Vulmon
Recent Vulnerabilities
Product List
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
juniper junos os evolved 19.1 vulnerabilities and exploits
(subscribe to this query)
5
CVSSv2
CVE-2021-0225
An Improper Check for Unusual or Exceptional Conditions in Juniper Networks Junos OS Evolved may cause the stateless firewall filter configuration which uses the action 'policer' in certain combinations with other options to not take effect. An administrator can use the...
Juniper Junos Os Evolved 19.3
Juniper Junos Os Evolved 19.2
Juniper Junos Os Evolved 19.1
Juniper Junos Os Evolved 20.1
Juniper Junos Os Evolved 20.3
Juniper Junos Os Evolved 20.2
5
CVSSv2
CVE-2021-0273
An always-incorrect control flow implementation in the implicit filter terms of Juniper Networks Junos OS and Junos OS Evolved on ACX5800, EX9200 Series, MX10000 Series, MX240, MX480, MX960 devices with affected Trio line cards allows an malicious user to exploit an interdependen...
Juniper Junos 15.1
Juniper Junos 15.2
Juniper Junos 16.1
Juniper Junos 17.1
Juniper Junos 17.2
Juniper Junos 17.3
Juniper Junos 17.4
Juniper Junos 18.1
Juniper Junos 18.2
Juniper Junos 18.3
Juniper Junos 18.4
Juniper Junos 19.1
Juniper Junos 19.3
Juniper Junos 19.4
Juniper Junos Os Evolved 19.4
3.3
CVSSv2
CVE-2021-0208
An improper input validation vulnerability in the Routing Protocol Daemon (RPD) service of Juniper Networks Junos OS allows an malicious user to send a malformed RSVP packet when bidirectional LSPs are in use, which when received by an egress router crashes the RPD causing a Deni...
Juniper Junos 15.1x49
Juniper Junos 17.3
Juniper Junos 17.4
Juniper Junos 18.1
Juniper Junos 18.2
Juniper Junos 18.3
Juniper Junos 18.4
Juniper Junos 19.1
Juniper Junos 19.2
Juniper Junos Os Evolved 19.3
Juniper Junos 19.3
Juniper Junos 19.4
Juniper Junos 20.1
Juniper Junos Os Evolved 20.1
Juniper Junos Os Evolved 19.4
6.4
CVSSv2
CVE-2021-0211
An improper check for unusual or exceptional conditions in Juniper Networks Junos OS and Junos OS Evolved Routing Protocol Daemon (RPD) service allows an malicious user to send a valid BGP FlowSpec message thereby causing an unexpected change in the route advertisements within th...
Juniper Junos 17.3
Juniper Junos 17.4
Juniper Junos 18.1
Juniper Junos 18.2
Juniper Junos 18.3
Juniper Junos 18.4
Juniper Junos 19.1
Juniper Junos 19.2
Juniper Junos Os Evolved 19.3
Juniper Junos Os Evolved 19.2
Juniper Junos 19.3
Juniper Junos 19.4
Juniper Junos 20.1
Juniper Junos Os Evolved 20.1
Juniper Junos 20.2
Juniper Junos 20.3
Juniper Junos Os Evolved 20.3
Juniper Junos Os Evolved 19.4
Juniper Junos Os Evolved 20.2
Juniper Junos 15.1x49
Juniper Junos 15.1x49-d30
Juniper Junos 15.1x49-d60
4.3
CVSSv2
CVE-2020-1662
On Juniper Networks Junos OS and Junos OS Evolved devices, BGP session flapping can lead to a routing process daemon (RPD) crash and restart, limiting the attack surface to configured BGP peers. This issue only affects devices with BGP damping in combination with accepted-prefix-...
Juniper Junos 18.3
Juniper Junos 17.4
Juniper Junos 17.3
Juniper Junos 19.1
Juniper Junos 19.2
Juniper Junos 18.4
Juniper Junos 18.2
Juniper Junos 18.1
Juniper Junos 19.3
Juniper Junos 19.4
Juniper Junos 20.1
Juniper Junos 17.2
Juniper Junos 18.2x75
5
CVSSv2
CVE-2020-1644
On Juniper Networks Junos OS and Junos OS Evolved devices, the receipt of a specific BGP UPDATE packet causes an internal counter to be incremented incorrectly, which over time can lead to the routing protocols process (RPD) crash and restart. This issue affects both IBGP and EBG...
