Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
juniper junos 12.1x46 vulnerabilities and exploits
(subscribe to this query)
4.3
CVSSv2
CVE-2016-4923
Insufficient cross site scripting protection in J-Web component in Juniper Networks Junos OS may potentially allow a remote unauthenticated user to inject web script or HTML and steal sensitive data and credentials from a J-Web session and to perform administrative actions on the...
Juniper Junos 11.4
Juniper Junos 11.4r13
Juniper Junos 12.3
Juniper Junos 12.3x48
Juniper Junos 13.3
Juniper Junos 14.1
Juniper Junos 14.2
Juniper Junos 15.1x53
Juniper Junos 15.1
Juniper Junos 15.1x49
Juniper Junos 12.1x44
Juniper Junos 12.1x46
Juniper Junos 12.1x47
2.1
CVSSv2
CVE-2017-10613
A vulnerability in a specific loopback filter action command, processed in a specific logical order of operation, in a running configuration of Juniper Networks Junos OS, allows an attacker with CLI access and the ability to initiate remote sessions to the loopback interface with...
Juniper Junos 12.1x46
Juniper Junos 12.3x48
Juniper Junos 14.1
Juniper Junos 14.1x53
Juniper Junos 14.2
Juniper Junos 15.1
Juniper Junos 15.1x49
Juniper Junos 15.1x53
Juniper Junos 16.1
5
CVSSv2
CVE-2017-10604
When the device is configured to perform account lockout with a defined period of time, any unauthenticated user attempting to log in as root with an incorrect password can trigger a lockout of the root account. When an SRX Series device is in cluster mode, and a cluster sync or ...
Juniper Junos 12.1x46
Juniper Junos 12.3x48
Juniper Junos 15.1x49
7.2
CVSSv2
CVE-2017-2344
A routine within an internal Junos OS sockets library is vulnerable to a buffer overflow. Malicious exploitation of this issue may lead to a denial of service (kernel panic) or be leveraged as a privilege escalation through local code execution. The routines are only accessible v...
Juniper Junos 12.1x46
Juniper Junos 12.3x48
Juniper Junos 13.3
Juniper Junos 14.1
Juniper Junos 14.1x50
Juniper Junos 14.1x53
Juniper Junos 14.2
Juniper Junos 15.1
Juniper Junos 15.1x49
Juniper Junos 15.1x53
Juniper Junos 16.1
Juniper Junos 16.2
Juniper Junos 17.1
Juniper Junos 17.2
Juniper Junos 17.2x75
7.5
CVSSv2
CVE-2017-2345
On Junos OS devices with SNMP enabled, a network based attacker with unfiltered access to the RE can cause the Junos OS snmpd daemon to crash and restart by sending a crafted SNMP packet. Repeated crashes of the snmpd daemon can result in a partial denial of service condition. Ad...
Juniper Junos 12.1x46
Juniper Junos 12.3x48
Juniper Junos 13.3
Juniper Junos 14.1
Juniper Junos 14.1x50
Juniper Junos 14.1x53
Juniper Junos 14.2
Juniper Junos 15.1
Juniper Junos 15.1x49
Juniper Junos 15.1x53
Juniper Junos 16.1
Juniper Junos 16.2
Juniper Junos 17.1
Juniper Junos 17.2
Juniper Junos 17.2x75
5
CVSSv2
CVE-2017-10605
On all vSRX and SRX Series devices, when the DHCP or DHCP relay is configured, specially crafted packet might cause the flowd process to crash, halting or interrupting traffic from flowing through the device(s). Repeated crashes of the flowd process may constitute an extended den...
Juniper Junos 15.1x49
Juniper Junos 12.1x46
Juniper Junos 12.3x48
10
CVSSv2
CVE-2017-2343
The Integrated User Firewall (UserFW) feature was introduced in Junos OS version 12.1X47-D10 on the Juniper SRX Series devices to provide simple integration of user profiles on top of the existing firewall polices. As part of an internal security review of the UserFW services aut...
Juniper Junos 12.3x48
Juniper Junos 15.1x49
9
CVSSv2
CVE-2017-2349
A command injection vulnerability in the IDP feature of Juniper Networks Junos OS on SRX series devices potentially allows a user with login access to the device to execute shell commands and elevate privileges. Affected releases are Juniper Networks Junos OS 12.1X44 before 12.1X...
Juniper Junos 15.1x49
Juniper Junos 12.3x48
Juniper Junos 12.1x46
Juniper Junos 12.1x47
Juniper Junos 12.1x44
7.8
CVSSv2
CVE-2017-2301
On Juniper Networks products or platforms running Junos OS 11.4 before 11.4R13-S3, 12.1X46 before 12.1X46-D60, 12.3 before 12.3R12-S2 or 12.3R13, 12.3X48 before 12.3X48-D40, 13.2X51 before 13.2X51-D40, 13.3 before 13.3R10, 14.1 before 14.1R8, 14.1X53 before 14.1X53-D12 or 14.1X53...
Juniper Junos 11.4
Juniper Junos 12.1x46
Juniper Junos 12.3
Juniper Junos 12.3x48
Juniper Junos 13.3
Juniper Junos 14.1x53
Juniper Junos 14.1x55
Juniper Junos 15.1
Juniper Junos 15.1x49
Juniper Junos 13.2x51
Juniper Junos 14.1
Juniper Junos 14.2
Juniper Junos 15.1x53
7.8
CVSSv2
CVE-2017-2302
On Juniper Networks products or platforms running Junos OS 12.1X46 before 12.1X46-D55, 12.1X47 before 12.1X47-D45, 12.3R13 before 12.3R13, 12.3X48 before 12.3X48-D35, 13.3 before 13.3R10, 14.1 before 14.1R8, 14.1X53 before 14.1X53-D40, 14.1X55 before 14.1X55-D35, 14.2 before 14.2...
Juniper Junos 12.1x46
Juniper Junos 12.3
Juniper Junos 12.1x47
Juniper Junos 12.3x48
Juniper Junos 13.3
Juniper Junos 14.1
Juniper Junos 14.1x53
Juniper Junos 15.1
Juniper Junos 15.1x49
Juniper Junos 14.1x55
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2020-4463
CVE-2024-29895
inject
CVE-2023-52689
CVE-2024-5049
CVE-2024-5051
privilege escalation
physical
CVE-2023-52676
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
8
9
10
NEXT »