Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
juniper junos 12.3x48 vulnerabilities and exploits
(subscribe to this query)
4.3
CVSSv2
CVE-2018-0009
On Juniper Networks SRX series devices, firewall rules configured to match custom application UUIDs starting with zeros can match all TCP traffic. Due to this issue, traffic that should have been blocked by other rules is permitted to flow through the device resulting in a firewa...
Juniper Junos 12.1x46
Juniper Junos 12.3x48
Juniper Junos 15.1x49
7.2
CVSSv2
CVE-2015-3007
The Juniper SRX Series services gateways with Junos OS 12.1X46 prior to 12.1X46-D35, 12.1X47 prior to 12.1X47-D25, and 12.3X48 prior to 12.3X48-D15 do not properly implement the "set system ports console insecure" feature, which allows physically proximate malicious use...
Juniper Junos 12.1x46
Juniper Junos 12.1x47
Juniper Junos 12.3x48
5
CVSSv2
CVE-2017-10608
Any Juniper Networks SRX series device with one or more ALGs enabled may experience a flowd crash when traffic is processed by the Sun/MS-RPC ALGs. This vulnerability in the Sun/MS-RPC ALG services component of Junos OS allows an malicious user to cause a repeated denial of servi...
Juniper Junos 12.1x46
Juniper Junos 12.1x47
Juniper Junos 12.3x48
Juniper Junos 15.1x49
5
CVSSv2
CVE-2015-5363
The SRX Network Security Daemon (nsd) in Juniper SRX Series services gateways with Junos 12.1X44 prior to 12.1X44-D50, 12.1X46 prior to 12.1X46-D35, 12.1X47 prior to 12.1X47-D25, and 12.3X48 prior to 12.3X48-D15 allows remote DNS servers to cause a denial of service (crash) via a...
Juniper Junos 12.1x46
Juniper Junos 12.1x44
Juniper Junos 12.1x47
Juniper Junos 12.3x48
7.1
CVSSv2
CVE-2016-1276
Juniper Junos OS prior to 12.1X46-D50, 12.1X47 prior to 12.1X47-D23, 12.3X48 prior to 12.3X48-D25, and 15.1X49 prior to 15.1X49-D40 on a High-End SRX-Series chassis system with one or more Application Layer Gateways (ALGs) enabled allow remote malicious users to cause a denial of...
Juniper Junos 12.1x46
Juniper Junos 12.1x47
Juniper Junos 12.3x48
Juniper Junos 15.1x49
1 Article
5
CVSSv2
CVE-2019-0055
A vulnerability in the SIP ALG packet processing service of Juniper Networks Junos OS allows an malicious user to cause a Denial of Service (DoS) to the device by sending specific types of valid SIP traffic to the device. In this case, the flowd process crashes and generates a co...
Juniper Junos 12.3x48
Juniper Junos 15.1x49
Juniper Junos 17.3
Juniper Junos 17.4
10
CVSSv2
CVE-2017-2343
The Integrated User Firewall (UserFW) feature was introduced in Junos OS version 12.1X47-D10 on the Juniper SRX Series devices to provide simple integration of user profiles on top of the existing firewall polices. As part of an internal security review of the UserFW services aut...
Juniper Junos 12.3x48
Juniper Junos 15.1x49
5
CVSSv2
CVE-2017-10619
When Express Path (formerly known as service offloading) is configured on Juniper Networks SRX1400, SRX3400, SRX3600, SRX5400, SRX5600, SRX5800 in high availability cluster configuration mode, certain multicast packets might cause the flowd process to crash, halting or interrupti...
Juniper Junos 15.1x49
Juniper Junos 12.3x48
9
CVSSv2
CVE-2017-2349
A command injection vulnerability in the IDP feature of Juniper Networks Junos OS on SRX series devices potentially allows a user with login access to the device to execute shell commands and elevate privileges. Affected releases are Juniper Networks Junos OS 12.1X44 before 12.1X...
Juniper Junos 15.1x49
Juniper Junos 12.3x48
Juniper Junos 12.1x46
Juniper Junos 12.1x47
Juniper Junos 12.1x44
7.2
CVSSv2
CVE-2018-0024
An Improper Privilege Management vulnerability in a shell session of Juniper Networks Junos OS allows an authenticated unprivileged malicious user to gain full control of the system. Affected releases are Juniper Networks Junos OS: 12.1X46 versions before 12.1X46-D45 on SRX Serie...
Juniper Junos 12.1x46
Juniper Junos 12.3x48
Juniper Junos 12.3
Juniper Junos 14.1x53
Juniper Junos 15.1x49
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-4654
CVE-2023-49606
encryption
NULL pointer dereference
CVE-2024-4439
CVE-2024-4649
race condition
CVE-2024-27202
CVE-2024-34566
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
NEXT »