Vulmon
Recent Vulnerabilities
Product List
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
juniper junos 15.2 vulnerabilities and exploits
(subscribe to this query)
5.3
CVSSv3
CVE-2016-1260
Juniper Junos OS prior to 13.2X51-D36, 14.1X53 prior to 14.1X53-D25, and 15.2 prior to 15.2R1 on EX4300 series switches allow remote malicious users to cause a denial of service (network loop and bandwidth consumption) via unspecified vectors related to Spanning Tree Protocol (ST...
Juniper Junos 13.2x51
Juniper Junos 14.1x53
Juniper Junos 15.2
5.4
CVSSv3
CVE-2018-0011
A reflected cross site scripting (XSS) vulnerability in Junos Space may potentially allow a remote authenticated user to inject web script or HTML and steal sensitive data and credentials from a session, and to perform administrative actions on the Junos Space network management ...
Juniper Junos Space 13.3
Juniper Junos Space 14.1
Juniper Junos Space 15.1
Juniper Junos Space 15.2
Juniper Junos Space 16.1
Juniper Junos Space 17.1
6.5
CVSSv3
CVE-2018-0010
A vulnerability in the Juniper Networks Junos Space Security Director allows a user who does not have SSH access to a device to reuse the URL that was created for another user to perform SSH access. Affected releases are all versions of Junos Space Security Director before 17.2R1...
Juniper Junos Space 15.1
Juniper Junos Space 17.1
Juniper Junos Space 16.1
Juniper Junos Space 17.2
Juniper Junos Space 13.3
Juniper Junos Space 14.1
Juniper Junos Space 15.2
5.4
CVSSv3
CVE-2018-0047
A persistent cross-site scripting vulnerability in the UI framework used by Junos Space Security Director may allow authenticated users to inject persistent and malicious scripts. This may allow stealing of information or performing actions as a different user when other users ac...
Juniper Junos Space 15.1
Juniper Junos Space 17.1
Juniper Junos Space 16.1
Juniper Junos Space 17.2
Juniper Junos Space 13.3
Juniper Junos Space 14.1
Juniper Junos Space 15.2
5.3
CVSSv3
CVE-2021-0273
An always-incorrect control flow implementation in the implicit filter terms of Juniper Networks Junos OS and Junos OS Evolved on ACX5800, EX9200 Series, MX10000 Series, MX240, MX480, MX960 devices with affected Trio line cards allows an malicious user to exploit an interdependen...
Juniper Junos 15.1
Juniper Junos 15.2
Juniper Junos 16.1
Juniper Junos 17.1
Juniper Junos 17.2
Juniper Junos 17.3
Juniper Junos 17.4
Juniper Junos 18.1
Juniper Junos 18.2
Juniper Junos 18.3
Juniper Junos 18.4
Juniper Junos 19.1
Juniper Junos 19.3
Juniper Junos 19.4
Juniper Junos Os Evolved 19.4
6.5
CVSSv3
CVE-2019-0016
A malicious authenticated user may be able to delete a device from the Junos Space database without the necessary privileges through crafted Ajax interactions obtained from another legitimate delete action performed by another administrative user. Affected releases are Juniper Ne...
Juniper Junos Space 13.3
Juniper Junos Space 14.1
Juniper Junos Space 15.1
Juniper Junos Space 15.2
Juniper Junos Space 16.1
Juniper Junos Space 17.1
Juniper Junos Space 17.2
Juniper Junos Space 18.1
Juniper Junos Space 18.2
8.8
CVSSv3
CVE-2019-0017
The Junos Space application, which allows Device Image files to be uploaded, has insufficient validity checking which may allow uploading of malicious images or scripts, or other content types. Affected releases are Juniper Networks Junos Space versions before 18.3R1.
Juniper Junos Space 13.3
Juniper Junos Space 14.1
Juniper Junos Space 15.1
Juniper Junos Space 15.2
Juniper Junos Space 16.1
Juniper Junos Space 17.1
Juniper Junos Space 17.2
Juniper Junos Space 18.1
Juniper Junos Space 18.2
6.8
CVSSv3
CVE-2021-0220
The Junos Space Network Management Platform has been found to store shared secrets in a recoverable format that can be exposed through the UI. An attacker who is able to execute arbitrary code in the victim browser (for example via XSS) or access cached contents may be able to ob...
Juniper Junos Space 1.4
Juniper Junos Space 15.1
Juniper Junos Space 1.0
Juniper Junos Space 12.3
Juniper Junos Space 1.3
Juniper Junos Space 12.1
Juniper Junos Space 11.3
Juniper Junos Space 11.2
Juniper Junos Space 1.1
Juniper Junos Space 1.2
Juniper Junos Space 2.0
Juniper Junos Space 11.1
Juniper Junos Space 12.2
Juniper Junos Space 11.4
Juniper Junos Space 16.1
Juniper Junos Space 15.2
Juniper Junos Space 18.1r1
Juniper Junos Space 13.3
Juniper Junos Space 14.1
Juniper Junos Space 17.2
Juniper Junos Space 19.2
Juniper Junos Space 19.1
7.5
CVSSv3
CVE-2016-1409
The Neighbor Discovery (ND) protocol implementation in the IPv6 stack in Cisco IOS XE 2.1 up to and including 3.17S, IOS XR 2.0.0 up to and including 5.3.2, and NX-OS allows remote malicious users to cause a denial of service (packet-processing outage) via crafted ND messages, ak...
Cisco Ios 12.1(14)e7
Cisco Ios 12.3(3f)
Cisco Ios Xe 3.2.10sg
Cisco Ios 12.0(10)s6
Cisco Ios 12.1(3)db
Cisco Ios 12.0(16)sc3
Cisco Ios Xr 5.1.1.k9sec
Cisco Nx-os 5.2(1)n1(4)
Cisco Ios 12.4(11)xw6
Cisco Ios Xe 3.3.0sq
Cisco Ios 12.2(28)sb12
Cisco Ios 12.1(5)xm1
Cisco Ios 12.4(2)t2
Cisco Ios 12.2(2)xa2
Cisco Ios 15.4(2)s2
Cisco Ios 15.3(3)jnb3
Cisco Ios Xe 3.13.2s
Cisco Ios 12.0(21)sp4
Cisco Ios 12.2(18)ixa
Cisco Ios 12.1(1)xb
Cisco Ios 12.2(19c)
Cisco Nx-os 6.0(2)u5(1)
1 Article
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
type confusion
IMAP
CVE-2024-36103
CVE-2024-28995
CVE-2024-37325
CVE-2024-30078
CVE-2024-30082
SQL injection
CVE-2024-30052
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started