Vulmon
Recent Vulnerabilities
Product List
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
juniper junos 15.1f6 vulnerabilities and exploits
(subscribe to this query)
7.5
CVSSv3
CVE-2017-2347
A denial of service vulnerability in rpd daemon of Juniper Networks Junos OS allows a malformed MPLS ping packet to crash the rpd daemon if MPLS OAM is configured. Repeated crashes of the rpd daemon can result in an extended denial of service condition for the device. The affecte...
Juniper Junos 12.3x48
Juniper Junos 13.3
Juniper Junos 14.1
Juniper Junos 14.1x53
Juniper Junos 14.2
Juniper Junos 15.1
Juniper Junos 15.1x49
Juniper Junos 15.1x53
Juniper Junos 16.1
7.8
CVSSv3
CVE-2017-2344
A routine within an internal Junos OS sockets library is vulnerable to a buffer overflow. Malicious exploitation of this issue may lead to a denial of service (kernel panic) or be leveraged as a privilege escalation through local code execution. The routines are only accessible v...
Juniper Junos 12.1x46
Juniper Junos 12.3x48
Juniper Junos 13.3
Juniper Junos 14.1
Juniper Junos 14.1x50
Juniper Junos 14.1x53
Juniper Junos 14.2
Juniper Junos 15.1
Juniper Junos 15.1x49
Juniper Junos 15.1x53
Juniper Junos 16.1
Juniper Junos 16.2
Juniper Junos 17.1
Juniper Junos 17.2
Juniper Junos 17.2x75
7.5
CVSSv3
CVE-2019-0012
A Denial of Service (DoS) vulnerability in BGP in Juniper Networks Junos OS configured as a VPLS PE allows an malicious user to craft a specific BGP message to cause the routing protocol daemon (rpd) process to crash and restart. While rpd restarts after a crash, repeated crashes...
Juniper Junos 12.1x46
Juniper Junos 12.3
Juniper Junos 12.3x48
Juniper Junos 14.1x53
Juniper Junos 15.1
Juniper Junos 15.1x49
Juniper Junos 15.1x53
Juniper Junos 16.1
Juniper Junos 16.2
Juniper Junos 17.1
Juniper Junos 17.2
Juniper Junos 17.3
Juniper Junos 17.4
Juniper Junos 18.1
1 Article
6.8
CVSSv3
CVE-2019-0035
When "set system ports console insecure" is enabled, root login is disallowed for Junos OS as expected. However, the root password can be changed using "set system root-authentication plain-text-password" on systems booted from an OAM (Operations, Administrati...
Juniper Junos 15.1
Juniper Junos 15.1x49
Juniper Junos 15.1x53
Juniper Junos 16.1
Juniper Junos 17.3
Juniper Junos 17.2
Juniper Junos 17.4
Juniper Junos 18.1
Juniper Junos 18.2
Juniper Junos 18.3
Juniper Junos 18.2x75
Juniper Junos 16.1x65
Juniper Junos 17.1
Juniper Junos 16.2
7.5
CVSSv3
CVE-2020-1601
Certain types of malformed Path Computation Element Protocol (PCEP) packets when received and processed by a Juniper Networks Junos OS device serving as a Path Computation Client (PCC) in a PCEP environment using Juniper's path computational element protocol daemon (pccd) pr...
Juniper Junos 15.1x53
Juniper Junos 16.1
Juniper Junos 15.1
Juniper Junos 16.2
Juniper Junos 17.1
Juniper Junos 17.2
Juniper Junos 17.3
Juniper Junos 17.4
Juniper Junos 18.2x75
Juniper Junos 18.1
Juniper Junos 18.2
Juniper Junos 18.3
Juniper Junos 18.4
Juniper Junos 15.1x49
7.5
CVSSv3
CVE-2016-4921
By flooding a Juniper Networks router running Junos OS with specially crafted IPv6 traffic, all available resources can be consumed, leading to the inability to store next hop information for legitimate traffic. In extreme cases, the crafted IPv6 traffic may result in a total res...
Juniper Junos 11.4
Juniper Junos 11.4r13
Juniper Junos 12.3
Juniper Junos 12.3x48
Juniper Junos 13.3
Juniper Junos 14.1
Juniper Junos 14.1x53
Juniper Junos 14.1x55
Juniper Junos 14.2
Juniper Junos 15.1x49
Juniper Junos 15.1
Juniper Junos 15.1x53
5.9
CVSSv3
CVE-2018-0002
On SRX Series and MX Series devices with a Service PIC with any ALG enabled, a crafted TCP/IP response packet processed through the device results in memory corruption leading to a flowd daemon crash. Sustained crafted response packets lead to repeated crashes of the flowd daemon...
Juniper Junos 12.1x46
Juniper Junos 12.3x48
Juniper Junos 14.1
Juniper Junos 14.2
Juniper Junos 15.1x49
Juniper Junos 15.1
Juniper Junos 16.1
Juniper Junos 16.2
Juniper Junos 17.1
1 Github repository
7.5
CVSSv3
CVE-2018-0030
Receipt of a specific MPLS packet may cause MPC7/8/9, PTX-FPC3 (FPC-P1, FPC-P2) line cards or PTX1K to crash and restart. By continuously sending specific MPLS packets, an attacker can repeatedly crash the line cards or PTX1K causing a sustained Denial of Service. Affected releas...
Juniper Junos 15.1
Juniper Junos 16.1
Juniper Junos 16.1x65
Juniper Junos 16.2
Juniper Junos 17.1
Juniper Junos 17.2
Juniper Junos 17.3
Juniper Junos 17.4
Juniper Junos 17.2x75
1 Article
5.3
CVSSv3
CVE-2021-0273
An always-incorrect control flow implementation in the implicit filter terms of Juniper Networks Junos OS and Junos OS Evolved on ACX5800, EX9200 Series, MX10000 Series, MX240, MX480, MX960 devices with affected Trio line cards allows an malicious user to exploit an interdependen...
Juniper Junos 15.1
Juniper Junos 15.2
Juniper Junos 16.1
Juniper Junos 17.1
Juniper Junos 17.2
Juniper Junos 17.3
Juniper Junos 17.4
Juniper Junos 18.1
Juniper Junos 18.2
Juniper Junos 18.3
Juniper Junos 18.4
Juniper Junos 19.1
Juniper Junos 19.3
Juniper Junos 19.4
Juniper Junos Os Evolved 19.4
6.5
CVSSv3
CVE-2018-0029
While experiencing a broadcast storm, placing the fxp0 interface into promiscuous mode via the 'monitor traffic interface fxp0' can cause the system to crash and restart (vmcore). This issue only affects Junos OS 15.1 and later releases, and affects both single core and...
Juniper Junos 15.1
Juniper Junos 15.1x49
Juniper Junos 15.1x53
Juniper Junos 16.1
Juniper Junos 16.2
Juniper Junos 17.1
Juniper Junos 17.2x75
Juniper Junos 17.3
Juniper Junos 17.4
Juniper Junos 17.2
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-28995
CVE-2024-36680
CVE-2024-35537
unauthorized
CVE-2024-21518
CVE-2024-37673
cross-site scripting
SSRF
CVE-2024-6241
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
NEXT »