Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
juniper vulnerabilities and exploits
(subscribe to this query)
9.8
CVSSv3
CVE-2018-0037
Junos OS routing protocol daemon (RPD) process may crash and restart or may lead to remote code execution while processing specific BGP NOTIFICATION messages. By continuously sending crafted BGP NOTIFICATION messages, an attacker can repeatedly crash the RPD process causing a sus...
Juniper Junos 15.1
9.8
CVSSv3
CVE-2018-0038
Juniper Networks Contrail Service Orchestration releases before 3.3.0 have Cassandra service enabled by default with hardcoded credentials. These credentials allow network based attackers unauthorized access to information stored in Cassandra.
Juniper Contrail Service Orchestration
9.8
CVSSv3
CVE-2018-0039
Juniper Networks Contrail Service Orchestration releases before 4.0.0 have Grafana service enabled by default with hardcoded credentials. These credentials allow network based attackers unauthorized access to information stored in Grafana or exploit other weaknesses or vulnerabil...
Juniper Contrail Service Orchestration
9.8
CVSSv3
CVE-2018-0040
Juniper Networks Contrail Service Orchestrator versions before 4.0.0 use hardcoded cryptographic certificates and keys in some cases, which may allow network based malicious users to gain unauthorized access to services.
Juniper Contrail Service Orchestration
9.8
CVSSv3
CVE-2018-0041
Juniper Networks Contrail Service Orchestration releases before 3.3.0 use hardcoded credentials to access Keystone service. These credentials allow network based attackers unauthorized access to information stored in keystone.
Juniper Contrail Service Orchestration
9.8
CVSSv3
CVE-2018-0042
Juniper Networks CSO versions before 4.0.0 may log passwords in log files leading to an information disclosure vulnerability.
Juniper Contrail Service Orchestration
9.8
CVSSv3
CVE-2014-3413
The MySQL server in Juniper Networks Junos Space prior to 13.3R1.8 has an unspecified account with a hardcoded password, which allows remote malicious users to obtain sensitive information and consequently obtain administrative control by leveraging database access.
Juniper Junos Space 13.3
9.8
CVSSv3
CVE-2018-7183
Buffer overflow in the decodearr function in ntpq in ntp 4.2.8p6 up to and including 4.2.8p10 allows remote malicious users to execute arbitrary code by leveraging an ntpq query and sending a response with a crafted array.
Ntp Ntp 4.2.8
Freebsd Freebsd 10.4
Freebsd Freebsd 11.1
Freebsd Freebsd 10.3
Canonical Ubuntu Linux 12.04
Canonical Ubuntu Linux 14.04
Canonical Ubuntu Linux 16.04
Canonical Ubuntu Linux 17.10
Canonical Ubuntu Linux 18.04
Netapp Element Software -
1 Article
9.8
CVSSv3
CVE-2018-0001
A remote, unauthenticated attacker may be able to execute code by exploiting a use-after-free defect found in older versions of PHP through injection of crafted data via specific PHP URLs within the context of the J-Web process. Affected releases are Juniper Networks Junos OS: 12...
Juniper Junos 12.1x46
Juniper Junos 12.3x48
Juniper Junos 15.1x49
Juniper Junos 15.1x53
Juniper Junos 14.1
Juniper Junos 14.2
Juniper Junos 15.1
Juniper Junos 12.3
Juniper Junos 14.1x53
3 Github repositories
9.8
CVSSv3
CVE-2018-0007
An unauthenticated network-based attacker able to send a maliciously crafted LLDP packet to the local segment, through a local segment broadcast, may be able to cause a Junos device to enter an improper boundary check condition allowing a memory corruption to occur, leading to a ...
Juniper Junos 12.1x46
Juniper Junos 12.3
Juniper Junos 12.3x48
Juniper Junos 14.1
Juniper Junos 14.1x53
Juniper Junos 14.2
Juniper Junos 15.1
Juniper Junos 15.1x49
Juniper Junos 15.1x53
Juniper Junos 16.1
Juniper Junos 16.1x65
Juniper Junos 16.2
Juniper Junos 17.1
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-33572
CVE-2024-24919
CVE-2024-0230
CVE-2024-32714
HTML injection
local file inclusion
CVE-2024-31098
CVE-2024-31244
privilege
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
8
9
NEXT »