Vulmon
Recent Vulnerabilities
Product List
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
juniper junos 19.4 vulnerabilities and exploits
(subscribe to this query)
6.4
CVSSv2
CVE-2022-22186
Due to an Improper Initialization vulnerability in Juniper Networks Junos OS on EX4650 devices, packets received on the management interface (em0) but not destined to the device, may be improperly forwarded to an egress interface, instead of being discarded. Such traffic being se...
Juniper Junos
Juniper Junos 19.1
Juniper Junos 19.2
Juniper Junos 19.3
Juniper Junos 19.4
Juniper Junos 20.1
Juniper Junos 20.2
Juniper Junos 20.3
Juniper Junos 20.4
Juniper Junos 21.1
Juniper Junos 21.2
Juniper Junos 21.3
Juniper Junos 21.4
NA
CVE-2022-22216
An Exposure of Sensitive Information to an Unauthorized Actor vulnerability in the PFE of Juniper Networks Junos OS on PTX Series and QFX10k Series allows an adjacent unauthenticated malicious user to gain access to sensitive information. PTX1000 and PTX10000 Series, and QFX10000...
Juniper Junos
Juniper Junos 18.4
Juniper Junos 19.1
Juniper Junos 19.2
Juniper Junos 19.3
Juniper Junos 19.4
Juniper Junos 20.1
Juniper Junos 20.2
Juniper Junos 20.3
Juniper Junos 20.4
Juniper Junos 21.1
Juniper Junos 21.2
Juniper Junos 18.3
7.8
CVSSv2
CVE-2021-31368
An Uncontrolled Resource Consumption vulnerability in the kernel of Juniper Networks JUNOS OS allows an unauthenticated network based malicious user to cause 100% CPU load and the device to become unresponsive by sending a flood of traffic to the out-of-band management ethernet p...
Juniper Junos
Juniper Junos 18.1
Juniper Junos 18.2
Juniper Junos 18.3
Juniper Junos 18.4
Juniper Junos 19.1
Juniper Junos 19.2
Juniper Junos 19.3
Juniper Junos 19.4
Juniper Junos 20.1
Juniper Junos 20.2
Juniper Junos 20.3
Juniper Junos 20.4
5
CVSSv2
CVE-2021-31371
Juniper Networks Junos OS uses the 128.0.0.0/2 subnet for internal communications between the RE and PFEs. It exists that packets utilizing these IP addresses may egress an QFX5000 Series switch, leaking configuration information such as heartbeats, kernel versions, etc. out to t...
Juniper Junos
Juniper Junos 17.3
Juniper Junos 18.1
Juniper Junos 18.3
Juniper Junos 19.1
Juniper Junos 19.2
Juniper Junos 19.3
Juniper Junos 19.4
Juniper Junos 20.1
Juniper Junos 20.2
Juniper Junos 20.3
Juniper Junos 20.4
Juniper Junos 21.1
4.3
CVSSv2
CVE-2021-31369
On MX Series platforms with MS-MPC/MS-MIC, an Allocation of Resources Without Limits or Throttling vulnerability in Juniper Networks Junos OS allows an unauthenticated network malicious user to cause a partial Denial of Service (DoS) with a high rate of specific traffic. If a Cla...
Juniper Junos
Juniper Junos 17.4
Juniper Junos 18.3
Juniper Junos 18.4
Juniper Junos 19.1
Juniper Junos 19.2
Juniper Junos 19.3
Juniper Junos 19.4
Juniper Junos 20.1
Juniper Junos 20.2
Juniper Junos 20.3
Juniper Junos 20.4
Juniper Junos 21.1
9
CVSSv2
CVE-2021-31372
An Improper Input Validation vulnerability in J-Web of Juniper Networks Junos OS allows a locally authenticated J-Web malicious user to escalate their privileges to root over the target device. This issue affects: Juniper Networks Junos OS All versions before 18.3R3-S5; 18.4 vers...
Juniper Junos 18.3
Juniper Junos 18.4
Juniper Junos 19.1
Juniper Junos 19.2
Juniper Junos 19.3
Juniper Junos 19.4
Juniper Junos 20.1
Juniper Junos 20.2
Juniper Junos 20.3
Juniper Junos 20.4
Juniper Junos 21.1
Juniper Junos 21.2
Juniper Junos
NA
CVE-2022-22249
An Improper Control of a Resource Through its Lifetime vulnerability in the Packet Forwarding Engine (PFE) of Juniper Networks Junos OS on MX Series allows an unauthenticated adjacent malicious user to cause a Denial of Service (DoS). When there is a continuous mac move a memory ...
Juniper Junos
Juniper Junos 15.1
Juniper Junos 19.1
Juniper Junos 19.2
Juniper Junos 19.3
Juniper Junos 19.4
Juniper Junos 20.1
Juniper Junos 20.2
Juniper Junos 20.3
Juniper Junos 20.4
Juniper Junos 21.1
Juniper Junos 21.2
Juniper Junos 21.3
9
CVSSv2
CVE-2021-31350
An Improper Privilege Management vulnerability in the gRPC framework, used by the Juniper Extension Toolkit (JET) API on Juniper Networks Junos OS and Junos OS Evolved, allows a network-based, low-privileged authenticated malicious user to perform operations as root, leading to c...
Juniper Junos 18.4
Juniper Junos 19.1
Juniper Junos 19.2
Juniper Junos Os Evolved 19.3
Juniper Junos Os Evolved 19.2
Juniper Junos Os Evolved 19.1
Juniper Junos 19.3
Juniper Junos 19.4
Juniper Junos Os Evolved 18.3
Juniper Junos 20.1
Juniper Junos Os Evolved 20.1
Juniper Junos 20.2
Juniper Junos 20.3
Juniper Junos Os Evolved 20.3
Juniper Junos Os Evolved 20.2
Juniper Junos 20.4
Juniper Junos Os Evolved 20.4
Juniper Junos Os Evolved 19.4
Juniper Junos Os Evolved 21.1
NA
CVE-2022-22203
An Incorrect Comparison vulnerability in PFE of Juniper Networks Junos OS allows an adjacent unauthenticated malicious user to cause a Denial of Service (DoS). On QFX5000 Series, and EX4600 and EX4650 platforms, the fxpc process will crash followed by the FPC reboot upon receipt ...
Juniper Junos 19.4
3.3
CVSSv2
CVE-2021-0292
An Uncontrolled Resource Consumption vulnerability in the ARP daemon (arpd) and Network Discovery Protocol (ndp) process of Juniper Networks Junos OS Evolved allows a malicious attacker on the local network to consume memory resources, ultimately resulting in a Denial of Service ...
Juniper Junos Os Evolved 20.1
Juniper Junos Os Evolved 19.4
Juniper Junos Os Evolved 20.2
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
deserialization
CVE-2024-4541
CVE-2024-3080
CVE-2024-4787
log injection
CVE-2024-5967
inject
CVE-2024-30078
CVE-2024-5899
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
7
8
9
10
NEXT »