Vulmon
Recent Vulnerabilities
Product List
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
juniper junos 16.1 vulnerabilities and exploits
(subscribe to this query)
7.5
CVSSv3
CVE-2018-0020
Junos OS may be impacted by the receipt of a malformed BGP UPDATE which can lead to a routing process daemon (rpd) crash and restart. Receipt of a repeated malformed BGP UPDATEs can result in an extended denial of service condition for the device. This malformed BGP UPDATE does n...
Juniper Junos 15.1x49
Juniper Junos 14.1x53
Juniper Junos 15.1x53
Juniper Junos 16.1
Juniper Junos 16.2
Juniper Junos 17.1
Juniper Junos 15.1
Juniper Junos 17.2
Juniper Junos 16.1x65
Juniper Junos 17.2x75
8.8
CVSSv3
CVE-2018-0021
If all 64 digits of the connectivity association name (CKN) key or all 32 digits of the connectivity association key (CAK) key are not configured, all remaining digits will be auto-configured to 0. Hence, Juniper devices configured with short MacSec keys are at risk to an increas...
Juniper Junos 15.1x49
Juniper Junos 14.1
Juniper Junos 14.1x53
Juniper Junos 15.1x53
Juniper Junos 16.1
Juniper Junos 16.2
Juniper Junos 17.1
Juniper Junos 15.1
7.5
CVSSv3
CVE-2018-0022
A Junos device with VPLS routing-instances configured on one or more interfaces may be susceptible to an mbuf leak when processing a specific MPLS packet. Approximately 1 mbuf is leaked per each packet processed. The number of mbufs is platform dependent. The following command pr...
Juniper Junos 15.1x49
Juniper Junos 14.1
Juniper Junos 14.1x53
Juniper Junos 15.1x53
Juniper Junos 16.1
Juniper Junos 16.2
Juniper Junos 17.1
Juniper Junos 15.1
Juniper Junos 12.1x46
Juniper Junos 12.3x48
Juniper Junos 14.2
Juniper Junos 17.2
5.9
CVSSv3
CVE-2018-0019
A vulnerability in Junos OS SNMP MIB-II subagent daemon (mib2d) may allow a remote network based malicious user to cause the mib2d process to crash resulting in a denial of service condition (DoS) for the SNMP subsystem. While a mib2d process crash can disrupt the network monitor...
Juniper Junos 15.1x49
Juniper Junos 14.1
Juniper Junos 14.1x53
Juniper Junos 15.1x53
Juniper Junos 16.1
Juniper Junos 16.2
Juniper Junos 17.1
Juniper Junos 15.1
Juniper Junos 12.1x46
Juniper Junos 12.3x48
Juniper Junos 14.2
Juniper Junos 17.2
Juniper Junos 12.3
Juniper Junos 16.1x65
Juniper Junos 16.1x70
6.2
CVSSv3
CVE-2018-0008
An unauthenticated root login may allow upon reboot when a commit script is used. A commit script allows a device administrator to execute certain instructions during commit, which is configured under the [system scripts commit] stanza. Certain commit scripts that work without a ...
Juniper Junos 12.1x46
Juniper Junos 12.3x48
Juniper Junos 15.1x49
Juniper Junos 14.1
Juniper Junos 14.1x53
Juniper Junos 14.2
Juniper Junos 15.1
Juniper Junos 15.1x53
Juniper Junos 16.1
5.4
CVSSv3
CVE-2018-0011
A reflected cross site scripting (XSS) vulnerability in Junos Space may potentially allow a remote authenticated user to inject web script or HTML and steal sensitive data and credentials from a session, and to perform administrative actions on the Junos Space network management ...
Juniper Junos Space 13.3
Juniper Junos Space 14.1
Juniper Junos Space 15.1
Juniper Junos Space 15.2
Juniper Junos Space 16.1
Juniper Junos Space 17.1
5.9
CVSSv3
CVE-2018-0002
On SRX Series and MX Series devices with a Service PIC with any ALG enabled, a crafted TCP/IP response packet processed through the device results in memory corruption leading to a flowd daemon crash. Sustained crafted response packets lead to repeated crashes of the flowd daemon...
Juniper Junos 12.1x46
Juniper Junos 12.3x48
Juniper Junos 14.1
Juniper Junos 14.2
Juniper Junos 15.1x49
Juniper Junos 15.1
Juniper Junos 16.1
Juniper Junos 16.2
Juniper Junos 17.1
1 Github repository
9.8
CVSSv3
CVE-2018-0007
An unauthenticated network-based attacker able to send a maliciously crafted LLDP packet to the local segment, through a local segment broadcast, may be able to cause a Junos device to enter an improper boundary check condition allowing a memory corruption to occur, leading to a ...
Juniper Junos 12.1x46
Juniper Junos 12.3
Juniper Junos 12.3x48
Juniper Junos 14.1
Juniper Junos 14.1x53
Juniper Junos 14.2
Juniper Junos 15.1
Juniper Junos 15.1x49
Juniper Junos 15.1x53
Juniper Junos 16.1
Juniper Junos 16.1x65
Juniper Junos 16.2
Juniper Junos 17.1
6.5
CVSSv3
CVE-2018-0010
A vulnerability in the Juniper Networks Junos Space Security Director allows a user who does not have SSH access to a device to reuse the URL that was created for another user to perform SSH access. Affected releases are all versions of Junos Space Security Director before 17.2R1...
Juniper Junos Space 15.1
Juniper Junos Space 17.1
Juniper Junos Space 16.1
Juniper Junos Space 17.2
Juniper Junos Space 13.3
Juniper Junos Space 14.1
Juniper Junos Space 15.2
6.5
CVSSv3
CVE-2018-0003
A specially crafted MPLS packet received or processed by the system, on an interface configured with MPLS, will store information in the system memory. Subsequently, if this stored information is accessed, this may result in a kernel crash leading to a denial of service. Affected...
Juniper Junos 12.1x46
Juniper Junos 12.3x48
Juniper Junos 15.1x49
Juniper Junos 14.1x53
Juniper Junos 15.1x53
Juniper Junos 14.1
Juniper Junos 14.2
Juniper Junos 16.1
Juniper Junos 16.1x65
Juniper Junos 17.2x75
Juniper Junos 15.1
Juniper Junos 12.3
Juniper Junos 16.2
Juniper Junos 17.1
Juniper Junos 17.2
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
SSRF
server-side request forgery
CVE-2024-30067
CVE-2024-5553
CVE-2024-30095
IDOR
CVE-2024-35252
CVE-2024-23692
CVE-2024-27801
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
5
6
7
8
9
10
NEXT »