Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
juniper junos 15.1x49 vulnerabilities and exploits
(subscribe to this query)
8.8
CVSSv3
CVE-2018-0021
If all 64 digits of the connectivity association name (CKN) key or all 32 digits of the connectivity association key (CAK) key are not configured, all remaining digits will be auto-configured to 0. Hence, Juniper devices configured with short MacSec keys are at risk to an increas...
Juniper Junos 15.1x49
Juniper Junos 14.1
Juniper Junos 14.1x53
Juniper Junos 15.1x53
Juniper Junos 16.1
Juniper Junos 16.2
Juniper Junos 17.1
Juniper Junos 15.1
8.8
CVSSv3
CVE-2016-1261
J-Web does not validate certain input that may lead to cross-site request forgery (CSRF) issues or cause a denial of J-Web service (DoS).
Juniper Junos 12.1x44
Juniper Junos 12.1x46
Juniper Junos 12.1x47
Juniper Junos 12.3
Juniper Junos 13.2x51
Juniper Junos 13.3
Juniper Junos 14.1
Juniper Junos 14.1x53
Juniper Junos 14.2
Juniper Junos 15.1
Juniper Junos 15.1x49
Juniper Junos 12.3x48
8.8
CVSSv3
CVE-2017-2341
An insufficient authentication vulnerability on platforms where Junos OS instances are run in a virtualized environment, may allow unprivileged users on the Junos OS instance to gain access to the host operating environment, and thus escalate privileges. Affected releases are Jun...
Juniper Junos 14.1x53
Juniper Junos 14.1x53-d15
Juniper Junos 14.1x53-d26
Juniper Junos 14.1x53-d27
Juniper Junos 14.1x53-d30
Juniper Junos 14.1x53-d35
Juniper Junos 14.1x53-d10
Juniper Junos 14.1x53-d25
Juniper Junos 15.1
Juniper Junos 15.1x49
Juniper Junos 16.1
8.8
CVSSv3
CVE-2017-2349
A command injection vulnerability in the IDP feature of Juniper Networks Junos OS on SRX series devices potentially allows a user with login access to the device to execute shell commands and elevate privileges. Affected releases are Juniper Networks Junos OS 12.1X44 before 12.1X...
Juniper Junos 15.1x49
Juniper Junos 12.3x48
Juniper Junos 12.1x46
Juniper Junos 12.1x47
Juniper Junos 12.1x44
8.8
CVSSv3
CVE-2016-1264
Race condition in the Op command in Juniper Junos OS prior to 12.1X44-D55, 12.1X46 prior to 12.1X46-D40, 12.1X47 prior to 12.1X47-D25, 12.3 prior to 12.3R11, 12.3X48 prior to 12.3X48-D20, 12.3X50 prior to 12.3X50-D50, 13.2 prior to 13.2R8, 13.2X51 prior to 13.2X51-D39, 13.2X52 pr...
Juniper Junos 14.2
Juniper Junos 14.1x53
Juniper Junos 14.1
Juniper Junos 13.3
Juniper Junos 13.2x52
Juniper Junos 13.2x51
Juniper Junos 13.2
Juniper Junos 15.1
Juniper Junos 12.3x50
Juniper Junos 12.3x48
Juniper Junos 12.3
Juniper Junos 12.1x47
Juniper Junos
Juniper Junos 12.1x46
Juniper Junos 16.1
Juniper Junos 15.1x49
8.1
CVSSv3
CVE-2020-1606
A path traversal vulnerability in the Juniper Networks Junos OS device may allow an authenticated J-web user to read files with 'world' readable permission and delete files with 'world' writeable permission. This issue does not affect system files that can be ...
Juniper Junos 12.3
Juniper Junos 14.1x53
Juniper Junos 15.1
Juniper Junos 16.1
Juniper Junos 16.2
Juniper Junos 17.1
Juniper Junos 17.2
Juniper Junos 17.4
Juniper Junos 18.1
Juniper Junos 18.2
Juniper Junos 18.3
Juniper Junos 18.4
Juniper Junos 19.1
Juniper Junos 12.3x48
Juniper Junos 15.1x49
Juniper Junos 15.1x53
8.1
CVSSv3
CVE-2019-0039
If REST API is enabled, the Junos OS login credentials are vulnerable to brute force attacks. The high default connection limit of the REST API may allow an malicious user to brute-force passwords using advanced scripting techniques. Additionally, administrators who do not enforc...
Juniper Junos
8.1
CVSSv3
CVE-2018-0052
If RSH service is enabled on Junos OS and if the PAM authentication is disabled, a remote unauthenticated attacker can obtain root access to the device. RSH service is disabled by default on Junos. There is no documented CLI command to enable this service. However, an undocumente...
Juniper Junos 12.1x46
Juniper Junos 12.3
Juniper Junos 12.3x48
Juniper Junos 14.1x53
Juniper Junos 15.1
Juniper Junos 15.1x49
Juniper Junos 15.1x53
Juniper Junos 16.1
Juniper Junos 16.2
Juniper Junos 17.1
Juniper Junos 17.2
Juniper Junos 17.2x75
Juniper Junos 17.3
Juniper Junos 17.4
Juniper Junos 18.2x75
8.1
CVSSv3
CVE-2018-0025
When an SRX Series device is configured to use HTTP/HTTPS pass-through authentication services, a client sending authentication credentials in the initial HTTP/HTTPS session is at risk that these credentials may be captured during follow-on HTTP/HTTPS requests by a malicious acto...
Juniper Junos 12.1x46
Juniper Junos 12.3x48
Juniper Junos 15.1x49
8.1
CVSSv3
CVE-2017-2342
MACsec feature on Juniper Networks Junos OS 15.1X49 before 15.1X49-D100 on SRX300 series does not report errors when a secure link can not be established. It falls back to an unencrypted link. This can happen when MACsec is configured on ports that are not capable of MACsec or wh...
Juniper Junos 15.1x49
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
authentication bypass
CVE-2024-30051
remote
CVE-2024-27954
CVE-2023-51483
CVE-2023-47782
SSRF
CVE-2024-24715
CVE-2023-52424
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
8
NEXT »