Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
juniper junos 15.1x49 vulnerabilities and exploits
(subscribe to this query)
4.3
CVSSv2
CVE-2018-0025
When an SRX Series device is configured to use HTTP/HTTPS pass-through authentication services, a client sending authentication credentials in the initial HTTP/HTTPS session is at risk that these credentials may be captured during follow-on HTTP/HTTPS requests by a malicious acto...
Juniper Junos 12.1x46
Juniper Junos 12.3x48
Juniper Junos 15.1x49
5
CVSSv2
CVE-2021-0261
A vulnerability in the HTTP/HTTPS service used by J-Web, Web Authentication, Dynamic-VPN (DVPN), Firewall Authentication Pass-Through with Web-Redirect, and Captive Portal allows an unauthenticated malicious user to cause an extended Denial of Service (DoS) for these services by ...
Juniper Junos 12.3
Juniper Junos 12.3x48
Juniper Junos 15.1x49
5.8
CVSSv2
CVE-2017-10620
Juniper Networks Junos OS on SRX series devices do not verify the HTTPS server certificate before downloading anti-virus updates. This may allow a man-in-the-middle malicious user to inject bogus signatures to cause service disruptions or make the device not detect certain types ...
Juniper Junos 12.1x46
Juniper Junos 12.3x48
Juniper Junos 15.1x49
5
CVSSv2
CVE-2019-0010
An SRX Series Service Gateway configured for Unified Threat Management (UTM) may experience a system crash with the error message "mbuf exceed" -- an indication of memory buffer exhaustion -- due to the receipt of crafted HTTP traffic. Each crafted HTTP packet inspected...
Juniper Junos 12.1x46
Juniper Junos 12.3x48
Juniper Junos 15.1x49
1 Article
5
CVSSv2
CVE-2019-0060
The flowd process, responsible for forwarding traffic in SRX Series services gateways, may crash and restart when processing specific transit IP packets through an IPSec tunnel. Continued processing of these packets may result in an extended Denial of Service (DoS) condition. Thi...
Juniper Junos 15.1x49
Juniper Junos 18.2
Juniper Junos 18.4
4.3
CVSSv2
CVE-2016-1273
Juniper Junos OS prior to 13.2X51-D40, 14.x prior to 14.1X53-D30, and 15.x prior to 15.1X53-D20 on QFX5100 and QFX10002 switches do not have sufficient entropy, which makes it easier for remote malicious users to defeat cryptographic encryption and authentication protection mecha...
Juniper Junos 14.1x53
Juniper Junos 15.1
Juniper Junos 15.1x49
Juniper Junos 15.1x53
Juniper Junos
5
CVSSv2
CVE-2017-2348
The Juniper Enhanced jdhcpd daemon may experience high CPU utilization, or crash and restart upon receipt of an invalid IPv6 UDP packet. Both high CPU utilization and repeated crashes of the jdhcpd daemon can result in a denial of service as DHCP service is interrupted. No other ...
Juniper Junos 14.1x53
Juniper Junos 15.1
Juniper Junos 15.1x49
Juniper Junos 15.1x53
7.1
CVSSv2
CVE-2016-1276
Juniper Junos OS prior to 12.1X46-D50, 12.1X47 prior to 12.1X47-D23, 12.3X48 prior to 12.3X48-D25, and 15.1X49 prior to 15.1X49-D40 on a High-End SRX-Series chassis system with one or more Application Layer Gateways (ALGs) enabled allow remote malicious users to cause a denial of...
Juniper Junos 12.1x46
Juniper Junos 12.1x47
Juniper Junos 12.3x48
Juniper Junos 15.1x49
1 Article
5
CVSSv2
CVE-2017-10608
Any Juniper Networks SRX series device with one or more ALGs enabled may experience a flowd crash when traffic is processed by the Sun/MS-RPC ALGs. This vulnerability in the Sun/MS-RPC ALG services component of Junos OS allows an malicious user to cause a repeated denial of servi...
Juniper Junos 12.1x46
Juniper Junos 12.1x47
Juniper Junos 12.3x48
Juniper Junos 15.1x49
5
CVSSv2
CVE-2019-0055
A vulnerability in the SIP ALG packet processing service of Juniper Networks Junos OS allows an malicious user to cause a Denial of Service (DoS) to the device by sending specific types of valid SIP traffic to the device. In this case, the flowd process crashes and generates a co...
Juniper Junos 12.3x48
Juniper Junos 15.1x49
Juniper Junos 17.3
Juniper Junos 17.4
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-33228
CVE-2024-20361
log injection
bypass
CVE-2024-4985
CVE-2024-35223
CVE-2024-29849
CVE-2024-31893
IMAP
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
NEXT »