Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
juniper junos space vulnerabilities and exploits
(subscribe to this query)
7.5
CVSSv3
CVE-2023-22400
An Uncontrolled Resource Consumption vulnerability in the PFE management daemon (evo-pfemand) of Juniper Networks Junos OS Evolved allows an unauthenticated, network-based malicious user to cause an FPC crash leading to a Denial of Service (DoS). When a specific SNMP GET operatio...
Juniper Junos Os Evolved 20.4
Juniper Junos Os Evolved 21.1
Juniper Junos Os Evolved 21.2
Juniper Junos Os Evolved 21.3
Juniper Junos Os Evolved 21.4
7.5
CVSSv3
CVE-2022-22211
A limitless resource allocation vulnerability in FPC resources of Juniper Networks Junos OS Evolved on PTX Series allows an unprivileged malicious user to cause Denial of Service (DoS). Continuously polling the SNMP jnxCosQstatTable causes the FPC to run out of GUID space, causin...
Juniper Junos Os Evolved 20.4
Juniper Junos Os Evolved 21.1
Juniper Junos Os Evolved 21.2
Juniper Junos Os Evolved
Juniper Junos Os Evolved 21.3
Juniper Junos Os Evolved 21.4
Juniper Junos Os Evolved 22.1
5.5
CVSSv3
CVE-2022-22215
A Missing Release of File Descriptor or Handle after Effective Lifetime vulnerability in plugable authentication module (PAM) of Juniper Networks Junos OS and Junos OS Evolved allows a locally authenticated attacker with low privileges to cause a Denial of Service (DoS). It is po...
Juniper Junos 19.1
Juniper Junos 19.2
Juniper Junos 19.3
Juniper Junos 19.4
Juniper Junos 20.1
Juniper Junos
Juniper Junos 20.2
Juniper Junos 20.3
Juniper Junos 20.4
Juniper Junos 21.1
Juniper Junos 21.2
Juniper Junos Os Evolved 20.4
Juniper Junos Os Evolved 21.1
Juniper Junos Os Evolved 21.2
Juniper Junos Os Evolved
5.5
CVSSv3
CVE-2021-0293
A vulnerability in Juniper Networks Junos OS caused by Missing Release of Memory after Effective Lifetime leads to a memory leak each time the CLI command 'show system connections extensive' is executed. The amount of memory leaked on each execution depends on the numbe...
Juniper Junos 18.2
Juniper Junos 18.3
Juniper Junos 18.4
Juniper Junos 19.1
Juniper Junos 19.2
Juniper Junos 19.3
Juniper Junos 19.4
Juniper Junos 20.1
Juniper Junos 20.2
Juniper Junos 20.3
5.5
CVSSv3
CVE-2021-0238
When a MX Series is configured as a Broadband Network Gateway (BNG) based on Layer 2 Tunneling Protocol (L2TP), executing certain CLI command may cause the system to run out of disk space, excessive disk usage may cause other complications. An administrator can use the following ...
Juniper Junos 17.3
Juniper Junos 18.1
Juniper Junos 18.2
Juniper Junos 18.3
Juniper Junos 19.1
Juniper Junos 19.2
Juniper Junos 19.3
Juniper Junos 19.4
Juniper Junos 20.1
Juniper Junos 20.2
Juniper Junos 20.3
Juniper Junos 20.4
6.8
CVSSv3
CVE-2021-0220
The Junos Space Network Management Platform has been found to store shared secrets in a recoverable format that can be exposed through the UI. An attacker who is able to execute arbitrary code in the victim browser (for example via XSS) or access cached contents may be able to ob...
Juniper Junos Space 1.0
Juniper Junos Space 1.1
Juniper Junos Space 1.2
Juniper Junos Space 1.3
Juniper Junos Space 1.4
Juniper Junos Space 2.0
Juniper Junos Space 11.1
Juniper Junos Space 11.2
Juniper Junos Space 11.3
Juniper Junos Space 11.4
Juniper Junos Space 12.1
Juniper Junos Space 12.2
Juniper Junos Space 12.3
Juniper Junos Space 13.1
Juniper Junos Space 13.3
Juniper Junos Space 14.1
Juniper Junos Space 15.1
Juniper Junos Space 15.2
Juniper Junos Space 16.1
Juniper Junos Space 17.1
Juniper Junos Space 17.2
Juniper Junos Space 18.1
6.5
CVSSv3
CVE-2020-1611
A Local File Inclusion vulnerability in Juniper Networks Junos Space allows an malicious user to view all files on the target when the device receives malicious HTTP packets. This issue affects: Juniper Networks Junos Space versions before 19.4R1.
Juniper Junos Space 17.1
Juniper Junos Space 17.2
Juniper Junos Space 18.1
Juniper Junos Space 18.2
Juniper Junos Space 18.3
Juniper Junos Space 18.4
Juniper Junos Space 19.1
Juniper Junos Space 19.2
Juniper Junos Space 19.3
1 Github repository
6.5
CVSSv3
CVE-2019-0038
Crafted packets destined to the management interface (fxp0) of an SRX340 or SRX345 services gateway may create a denial of service (DoS) condition due to buffer space exhaustion. This issue only affects the SRX340 and SRX345 services gateways. No other products or platforms are a...
Juniper Junos 17.4
Juniper Junos 18.1
Juniper Junos 18.2
Juniper Junos 18.3
Juniper Junos 15.1x49
Juniper Junos 17.3
6.5
CVSSv3
CVE-2019-0016
A malicious authenticated user may be able to delete a device from the Junos Space database without the necessary privileges through crafted Ajax interactions obtained from another legitimate delete action performed by another administrative user. Affected releases are Juniper Ne...
Juniper Junos Space 15.1
Juniper Junos Space 16.1
Juniper Junos Space 13.3
Juniper Junos Space 14.1
Juniper Junos Space 15.2
Juniper Junos Space 17.1
Juniper Junos Space 17.2
Juniper Junos Space 18.1
Juniper Junos Space 18.2
8.8
CVSSv3
CVE-2019-0017
The Junos Space application, which allows Device Image files to be uploaded, has insufficient validity checking which may allow uploading of malicious images or scripts, or other content types. Affected releases are Juniper Networks Junos Space versions before 18.3R1.
Juniper Junos Space 14.1
Juniper Junos Space 17.2
Juniper Junos Space 18.1
Juniper Junos Space 18.2
Juniper Junos Space 13.3
Juniper Junos Space 15.1
Juniper Junos Space 15.2
Juniper Junos Space 17.1
Juniper Junos Space 16.1
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
path traversal
CVE-2024-26978
CVE-2024-26982
wireless
CVE-2023-6949
CVE-2024-26980
CVE-2024-32766
CVE-2024-26939
cache poisoning
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
3
4
5
NEXT »