Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
juniper junos 12.3 vulnerabilities and exploits
(subscribe to this query)
5
CVSSv2
CVE-2021-0261
A vulnerability in the HTTP/HTTPS service used by J-Web, Web Authentication, Dynamic-VPN (DVPN), Firewall Authentication Pass-Through with Web-Redirect, and Captive Portal allows an unauthenticated malicious user to cause an extended Denial of Service (DoS) for these services by ...
Juniper Junos 12.3
Juniper Junos 12.3x48
Juniper Junos 15.1x49
7.2
CVSSv2
CVE-2018-0024
An Improper Privilege Management vulnerability in a shell session of Juniper Networks Junos OS allows an authenticated unprivileged malicious user to gain full control of the system. Affected releases are Juniper Networks Junos OS: 12.1X46 versions before 12.1X46-D45 on SRX Serie...
Juniper Junos 12.1x46
Juniper Junos 12.3x48
Juniper Junos 12.3
Juniper Junos 14.1x53
Juniper Junos 15.1x49
3.3
CVSSv2
CVE-2021-0271
A Double Free vulnerability in the software forwarding interface daemon (sfid) process of Juniper Networks Junos OS allows an adjacently-connected malicious user to cause a Denial of Service (DoS) by sending a crafted ARP packet to the device. Continued receipt and processing of ...
Juniper Junos 12.3
Juniper Junos 15.1
5
CVSSv2
CVE-2014-2713
Juniper Junos prior to 11.4R11, 12.1 prior to 12.1R9, 12.2 prior to 12.2R7, 12.3R4 prior to 12.3R4-S3, 13.1 prior to 13.1R4, 13.2 prior to 13.2R2, and 13.3 prior to 13.3R1, as used in MX Series and T4000 routers, allows remote malicious users to cause a denial of service (PFE res...
Juniper Junos 13.1
Juniper Junos 13.2
Juniper Junos 12.2
Juniper Junos 12.3
Juniper Junos 13.3
Juniper Junos 12.1
Juniper Junos 11.4
7.1
CVSSv2
CVE-2013-4686
The kernel in Juniper Junos 10.4 prior to 10.4R14, 11.4 prior to 11.4R8, 11.4X27 prior to 11.4X27.43, 12.1 prior to 12.1R6, 12.1X44 prior to 12.1X44-D20, 12.2 prior to 12.2R4, and 12.3 prior to 12.3R2, in certain VLAN configurations with unrestricted arp-resp and proxy-arp settin...
Juniper Junos 12.1x44
Juniper Junos 12.1
Juniper Junos 12.2
Juniper Junos 12.3
Juniper Junos 10.4
Juniper Junos 11.4
Juniper Junos 11.4x27
4.3
CVSSv2
CVE-2019-0003
When a specific BGP flowspec configuration is enabled and upon receipt of a specific matching BGP packet meeting a specific term in the flowspec configuration, a reachable assertion failure occurs, causing the routing protocol daemon (rpd) process to crash with a core file being ...
Juniper Junos 12.1x46
Juniper Junos 12.3
Juniper Junos 12.3x48
Juniper Junos 14.1x53
Juniper Junos 15.1
Juniper Junos 15.1x49
Juniper Junos 15.1x53
1 Article
5
CVSSv2
CVE-2020-1639
When an attacker sends a specific crafted Ethernet Operation, Administration, and Maintenance (Ethernet OAM) packet to a target device, it may improperly handle the incoming malformed data and fail to sanitize this incoming data resulting in an overflow condition. This overflow c...
Juniper Junos 15.1x49
Juniper Junos 12.3
Juniper Junos 15.1x53
Juniper Junos 15.1
Juniper Junos 14.1x53
Juniper Junos 12.3x48
Juniper Junos 14.1x50
4.3
CVSSv2
CVE-2020-1661
On Juniper Networks Junos OS devices configured as a DHCP forwarder, the Juniper Networks Dynamic Host Configuration Protocol Daemon (jdhcp) process might crash when receiving a malformed DHCP packet. This issue only affects devices configured as DHCP forwarder with forward-only ...
Juniper Junos 12.3
Juniper Junos 15.1
Juniper Junos 16.1
Juniper Junos 12.3x48
Juniper Junos 15.1x49
Juniper Junos 15.1x53
Juniper Junos 14.1x53
10
CVSSv2
CVE-2017-10601
A specific device configuration can result in a commit failure condition. When this occurs, a user is logged in without being prompted for a password while trying to login through console, ssh, ftp, telnet or su, etc., This issue relies upon a device configuration precondition to...
Juniper Junos 14.2
Juniper Junos 14.1x53
Juniper Junos 13.3
Juniper Junos 12.3
Juniper Junos 15.1
Juniper Junos 14.1
Juniper Junos 13.2
Juniper Junos 12.3x48
9
CVSSv2
CVE-2013-6618
jsdm/ajax/port.php in J-Web in Juniper Junos prior to 10.4R13, 11.4 prior to 11.4R7, 12.1 prior to 12.1R5, 12.2 prior to 12.2R3, and 12.3 prior to 12.3R1 allows remote authenticated users to execute arbitrary commands via the rsargs parameter in an exec action.
Juniper Junos 10.3
Juniper Junos 10.2
Juniper Junos 10.1
Juniper Junos 12.1
Juniper Junos
Juniper Junos 11.4
Juniper Junos 12.3
Juniper Junos 12.2
Juniper Junos 10.0
1 EDB exploit
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-20065
open redirect
CVE-2024-1086
path traversal
CVE-2024-29825
XXE
CVE-2024-29822
CVE-2024-20696
CVE-2024-3564
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
3
4
5
6
NEXT »