Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
juniper junos 12.3x48 vulnerabilities and exploits
(subscribe to this query)
694
VMScore
CVE-2019-0052
The srxpfe process may crash on SRX Series services gateways when the UTM module processes a specific fragmented HTTP packet. The packet is misinterpreted as a regular TCP packet which causes the processor to crash. This issue affects all SRX Series platforms that support URL-Fil...
Juniper Junos 12.3x48
Juniper Junos 15.1x49
Juniper Junos 17.3
Juniper Junos 17.4
Juniper Junos 18.1
Juniper Junos 18.2
Juniper Junos 18.3
Juniper Junos 18.4
445
VMScore
CVE-2020-1657
On SRX Series devices, a vulnerability in the key-management-daemon (kmd) daemon of Juniper Networks Junos OS allows an malicious user to spoof packets targeted to IPSec peers before a security association (SA) is established thereby causing a failure to set up the IPSec channel....
Juniper Junos 12.3x48
Juniper Junos 15.1x49
Juniper Junos 17.4
Juniper Junos 18.1
Juniper Junos 18.2
Juniper Junos 18.3
Juniper Junos 18.4
Juniper Junos 19.1
632
VMScore
CVE-2016-1277
Juniper Junos OS prior to 12.1X46-D50, 12.1X47 prior to 12.1X47-D40, 12.3X48 prior to 12.3X48-D30, 13.3 prior to 13.3R9, 14.1 prior to 14.1R8, 14.1X53 prior to 14.1X53-D40, 14.2 prior to 14.2R6, 15.1 prior to 15.1F6 or 15.1R3, and 15.1X49 prior to 15.1X49-D40, when configured wit...
Juniper Junos 15.1
Juniper Junos 13.3
Juniper Junos 14.2
Juniper Junos 12.3x48
Juniper Junos 14.1x53
Juniper Junos 14.1
Juniper Junos 12.1x47
Juniper Junos
Juniper Junos 15.1x49
1 Article
668
VMScore
CVE-2018-0001
A remote, unauthenticated attacker may be able to execute code by exploiting a use-after-free defect found in older versions of PHP through injection of crafted data via specific PHP URLs within the context of the J-Web process. Affected releases are Juniper Networks Junos OS: 12...
Juniper Junos 12.1x46
Juniper Junos 12.3x48
Juniper Junos 15.1x49
Juniper Junos 15.1x53
Juniper Junos 14.1
Juniper Junos 14.2
Juniper Junos 15.1
Juniper Junos 12.3
Juniper Junos 14.1x53
3 Github repositories
632
VMScore
CVE-2018-0004
A sustained sequence of different types of normal transit traffic can trigger a high CPU consumption denial of service condition in the Junos OS register and schedule software interrupt handler subsystem when a specific command is issued to the device. This affects one or more th...
Juniper Junos 12.1x46
Juniper Junos 12.3x48
Juniper Junos 12.3
Juniper Junos 14.1
Juniper Junos 14.1x53
Juniper Junos 14.2
Juniper Junos 15.1
Juniper Junos 15.1x49
Juniper Junos 15.1x53
445
VMScore
CVE-2014-6449
Juniper Junos OS prior to 12.1X44-D50, 12.1X46 prior to 12.1X46-D35, 12.1X47 prior to 12.1X47-D25, 12.3 prior to 12.3R10, 12.3X48 prior to 12.3X48-D15, 13.2 prior to 13.2R8, 13.3 prior to 13.3R7, 14.1 prior to 14.1R5, and 14.2 prior to 14.2R1 do not properly handle TCP packet rea...
Juniper Junos 12.1x44
Juniper Junos 12.1x46
Juniper Junos 12.3
Juniper Junos 12.3x48
Juniper Junos 13.2
Juniper Junos 13.3
Juniper Junos 14.2
Juniper Junos 12.1x47
Juniper Junos 14.1
187
VMScore
CVE-2017-10613
A vulnerability in a specific loopback filter action command, processed in a specific logical order of operation, in a running configuration of Juniper Networks Junos OS, allows an attacker with CLI access and the ability to initiate remote sessions to the loopback interface with...
Juniper Junos 12.1x46
Juniper Junos 12.3x48
Juniper Junos 14.1
Juniper Junos 14.1x53
Juniper Junos 14.2
Juniper Junos 15.1
Juniper Junos 15.1x49
Juniper Junos 15.1x53
Juniper Junos 16.1
445
VMScore
CVE-2019-0051
SSL-Proxy feature on SRX devices fails to handle a hardware resource limitation which can be exploited by remote SSL/TLS servers to crash the flowd daemon. Repeated crashes of the flowd daemon can result in an extended denial of service condition. For this issue to occur, clients...
Juniper Junos 12.3x48
Juniper Junos 15.1x49
Juniper Junos 17.3
Juniper Junos 17.4
Juniper Junos 18.1
Juniper Junos 18.2
Juniper Junos 18.3
Juniper Junos 18.4
Juniper Junos 19.1
383
VMScore
CVE-2018-0002
On SRX Series and MX Series devices with a Service PIC with any ALG enabled, a crafted TCP/IP response packet processed through the device results in memory corruption leading to a flowd daemon crash. Sustained crafted response packets lead to repeated crashes of the flowd daemon...
Juniper Junos 12.1x46
Juniper Junos 12.3x48
Juniper Junos 14.1
Juniper Junos 14.2
Juniper Junos 15.1x49
Juniper Junos 15.1
Juniper Junos 16.1
Juniper Junos 16.2
Juniper Junos 17.1
1 Github repository
641
VMScore
CVE-2018-0008
An unauthenticated root login may allow upon reboot when a commit script is used. A commit script allows a device administrator to execute certain instructions during commit, which is configured under the [system scripts commit] stanza. Certain commit scripts that work without a ...
Juniper Junos 12.1x46
Juniper Junos 12.3x48
Juniper Junos 15.1x49
Juniper Junos 14.1
Juniper Junos 14.1x53
Juniper Junos 14.2
Juniper Junos 15.1
Juniper Junos 15.1x53
Juniper Junos 16.1
VMScore
CVSSv2
CVSSv3
VMScore
Recommendations:
hard-coded
CVE-2024-27202
NULL pointer dereference
CVE-2024-28075
CVE-2024-33608
CVE-2024-28889
CVE-2024-34572
template injection
CVE-2024-34351
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
8
9
NEXT »