Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
juniper junos 23.2 vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2024-21610
An Improper Handling of Exceptional Conditions vulnerability in the Class of Service daemon (cosd) of Juniper Networks Junos OS on MX Series allows an authenticated, network-based attacker with low privileges to cause a limited Denial of Service (DoS). In a scaled subscriber scen...
NA
CVE-2024-21615
An Incorrect Default Permissions vulnerability in Juniper Networks Junos OS and Junos OS Evolved allows a local, low-privileged malicious user to access confidential information on the system. On all Junos OS and Junos OS Evolved platforms, when NETCONF traceoptions are configure...
NA
CVE-2024-21618
An Access of Memory Location After End of Buffer vulnerability in the Layer-2 Control Protocols Daemon (l2cpd) of Juniper Networks Junos OS and Junos OS Evolved allows an adjacent, unauthenticated malicious user to cause Denial of Service (DoS). On all Junos OS and Junos OS Evolv...
NA
CVE-2024-30405
An Incorrect Calculation of Buffer Size vulnerability in Juniper Networks Junos OS SRX 5000 Series devices using SPC2 line cards while ALGs are enabled allows an attacker sending specific crafted packets to cause a transit traffic Denial of Service (DoS). Continued receipt and pr...
NA
CVE-2024-21619
A Missing Authentication for Critical Function vulnerability combined with a Generation of Error Message Containing Sensitive Information vulnerability in J-Web of Juniper Networks Junos OS on SRX Series and EX Series allows an unauthenticated, network-based malicious user to acc...
Juniper Junos
Juniper Junos 20.4
Juniper Junos 21.2
Juniper Junos 21.3
Juniper Junos 21.4
Juniper Junos 22.1
Juniper Junos 22.2
Juniper Junos 22.3
Juniper Junos 22.4
Juniper Junos 23.2
NA
CVE-2024-21620
An Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in J-Web of Juniper Networks Junos OS on SRX Series and EX Series allows an malicious user to construct a URL that when visited by another user enables the malicious us...
Juniper Junos
Juniper Junos 20.4
Juniper Junos 21.2
Juniper Junos 21.4
Juniper Junos 22.1
Juniper Junos 22.2
Juniper Junos 22.3
Juniper Junos 22.4
Juniper Junos 23.2
Juniper Junos 23.4
NA
CVE-2023-36842
An Improper Check for Unusual or Exceptional Conditions vulnerability in Juniper DHCP Daemon (jdhcpd) of Juniper Networks Junos OS allows an adjacent, unauthenticated malicious user to cause the jdhcpd to consume all the CPU cycles resulting in a Denial of Service (DoS). On Juno...
Juniper Junos 20.4
Juniper Junos 21.2
Juniper Junos 21.3
Juniper Junos 21.4
Juniper Junos 22.1
Juniper Junos 22.2
Juniper Junos 22.3
Juniper Junos
Juniper Junos 22.4
Juniper Junos 23.2
NA
CVE-2024-21585
An Improper Handling of Exceptional Conditions vulnerability in BGP session processing of Juniper Networks Junos OS and Junos OS Evolved allows an unauthenticated network-based attacker, using specific timing outside the attacker's control, to flap BGP sessions and cause th...
Juniper Junos 20.4
Juniper Junos 21.2
Juniper Junos 21.3
Juniper Junos 21.4
Juniper Junos 22.1
Juniper Junos 22.2
Juniper Junos 22.3
Juniper Junos 22.4
Juniper Junos 23.2
Juniper Junos Os Evolved 21.3
Juniper Junos Os Evolved 21.4
Juniper Junos Os Evolved 22.1
Juniper Junos Os Evolved 22.2
Juniper Junos Os Evolved 22.3
Juniper Junos Os Evolved 22.4
Juniper Junos Os Evolved 23.2
NA
CVE-2024-21587
An Improper Handling of Exceptional Conditions vulnerability in the broadband edge subscriber management daemon (bbe-smgd) of Juniper Networks Junos OS on MX Series allows an attacker directly connected to the vulnerable system who repeatedly flaps DHCP subscriber sessions to ca...
Juniper Junos 20.4
Juniper Junos 21.2
Juniper Junos 21.3
Juniper Junos 21.4
Juniper Junos 22.1
Juniper Junos 22.2
Juniper Junos 22.3
Juniper Junos 22.4
Juniper Junos 23.2
NA
CVE-2024-21596
A Heap-based Buffer Overflow vulnerability in the Routing Protocol Daemon (RPD) of Juniper Networks Junos OS and Junos OS Evolved allows an unauthenticated, network based malicious user to cause a Denial of Service (DoS). If an attacker sends a specific BGP UPDATE message to the...
Juniper Junos 20.4
Juniper Junos 21.2
Juniper Junos 21.3
Juniper Junos 21.4
Juniper Junos 22.1
Juniper Junos 22.2
Juniper Junos 22.3
Juniper Junos 22.4
Juniper Junos 23.1
Juniper Junos 23.2
Juniper Junos Os Evolved 21.3
Juniper Junos Os Evolved 21.4
Juniper Junos Os Evolved 22.1
Juniper Junos Os Evolved 22.2
Juniper Junos Os Evolved 22.3
Juniper Junos Os Evolved 22.4
Juniper Junos Os Evolved 23.1
Juniper Junos Os Evolved 23.2
VMScore
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-33228
CVE-2024-20361
log injection
bypass
CVE-2024-4985
CVE-2024-35223
CVE-2024-29849
CVE-2024-31893
IMAP
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
NEXT »