Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
juniper junos 12.1x46 vulnerabilities and exploits
(subscribe to this query)
383
VMScore
CVE-2018-0060
An improper input validation weakness in the device control daemon process (dcd) of Juniper Networks Junos OS allows an malicious user to cause a Denial of Service to the dcd process and interfaces and connected clients when the Junos device is requesting an IP address for itself...
Juniper Junos 12.1x46
Juniper Junos 12.3x48
Juniper Junos 15.1
Juniper Junos 15.1x49
Juniper Junos 15.1x53
Juniper Junos 14.1x53
445
VMScore
CVE-2017-10614
A vulnerability in telnetd service on Junos OS allows a remote malicious user to cause a limited memory and/or CPU consumption denial of service attack. This issue was found during internal product security testing. Affected releases are Juniper Networks Junos OS 12.1X46 before 1...
Juniper Junos 12.1x46
Juniper Junos 12.3x48
Juniper Junos 14.1
Juniper Junos 14.2
Juniper Junos 15.1
Juniper Junos 15.1x53
Juniper Junos 15.1x49
383
VMScore
CVE-2019-0003
When a specific BGP flowspec configuration is enabled and upon receipt of a specific matching BGP packet meeting a specific term in the flowspec configuration, a reachable assertion failure occurs, causing the routing protocol daemon (rpd) process to crash with a core file being ...
Juniper Junos 12.1x46
Juniper Junos 12.3
Juniper Junos 12.3x48
Juniper Junos 14.1x53
Juniper Junos 15.1
Juniper Junos 15.1x49
Juniper Junos 15.1x53
1 Article
383
VMScore
CVE-2014-2712
Cross-site scripting (XSS) vulnerability in J-Web in Juniper Junos prior to 10.0S25, 10.4 prior to 10.4R10, 11.4 prior to 11.4R11, 12.1 prior to 12.1R9, 12.1X44 prior to 12.1X44-D30, 12.1X45 prior to 12.1X45-D20, 12.1X46 prior to 12.1X46-D10, and 12.2 prior to 12.2R1 allows remot...
Juniper Junos 12.1x46
Juniper Junos 10.4
Juniper Junos 12.2
Juniper Junos 12.1
Juniper Junos 12.1x44
Juniper Junos 12.1x45
Juniper Junos 11.4
Juniper Junos 10.0
445
VMScore
CVE-2016-1258
Embedthis Appweb, as used in J-Web in Juniper Junos OS prior to 12.1X44-D60, 12.1X46 prior to 12.1X46-D45, 12.1X47 prior to 12.1X47-D30, 12.3 prior to 12.3R10, 12.3X48 prior to 12.3X48-D20, 13.2X51 prior to 13.2X51-D20, 13.3 prior to 13.3R8, 14.1 prior to 14.1R6, and 14.2 prior t...
Juniper Junos 13.2x51
Juniper Junos 14.1
Juniper Junos 13.3
Juniper Junos 12.3
Juniper Junos 12.1x47
Juniper Junos 12.1x46
Juniper Junos 12.1x44
Juniper Junos 14.2
Juniper Junos 12.3x48
187
VMScore
CVE-2017-10613
A vulnerability in a specific loopback filter action command, processed in a specific logical order of operation, in a running configuration of Juniper Networks Junos OS, allows an attacker with CLI access and the ability to initiate remote sessions to the loopback interface with...
Juniper Junos 12.1x46
Juniper Junos 12.3x48
Juniper Junos 14.1
Juniper Junos 14.1x53
Juniper Junos 14.2
Juniper Junos 15.1
Juniper Junos 15.1x49
Juniper Junos 15.1x53
Juniper Junos 16.1
668
VMScore
CVE-2018-0001
A remote, unauthenticated attacker may be able to execute code by exploiting a use-after-free defect found in older versions of PHP through injection of crafted data via specific PHP URLs within the context of the J-Web process. Affected releases are Juniper Networks Junos OS: 12...
Juniper Junos 12.1x46
Juniper Junos 12.3x48
Juniper Junos 15.1x49
Juniper Junos 15.1x53
Juniper Junos 14.1
Juniper Junos 14.2
Juniper Junos 15.1
Juniper Junos 12.3
Juniper Junos 14.1x53
3 Github repositories
383
VMScore
CVE-2018-0002
On SRX Series and MX Series devices with a Service PIC with any ALG enabled, a crafted TCP/IP response packet processed through the device results in memory corruption leading to a flowd daemon crash. Sustained crafted response packets lead to repeated crashes of the flowd daemon...
Juniper Junos 12.1x46
Juniper Junos 12.3x48
Juniper Junos 14.1
Juniper Junos 14.2
Juniper Junos 15.1x49
Juniper Junos 15.1
Juniper Junos 16.1
Juniper Junos 16.2
Juniper Junos 17.1
1 Github repository
632
VMScore
CVE-2018-0004
A sustained sequence of different types of normal transit traffic can trigger a high CPU consumption denial of service condition in the Junos OS register and schedule software interrupt handler subsystem when a specific command is issued to the device. This affects one or more th...
Juniper Junos 12.1x46
Juniper Junos 12.3x48
Juniper Junos 12.3
Juniper Junos 14.1
Juniper Junos 14.1x53
Juniper Junos 14.2
Juniper Junos 15.1
Juniper Junos 15.1x49
Juniper Junos 15.1x53
641
VMScore
CVE-2018-0008
An unauthenticated root login may allow upon reboot when a commit script is used. A commit script allows a device administrator to execute certain instructions during commit, which is configured under the [system scripts commit] stanza. Certain commit scripts that work without a ...
Juniper Junos 12.1x46
Juniper Junos 12.3x48
Juniper Junos 15.1x49
Juniper Junos 14.1
Juniper Junos 14.1x53
Juniper Junos 14.2
Juniper Junos 15.1
Juniper Junos 15.1x53
Juniper Junos 16.1
VMScore
CVSSv2
CVSSv3
VMScore
Recommendations:
man-in-the-middle
CVE-2024-34558
CVE-2024-32674
CVE-2024-34351
XPath injection
CVE-2023-45866
CVE-2024-25528
CVE-2024-25517
path traversal
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
8
NEXT »