Vulmon
Recent Vulnerabilities
Product List
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
juniper junos 15.1x49 vulnerabilities and exploits
(subscribe to this query)
4.3
CVSSv2
CVE-2018-0009
On Juniper Networks SRX series devices, firewall rules configured to match custom application UUIDs starting with zeros can match all TCP traffic. Due to this issue, traffic that should have been blocked by other rules is permitted to flow through the device resulting in a firewa...
Juniper Junos 12.1x46
Juniper Junos 12.3x48
Juniper Junos 15.1x49
6.1
CVSSv2
CVE-2018-0003
A specially crafted MPLS packet received or processed by the system, on an interface configured with MPLS, will store information in the system memory. Subsequently, if this stored information is accessed, this may result in a kernel crash leading to a denial of service. Affected...
Juniper Junos 12.1x46
Juniper Junos 12.3x48
Juniper Junos 15.1x49
Juniper Junos 14.1x53
Juniper Junos 15.1x53
Juniper Junos 14.1
Juniper Junos 14.2
Juniper Junos 16.1
Juniper Junos 16.1x65
Juniper Junos 17.2x75
Juniper Junos 15.1
Juniper Junos 12.3
Juniper Junos 16.2
Juniper Junos 17.1
Juniper Junos 17.2
10
CVSSv2
CVE-2018-0007
An unauthenticated network-based attacker able to send a maliciously crafted LLDP packet to the local segment, through a local segment broadcast, may be able to cause a Junos device to enter an improper boundary check condition allowing a memory corruption to occur, leading to a ...
Juniper Junos 12.1x46
Juniper Junos 12.3
Juniper Junos 12.3x48
Juniper Junos 14.1
Juniper Junos 14.1x53
Juniper Junos 14.2
Juniper Junos 15.1
Juniper Junos 15.1x49
Juniper Junos 15.1x53
Juniper Junos 16.1
Juniper Junos 16.1x65
Juniper Junos 16.2
Juniper Junos 17.1
4.3
CVSSv2
CVE-2016-4923
Insufficient cross site scripting protection in J-Web component in Juniper Networks Junos OS may potentially allow a remote unauthenticated user to inject web script or HTML and steal sensitive data and credentials from a J-Web session and to perform administrative actions on the...
Juniper Junos 11.4
Juniper Junos 11.4r13
Juniper Junos 12.3
Juniper Junos 12.3x48
Juniper Junos 13.3
Juniper Junos 14.1
Juniper Junos 14.2
Juniper Junos 15.1x53
Juniper Junos 15.1
Juniper Junos 15.1x49
Juniper Junos 12.1x44
Juniper Junos 12.1x47
Juniper Junos 12.1x46
5
CVSSv2
CVE-2017-10608
Any Juniper Networks SRX series device with one or more ALGs enabled may experience a flowd crash when traffic is processed by the Sun/MS-RPC ALGs. This vulnerability in the Sun/MS-RPC ALG services component of Junos OS allows an malicious user to cause a repeated denial of servi...
Juniper Junos 12.1x46
Juniper Junos 12.1x47
Juniper Junos 12.3x48
Juniper Junos 15.1x49
4.3
CVSSv2
CVE-2017-10618
When the 'bgp-error-tolerance' feature â€" designed to help mitigate remote session resets from malformed path attributes â€" is enabled, a BGP UPDATE containing a specifically crafted set of transitive attributes can cause ...
Juniper Junos 13.3
Juniper Junos 14.1
Juniper Junos 14.1x50
Juniper Junos 14.1x53
Juniper Junos 14.2
Juniper Junos 15.1
Juniper Junos 15.1x49
Juniper Junos 15.1x53
Juniper Junos 16.1
Juniper Junos 16.2
Juniper Junos 17.1
Juniper Junos 17.2
Juniper Junos 17.2x75
6.8
CVSSv2
CVE-2016-1261
J-Web does not validate certain input that may lead to cross-site request forgery (CSRF) issues or cause a denial of J-Web service (DoS).
Juniper Junos 14.1
Juniper Junos 13.3
Juniper Junos 12.1x44
Juniper Junos 14.2
Juniper Junos 12.3
Juniper Junos 13.2x51
Juniper Junos 14.1x53
Juniper Junos 12.3x48
Juniper Junos 12.1x47
Juniper Junos 12.1x46
Juniper Junos 15.1
Juniper Junos 15.1x49
4.3
CVSSv2
CVE-2017-10610
On SRX Series devices, a crafted ICMP packet embedded within a NAT64 IPv6 to IPv4 tunnel may cause the flowd process to crash. Repeated crashes of the flowd process constitutes an extended denial of service condition for the SRX Series device. This issue only occurs if NAT64 is c...
Juniper Junos 12.1x46
Juniper Junos 12.3x48
Juniper Junos 15.1x49
2.1
CVSSv2
CVE-2017-10613
A vulnerability in a specific loopback filter action command, processed in a specific logical order of operation, in a running configuration of Juniper Networks Junos OS, allows an attacker with CLI access and the ability to initiate remote sessions to the loopback interface with...
Juniper Junos 12.1x46
Juniper Junos 12.3x48
Juniper Junos 14.1
Juniper Junos 14.1x53
Juniper Junos 14.2
Juniper Junos 15.1
Juniper Junos 15.1x49
Juniper Junos 15.1x53
Juniper Junos 16.1
5.8
CVSSv2
CVE-2017-10620
Juniper Networks Junos OS on SRX series devices do not verify the HTTPS server certificate before downloading anti-virus updates. This may allow a man-in-the-middle malicious user to inject bogus signatures to cause service disruptions or make the device not detect certain types ...
Juniper Junos 12.1x46
Juniper Junos 12.3x48
Juniper Junos 15.1x49
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
TCP
CVE-2024-4577
CVE-2024-2695
CVE-2024-31870
injection
CVE-2024-3813
arbitrary code
CVE-2024-27801
CVE-2024-30120
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
5
6
7
8
9
10
NEXT »