Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
juniper junos 15.1 vulnerabilities and exploits
(subscribe to this query)
5.3
CVSSv3
CVE-2018-0056
If a duplicate MAC address is learned by two different interfaces on an MX Series device, the MAC address learning function correctly flaps between the interfaces. However, the Layer 2 Address Learning Daemon (L2ALD) daemon might crash when attempting to delete the duplicate MAC ...
Juniper Junos 15.1
Juniper Junos 16.1
Juniper Junos 16.2
Juniper Junos 17.1
Juniper Junos 17.2
Juniper Junos 17.3
Juniper Junos 17.4
Juniper Junos 18.1
9.6
CVSSv3
CVE-2018-0057
On MX Series and M120/M320 platforms configured in a Broadband Edge (BBE) environment, subscribers logging in with DHCP Option 50 to request a specific IP address will be assigned the requested IP address, even if there is a static MAC to IP address binding in the access profile....
Juniper Junos 15.1
Juniper Junos 16.1
Juniper Junos 16.2
Juniper Junos 17.1
Juniper Junos 17.2
Juniper Junos 17.3
Juniper Junos 17.4
Juniper Junos 18.1
9.8
CVSSv3
CVE-2017-10601
A specific device configuration can result in a commit failure condition. When this occurs, a user is logged in without being prompted for a password while trying to login through console, ssh, ftp, telnet or su, etc., This issue relies upon a device configuration precondition to...
Juniper Junos 14.2
Juniper Junos 14.1x53
Juniper Junos 13.3
Juniper Junos 12.3
Juniper Junos 15.1
Juniper Junos 14.1
Juniper Junos 13.2
Juniper Junos 12.3x48
5.9
CVSSv3
CVE-2016-1277
Juniper Junos OS prior to 12.1X46-D50, 12.1X47 prior to 12.1X47-D40, 12.3X48 prior to 12.3X48-D30, 13.3 prior to 13.3R9, 14.1 prior to 14.1R8, 14.1X53 prior to 14.1X53-D40, 14.2 prior to 14.2R6, 15.1 prior to 15.1F6 or 15.1R3, and 15.1X49 prior to 15.1X49-D40, when configured wit...
Juniper Junos 15.1
Juniper Junos 13.3
Juniper Junos 14.2
Juniper Junos 12.3x48
Juniper Junos 14.1x53
Juniper Junos 14.1
Juniper Junos 12.1x47
Juniper Junos
Juniper Junos 15.1x49
1 Article
7.5
CVSSv3
CVE-2018-0026
After Junos OS device reboot or upgrade, the stateless firewall filter configuration may not take effect. This issue can be verified by running the command: user@re0> show interfaces <interface_name> extensive | match filters" CAM destination filters: 0, CAM source ...
Juniper Junos 15.1x8
Juniper Junos 15.1
6.5
CVSSv3
CVE-2021-0271
A Double Free vulnerability in the software forwarding interface daemon (sfid) process of Juniper Networks Junos OS allows an adjacently-connected malicious user to cause a Denial of Service (DoS) by sending a crafted ARP packet to the device. Continued receipt and processing of ...
Juniper Junos 12.3
Juniper Junos 15.1
5.3
CVSSv3
CVE-2017-2340
On Juniper Networks Junos OS 15.1 releases from 15.1R3 to 15.1R4, 16.1 before 16.1R3, on M/MX platforms where Enhanced Subscriber Management for DHCPv6 subscribers is configured, a vulnerability in processing IPv6 ND packets originating from subscribers and destined to M/MX serie...
Juniper Junos 16.1
Juniper Junos 15.1
7.8
CVSSv3
CVE-2017-10603
An XML injection vulnerability in Junos OS CLI can allow a locally authenticated user to elevate privileges and run arbitrary commands as the root user. This issue was found during internal product security testing. Affected releases are Juniper Networks Junos OS 15.1X53 before 1...
Juniper Junos 15.1x53
Juniper Junos 15.1
5.5
CVSSv3
CVE-2016-4924
An incorrect permissions vulnerability in Juniper Networks Junos OS on vMX may allow local unprivileged users on a host system read access to vMX or vPFE images and obtain sensitive information contained in them such as private cryptographic keys. This issue was found during inte...
Juniper Junos 15.1
Juniper Junos 14.1
7.5
CVSSv3
CVE-2017-2347
A denial of service vulnerability in rpd daemon of Juniper Networks Junos OS allows a malformed MPLS ping packet to crash the rpd daemon if MPLS OAM is configured. Repeated crashes of the rpd daemon can result in an extended denial of service condition for the device. The affecte...
Juniper Junos 12.3x48
Juniper Junos 13.3
Juniper Junos 14.1
Juniper Junos 14.1x53
Juniper Junos 14.2
Juniper Junos 15.1
Juniper Junos 15.1x49
Juniper Junos 15.1x53
Juniper Junos 16.1
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-4671
unauthorized
CVE-2024-4776
CVE-2024-3407
CVE-2024-26026
CVE-2024-32888
wireless
CVE-2024-4656
template injection
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
8
NEXT »