Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
juniper junos os evolved 21.3 vulnerabilities and exploits
(subscribe to this query)
8.8
CVSSv3
CVE-2023-44182
An Unchecked Return Value vulnerability in the user interfaces to the Juniper Networks Junos OS and Junos OS Evolved, the CLI, the XML API, the XML Management Protocol, the NETCONF Management Protocol, the gNMI interfaces, and the J-Web User Interfaces causes unintended effects ...
Juniper Junos 20.4
Juniper Junos 21.1
Juniper Junos 21.2
Juniper Junos 21.3
Juniper Junos 21.4
Juniper Junos Os Evolved 21.4
Juniper Junos 22.1
Juniper Junos Os Evolved 22.1
Juniper Junos 22.2
Juniper Junos Os Evolved 22.2
Juniper Junos 22.3
Juniper Junos Os Evolved 22.3
Juniper Junos
Juniper Junos Os Evolved
8.8
CVSSv3
CVE-2022-22239
An Execution with Unnecessary Privileges vulnerability in Management Daemon (mgd) of Juniper Networks Junos OS Evolved allows a locally authenticated attacker with low privileges to escalate their privileges on the device and potentially remote systems. This vulnerability allows ...
Juniper Junos Os Evolved 20.4
Juniper Junos Os Evolved 21.1
Juniper Junos Os Evolved 21.2
Juniper Junos Os Evolved
Juniper Junos Os Evolved 21.3
8.2
CVSSv3
CVE-2023-28960
An Incorrect Permission Assignment for Critical Resource vulnerability in Juniper Networks Junos OS Evolved allows a local, authenticated low-privileged malicious user to copy potentially malicious files into an existing Docker container on the local system. A follow-on administr...
Juniper Junos Os Evolved 20.4
Juniper Junos Os Evolved 21.2
Juniper Junos Os Evolved 21.3
Juniper Junos Os Evolved 21.4
7.8
CVSSv3
CVE-2023-28966
An Incorrect Default Permissions vulnerability in Juniper Networks Junos OS Evolved allows a low-privileged local attacker with shell access to modify existing files or execute commands as root. The issue is caused by improper file and directory permissions on certain system file...
Juniper Junos Os Evolved 20.4
Juniper Junos Os Evolved 21.2
Juniper Junos Os Evolved 21.3
Juniper Junos Os Evolved
7.5
CVSSv3
CVE-2024-30382
An Improper Handling of Exceptional Conditions vulnerability in the routing protocol daemon (rpd) of Juniper Networks Junos OS and Junos OS Evolved allows a network-based, unauthenticated malicious user to send a specific routing update, causing an rpd core due to memory corrupti...
7.5
CVSSv3
CVE-2024-21612
An Improper Handling of Syntactically Invalid Structure vulnerability in Object Flooding Protocol (OFP) service of Juniper Networks Junos OS Evolved allows an unauthenticated, network-based malicious user to cause a Denial of Service (DoS). On all Junos OS Evolved platforms, whe...
Juniper Junos Os Evolved 21.2
Juniper Junos Os Evolved 21.3
Juniper Junos Os Evolved
Juniper Junos Os Evolved 21.4
Juniper Junos Os Evolved 22.1
Juniper Junos Os Evolved 22.2
Juniper Junos Os Evolved 22.3
Juniper Junos Os Evolved 22.4
7.5
CVSSv3
CVE-2023-44185
An Improper Input Validation vulnerability in the routing protocol daemon (rpd) of Juniper Networks allows an malicious user to cause a Denial of Service (DoS )to the device upon receiving and processing a specific malformed ISO VPN BGP UPDATE packet. Continued receipt of this p...
Juniper Junos 20.4
Juniper Junos 21.1
Juniper Junos 21.2
Juniper Junos 21.3
Juniper Junos 21.4
Juniper Junos 22.1
Juniper Junos 22.2
Juniper Junos 22.3
Juniper Junos
Juniper Junos Os Evolved 20.4
Juniper Junos Os Evolved 21.1
Juniper Junos Os Evolved 21.2
Juniper Junos Os Evolved 21.3
Juniper Junos Os Evolved
Juniper Junos Os Evolved 21.4
Juniper Junos Os Evolved 22.1
Juniper Junos Os Evolved 22.2
Juniper Junos Os Evolved 22.3
7.5
CVSSv3
CVE-2023-44197
An Out-of-Bounds Write vulnerability in the Routing Protocol Daemon (rpd) of Juniper Networks Junos OS and Junos OS Evolved allows an unauthenticated, network-based malicious user to cause a Denial of Service (DoS). On all Junos OS and Junos OS Evolved devices an rpd crash and r...
Juniper Junos 20.4
Juniper Junos Os Evolved 20.4
Juniper Junos 21.1
Juniper Junos 21.2
Juniper Junos Os Evolved 21.1
Juniper Junos Os Evolved 21.2
Juniper Junos Os Evolved 21.3
Juniper Junos 21.3
Juniper Junos 21.4
Juniper Junos Os Evolved
Juniper Junos Os Evolved 21.4
Juniper Junos
7.5
CVSSv3
CVE-2023-44175
A Reachable Assertion vulnerability in the routing protocol daemon (rpd) of Juniper Networks Junos OS and Junos OS Evolved allows to send specific genuine PIM packets to the device resulting in rpd to crash causing a Denial of Service (DoS). Continued receipt and processing of t...
Juniper Junos 20.4
Juniper Junos 21.2
Juniper Junos 21.3
Juniper Junos 21.4
Juniper Junos 22.1
Juniper Junos 22.2
Juniper Junos 22.3
Juniper Junos
Juniper Junos 22.4
Juniper Junos Os Evolved 22.3
Juniper Junos Os Evolved 22.4
Juniper Junos Os Evolved 23.2
7.5
CVSSv3
CVE-2023-44186
An Improper Handling of Exceptional Conditions vulnerability in AS PATH processing of Juniper Networks Junos OS and Junos OS Evolved allows an malicious user to send a BGP update message with an AS PATH containing a large number of 4-byte ASes, leading to a Denial of Service (Do...
Juniper Junos 20.4
Juniper Junos 21.1
Juniper Junos 21.2
Juniper Junos 21.3
Juniper Junos 21.4
Juniper Junos 22.1
Juniper Junos 22.2
Juniper Junos 22.3
Juniper Junos
Juniper Junos 22.4
Juniper Junos 23.2
Juniper Junos 23.1
Juniper Junos Os Evolved 20.4
Juniper Junos Os Evolved 21.1
Juniper Junos Os Evolved 21.2
Juniper Junos Os Evolved 21.3
Juniper Junos Os Evolved
Juniper Junos Os Evolved 21.4
Juniper Junos Os Evolved 22.1
Juniper Junos Os Evolved 22.2
Juniper Junos Os Evolved 22.3
Juniper Junos Os Evolved 22.4
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
authentication bypass
CVE-2024-30051
remote
CVE-2024-27954
CVE-2023-51483
CVE-2023-47782
SSRF
CVE-2024-24715
CVE-2023-52424
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
3
4
5
6
NEXT »