Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
juniper junos 6.5 vulnerabilities and exploits
(subscribe to this query)
5
CVSSv2
CVE-2006-3529
Memory leak in Juniper JUNOS 6.4 up to and including 8.0, built before May 10, 2006, allows remote malicious users to cause a denial of service (kernel packet memory consumption and crash) via crafted IPv6 packets whose buffers are not released after they are processed.
Juniper Junos 6.8
Juniper Junos 6.9
Juniper Junos 7.6
Juniper Junos 7.7
Juniper Junos 6.4
Juniper Junos 6.5
Juniper Junos 7.2
Juniper Junos 7.3
Juniper Junos 8.0
Juniper Junos 7.0
Juniper Junos 7.1
Juniper Junos 7.8
Juniper Junos 7.9
Juniper Junos 6.6
Juniper Junos 6.7
Juniper Junos 7.4
Juniper Junos 7.5
10
CVSSv2
CVE-2018-0007
An unauthenticated network-based attacker able to send a maliciously crafted LLDP packet to the local segment, through a local segment broadcast, may be able to cause a Junos device to enter an improper boundary check condition allowing a memory corruption to occur, leading to a ...
Juniper Junos 12.1x46
Juniper Junos 12.3
Juniper Junos 12.3x48
Juniper Junos 14.1
Juniper Junos 14.1x53
Juniper Junos 14.2
Juniper Junos 15.1
Juniper Junos 15.1x49
Juniper Junos 15.1x53
Juniper Junos 16.1
Juniper Junos 16.1x65
Juniper Junos 16.2
Juniper Junos 17.1
7.1
CVSSv2
CVE-2018-0004
A sustained sequence of different types of normal transit traffic can trigger a high CPU consumption denial of service condition in the Junos OS register and schedule software interrupt handler subsystem when a specific command is issued to the device. This affects one or more th...
Juniper Junos 12.1x46
Juniper Junos 12.3x48
Juniper Junos 12.3
Juniper Junos 14.1
Juniper Junos 14.1x53
Juniper Junos 14.2
Juniper Junos 15.1
Juniper Junos 15.1x49
Juniper Junos 15.1x53
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
camera
bypass
CVE-2024-3592
CVE-2024-37383
CVE-2024-24919
CVE-2024-27822
CVE-2024-36788
CVE-2024-36789
man-in-the-middle
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started