Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
juniper junos os evolved 22.4 vulnerabilities and exploits
(subscribe to this query)
7.5
CVSSv3
CVE-2024-21604
An Allocation of Resources Without Limits or Throttling vulnerability in the kernel of Juniper Networks Junos OS Evolved allows an unauthenticated, network-based malicious user to cause a Denial of Service (DoS). If a high rate of specific valid packets are processed by the rout...
Juniper Junos Os Evolved 21.2
Juniper Junos Os Evolved 21.4
Juniper Junos Os Evolved 22.1
Juniper Junos Os Evolved 22.2
Juniper Junos Os Evolved 22.3
Juniper Junos Os Evolved 22.4
7.5
CVSSv3
CVE-2024-21612
An Improper Handling of Syntactically Invalid Structure vulnerability in Object Flooding Protocol (OFP) service of Juniper Networks Junos OS Evolved allows an unauthenticated, network-based malicious user to cause a Denial of Service (DoS). On all Junos OS Evolved platforms, whe...
Juniper Junos Os Evolved 21.2
Juniper Junos Os Evolved 21.3
Juniper Junos Os Evolved
Juniper Junos Os Evolved 21.4
Juniper Junos Os Evolved 22.1
Juniper Junos Os Evolved 22.2
Juniper Junos Os Evolved 22.3
Juniper Junos Os Evolved 22.4
7.5
CVSSv3
CVE-2023-44175
A Reachable Assertion vulnerability in the routing protocol daemon (rpd) of Juniper Networks Junos OS and Junos OS Evolved allows to send specific genuine PIM packets to the device resulting in rpd to crash causing a Denial of Service (DoS). Continued receipt and processing of t...
Juniper Junos 20.4
Juniper Junos 21.2
Juniper Junos 21.3
Juniper Junos 21.4
Juniper Junos 22.1
Juniper Junos 22.2
Juniper Junos 22.3
Juniper Junos
Juniper Junos 22.4
Juniper Junos Os Evolved 22.3
Juniper Junos Os Evolved 22.4
Juniper Junos Os Evolved 23.2
7.5
CVSSv3
CVE-2023-44186
An Improper Handling of Exceptional Conditions vulnerability in AS PATH processing of Juniper Networks Junos OS and Junos OS Evolved allows an malicious user to send a BGP update message with an AS PATH containing a large number of 4-byte ASes, leading to a Denial of Service (Do...
Juniper Junos 20.4
Juniper Junos 21.1
Juniper Junos 21.2
Juniper Junos 21.3
Juniper Junos 21.4
Juniper Junos 22.1
Juniper Junos 22.2
Juniper Junos 22.3
Juniper Junos
Juniper Junos 22.4
Juniper Junos 23.2
Juniper Junos 23.1
Juniper Junos Os Evolved 20.4
Juniper Junos Os Evolved 21.1
Juniper Junos Os Evolved 21.2
Juniper Junos Os Evolved 21.3
Juniper Junos Os Evolved
Juniper Junos Os Evolved 21.4
Juniper Junos Os Evolved 22.1
Juniper Junos Os Evolved 22.2
Juniper Junos Os Evolved 22.3
Juniper Junos Os Evolved 22.4
7.5
CVSSv3
CVE-2023-0026
An Improper Input Validation vulnerability in the Routing Protocol Daemon (rpd) of Juniper Networks Junos OS and Junos OS Evolved allows an unauthenticated, network-based malicious user to cause a Denial of Service (DoS). When a BGP update message is received over an established ...
Juniper Junos 20.4
Juniper Junos 21.1
Juniper Junos 21.2
Juniper Junos 21.3
Juniper Junos 21.4
Juniper Junos 22.1
Juniper Junos 22.2
Juniper Junos 22.3
Juniper Junos 22.4
Juniper Junos
Juniper Junos Os Evolved 20.4
Juniper Junos Os Evolved 21.1
Juniper Junos Os Evolved 21.2
Juniper Junos Os Evolved 21.3
Juniper Junos Os Evolved
Juniper Junos Os Evolved 21.4
Juniper Junos Os Evolved 22.1
Juniper Junos Os Evolved 22.2
Juniper Junos Os Evolved 22.3
Juniper Junos Os Evolved 22.4
Juniper Junos Os Evolved 23.1
6.5
CVSSv3
CVE-2024-30380
An Improper Handling of Exceptional Conditions vulnerability in Juniper Networks Junos OS and Junos OS Evolved allows an adjacent unauthenticated malicious user to cause a Denial of Service (DoS), which causes the l2cpd process to crash by sending a specific TLV. The l2cpd proces...
6.5
CVSSv3
CVE-2024-21593
An Improper Check or Handling of Exceptional Conditions vulnerability in the Packet Forwarding Engine (PFE) of Juniper Networks Junos OS and Junos OS Evolved allows an unauthenticated, adjacent malicious user to cause a Denial of Service (DoS). If an attacker sends a specific MPL...
6.5
CVSSv3
CVE-2024-21618
An Access of Memory Location After End of Buffer vulnerability in the Layer-2 Control Protocols Daemon (l2cpd) of Juniper Networks Junos OS and Junos OS Evolved allows an adjacent, unauthenticated malicious user to cause Denial of Service (DoS). On all Junos OS and Junos OS Evolv...
6.5
CVSSv3
CVE-2023-44184
An Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in the management daemon (mgd) process of Juniper Networks Junos OS and Junos OS Evolved allows a network-based authenticated low-privileged attacker, by executing a specific command via NET...
Juniper Junos 20.4
Juniper Junos 21.2
Juniper Junos 21.3
Juniper Junos 21.4
Juniper Junos Os Evolved 21.4
Juniper Junos 22.1
Juniper Junos Os Evolved 22.1
Juniper Junos 22.2
Juniper Junos Os Evolved 22.2
Juniper Junos 22.3
Juniper Junos Os Evolved 22.3
Juniper Junos
Juniper Junos 22.4
Juniper Junos Os Evolved 22.4
Juniper Junos Os Evolved
6.5
CVSSv3
CVE-2023-44196
An Improper Check for Unusual or Exceptional Conditions in the Packet Forwarding Engine (pfe) of Juniper Networks Junos OS Evolved on PTX10003 Series allows an unauthenticated adjacent malicious user to cause an impact to the integrity of the system. When specific transit MPLS p...
Juniper Junos Os Evolved
Juniper Junos Os Evolved 20.4
Juniper Junos Os Evolved 21.1
Juniper Junos Os Evolved 21.2
Juniper Junos Os Evolved 21.3
Juniper Junos Os Evolved 21.4
Juniper Junos Os Evolved 22.1
Juniper Junos Os Evolved 22.2
Juniper Junos Os Evolved 22.3
Juniper Junos Os Evolved 22.4
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-5324
path traversal
CVE-2024-4743
CVE-2024-5184
TCP
CVE-2024-27822
code injection
CVE-2024-28995
CVE-2023-20938
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
3
NEXT »