVE-2024-4577
physical
dos
CVE-2024-30099
CVE-2024-27801
CVE-2024-32146
logic flaw
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
8
9
10
NEXT »