Juniper Junos 17.2x75
Juniper Junos 17.3
Juniper Junos 17.4
Juniper Junos 18.1
Juniper Junos 18.2
Juniper Junos 18.3
Juniper Junos 18.4
Juniper Junos 18.2x75
Juniper Junos 19.1
Juniper Junos 19.2
Juniper Junos Os Evolved 19.3
Juniper Junos Os Evolved 19.2
Juniper Junos Os Evolved 19.1
Juniper Junos 19.3
Juniper Junos 19.4
Juniper Junos Os Evolved 18.3
Juniper Junos Os Evolved 20.1
7.8
CVSSv2
CVE-2020-1632
In a certain condition, receipt of a specific BGP UPDATE message might cause Juniper Networks Junos OS and Junos OS Evolved devices to advertise an invalid BGP UPDATE message to other peers, causing the other peers to terminate the established BGP session, creating a Denial of Se...
Juniper Junos 16.1
Juniper Junos 16.2
Juniper Junos 17.2
Juniper Junos 17.1
Juniper Junos 17.2x75
Juniper Junos 17.3
Juniper Junos 17.4
Juniper Junos 18.1
Juniper Junos 18.3
Juniper Junos 18.4
Juniper Junos 19.1
Juniper Junos 19.2
Juniper Junos 18.1x75
Juniper Junos Os Evolved 19.2
8.3
CVSSv2
CVE-2020-1602
When a device using Juniper Network's Dynamic Host Configuration Protocol Daemon (JDHCPD) process on Junos OS or Junos OS Evolved which is configured in relay mode it vulnerable to an attacker sending crafted IPv4 packets who may remotely take over the code execution of the ...
Juniper Junos 17.1
Juniper Junos 15.1x49
Juniper Junos 15.1
Juniper Junos 15.1x53
Juniper Junos 16.1
Juniper Junos 16.2
Juniper Junos 17.2
Juniper Junos 17.3
Juniper Junos 17.4
Juniper Junos 18.2
Juniper Junos 18.3
Juniper Junos 18.4
Juniper Junos 18.2x75
Juniper Junos 18.1
Juniper Junos 19.1
Juniper Junos 19.2
8.3
CVSSv2
CVE-2020-1605
When a device using Juniper Network's Dynamic Host Configuration Protocol Daemon (JDHCPD) process on Junos OS or Junos OS Evolved which is configured in relay mode it vulnerable to an attacker sending crafted IPv4 packets who may then arbitrarily execute commands as root on ...
Juniper Junos 17.1
Juniper Junos 15.1x49
Juniper Junos 15.1
Juniper Junos 15.1x53
Juniper Junos 16.1
Juniper Junos 16.2
Juniper Junos 17.2
Juniper Junos 17.3
Juniper Junos 17.4
Juniper Junos 18.2
Juniper Junos 18.3
Juniper Junos 18.4
Juniper Junos 18.2x75
Juniper Junos 18.1
Juniper Junos 19.1
Juniper Junos 19.2
8.3
CVSSv2
CVE-2020-1609
When a device using Juniper Network's Dynamic Host Configuration Protocol Daemon (JDHCPD) process on Junos OS or Junos OS Evolved which is configured in relay mode it vulnerable to an attacker sending crafted IPv6 packets who may then arbitrarily execute commands as root on ...
Juniper Junos 17.1
Juniper Junos 15.1x49
Juniper Junos 15.1
Juniper Junos 15.1x53
Juniper Junos 16.1
Juniper Junos 16.2
Juniper Junos 17.2
Juniper Junos 17.3
Juniper Junos 17.4
Juniper Junos 18.2
Juniper Junos 18.3
Juniper Junos 18.4
Juniper Junos 18.2x75
Juniper Junos 18.1
Juniper Junos 19.1
Juniper Junos 19.2
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
TCP
CVE-2024-4577
CVE-2024-2695
CVE-2024-31870
injection
CVE-2024-3813
arbitrary code
CVE-2024-27801
CVE-2024-30120
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4