Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
juniper junos os evolved 21.4 vulnerabilities and exploits
(subscribe to this query)
7.8
CVSSv2
CVE-2022-22183
An Improper Access Control vulnerability in Juniper Networks Junos OS Evolved allows a network-based unauthenticated attacker who is able to connect to a specific open IPv4 port, which in affected releases should otherwise be unreachable, to cause the CPU to consume all resources...
Juniper Junos Os Evolved 20.4
Juniper Junos Os Evolved 21.1
Juniper Junos Os Evolved 21.2
Juniper Junos Os Evolved 21.3
Juniper Junos Os Evolved 21.4
NA
CVE-2024-30380
An Improper Handling of Exceptional Conditions vulnerability in Juniper Networks Junos OS and Junos OS Evolved allows an adjacent unauthenticated malicious user to cause a Denial of Service (DoS), which causes the l2cpd process to crash by sending a specific TLV. The l2cpd proces...
NA
CVE-2024-30402
An Improper Check for Unusual or Exceptional Conditions vulnerability in the Layer 2 Address Learning Daemon (l2ald) of Juniper Networks Junos OS and Junos OS Evolved allows an unauthenticated, adjacent malicious user to cause a Denial of Service (DoS). When telemetry requests ar...
NA
CVE-2024-30382
An Improper Handling of Exceptional Conditions vulnerability in the routing protocol daemon (rpd) of Juniper Networks Junos OS and Junos OS Evolved allows a network-based, unauthenticated malicious user to send a specific routing update, causing an rpd core due to memory corrupti...
NA
CVE-2024-30386
A Use-After-Free vulnerability in the Layer 2 Address Learning Daemon (l2ald) of Juniper Networks Junos OS and Junos OS Evolved allows an unauthenticated, adjacent malicious user to cause l2ald to crash leading to a Denial-of-Service (DoS). In an EVPN-VXLAN scenario, when state u...
NA
CVE-2024-21615
An Incorrect Default Permissions vulnerability in Juniper Networks Junos OS and Junos OS Evolved allows a local, low-privileged malicious user to access confidential information on the system. On all Junos OS and Junos OS Evolved platforms, when NETCONF traceoptions are configure...
NA
CVE-2024-21618
An Access of Memory Location After End of Buffer vulnerability in the Layer-2 Control Protocols Daemon (l2cpd) of Juniper Networks Junos OS and Junos OS Evolved allows an adjacent, unauthenticated malicious user to cause Denial of Service (DoS). On all Junos OS and Junos OS Evolv...
NA
CVE-2024-21593
An Improper Check or Handling of Exceptional Conditions vulnerability in the Packet Forwarding Engine (PFE) of Juniper Networks Junos OS and Junos OS Evolved allows an unauthenticated, adjacent malicious user to cause a Denial of Service (DoS). If an attacker sends a specific MPL...
NA
CVE-2024-21598
An Improper Validation of Syntactic Correctness of Input vulnerability in the Routing Protocol Daemon (rpd) of Juniper Networks Junos OS and Junos OS Evolved allows a network-based, unauthenticated malicious user to cause a Denial of Service (DoS). If a BGP update is received ove...
NA
CVE-2024-21590
An Improper Input Validation vulnerability in Juniper Tunnel Driver (jtd) and ICMP module of Juniper Networks Junos OS Evolved allows an unauthenticated attacker within the MPLS administrative domain to send specifically crafted packets to the Routing Engine (RE) to cause a Denia...
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-22460
CVE-2024-4646
CVE-2024-29212
IMAP
CVE-2023-36672
CVE-2024-34547
command injection
CVE-2024-4651
stored XSS
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
3
4
5
6
NEXT »