Vulmon
Recent Vulnerabilities
Product List
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
juniper junos os evolved 20.2 vulnerabilities and exploits
(subscribe to this query)
3.3
CVSSv2
CVE-2021-0292
An Uncontrolled Resource Consumption vulnerability in the ARP daemon (arpd) and Network Discovery Protocol (ndp) process of Juniper Networks Junos OS Evolved allows a malicious attacker on the local network to consume memory resources, ultimately resulting in a Denial of Service ...
Juniper Junos Os Evolved 20.1
Juniper Junos Os Evolved 19.4
Juniper Junos Os Evolved 20.2
6.4
CVSSv2
CVE-2021-0291
An Exposure of System Data vulnerability in Juniper Networks Junos OS and Junos OS Evolved, where a sensitive system-level resource is not being sufficiently protected, allows a network-based unauthenticated malicious user to send specific traffic which partially reaches this res...
Juniper Junos 15.1
Juniper Junos 17.3
Juniper Junos 17.4
Juniper Junos 18.3
Juniper Junos 18.4
Juniper Junos 19.1
Juniper Junos 19.2
Juniper Junos Os Evolved 19.3
Juniper Junos Os Evolved 19.2
Juniper Junos 19.3
Juniper Junos 19.4
Juniper Junos 20.1
Juniper Junos Os Evolved 20.1
Juniper Junos 20.2
Juniper Junos 20.3
Juniper Junos Os Evolved 20.3
Juniper Junos Os Evolved 19.4
Juniper Junos Os Evolved 20.2
6.8
CVSSv2
CVE-2021-0236
Due to an improper check for unusual or exceptional conditions in Juniper Networks Junos OS and Junos OS Evolved the Routing Protocol Daemon (RPD) service, upon receipt of a specific matching BGP packet meeting a specific term in the flowspec configuration, crashes and restarts c...
Juniper Junos 18.4
Juniper Junos 19.1
Juniper Junos 19.2
Juniper Junos Os Evolved 19.3
Juniper Junos Os Evolved 19.2
Juniper Junos Os Evolved 19.1
Juniper Junos 19.3
Juniper Junos 19.4
Juniper Junos 20.1
Juniper Junos Os Evolved 20.1
Juniper Junos 20.2
Juniper Junos 20.3
3.3
CVSSv2
CVE-2021-0259
Due to a vulnerability in DDoS protection in Juniper Networks Junos OS and Junos OS Evolved on QFX5K Series switches in a VXLAN configuration, instability might be experienced in the underlay network as a consequence of exceeding the default ddos-protection aggregate threshold. I...
Juniper Junos 17.3
Juniper Junos 17.4
Juniper Junos 18.1
Juniper Junos 18.2
Juniper Junos 18.3
Juniper Junos 18.4
Juniper Junos 19.1
Juniper Junos 19.2
Juniper Junos 19.3
Juniper Junos 19.4
Juniper Junos 20.1
Juniper Junos 20.2
Juniper Junos 20.3
Juniper Junos Os Evolved 18.3
Juniper Junos Os Evolved 19.1
Juniper Junos Os Evolved 19.2
Juniper Junos Os Evolved 19.3
Juniper Junos Os Evolved 20.1
Juniper Junos Os Evolved 20.2
Juniper Junos Os Evolved 20.3
5
CVSSv2
CVE-2021-0264
A vulnerability in the processing of traffic matching a firewall filter containing a syslog action in Juniper Networks Junos OS on MX Series with MPC10/MPC11 cards installed, PTX10003 and PTX10008 Series devices, will cause the line card to crash and restart, creating a Denial of...
Juniper Junos 19.3
Juniper Junos 19.4
Juniper Junos 20.1
Juniper Junos 20.2
Juniper Junos 20.3
Juniper Junos 20.4
Juniper Junos Os Evolved 18.3
Juniper Junos Os Evolved 19.1
Juniper Junos Os Evolved 19.2
Juniper Junos Os Evolved 19.3
Juniper Junos Os Evolved 20.1
Juniper Junos Os Evolved 20.2
Juniper Junos Os Evolved 20.3
Juniper Junos Os Evolved 20.4
5
CVSSv2
CVE-2021-0225
An Improper Check for Unusual or Exceptional Conditions in Juniper Networks Junos OS Evolved may cause the stateless firewall filter configuration which uses the action 'policer' in certain combinations with other options to not take effect. An administrator can use the...
Juniper Junos Os Evolved 19.3
Juniper Junos Os Evolved 19.2
Juniper Junos Os Evolved 19.1
Juniper Junos Os Evolved 20.1
Juniper Junos Os Evolved 20.3
Juniper Junos Os Evolved 20.2
5
CVSSv2
CVE-2021-0226
On Juniper Networks Junos OS Evolved devices, receipt of a specific IPv6 packet may cause an established IPv6 BGP session to terminate, creating a Denial of Service (DoS) condition. Continued receipt and processing of this packet will create a sustained Denial of Service (DoS) co...
Juniper Junos Os Evolved 20.1
Juniper Junos Os Evolved 20.3
Juniper Junos Os Evolved 20.2
3.3
CVSSv2
CVE-2021-0267
An Improper Input Validation vulnerability in the active-lease query portion in JDHCPD's DHCP Relay Agent of Juniper Networks Junos OS allows an malicious user to cause a Denial of Service (DoS) by sending a crafted DHCP packet to the device thereby crashing the jdhcpd DHCP ...
Juniper Junos 19.4
Juniper Junos 20.1
Juniper Junos 20.2
Juniper Junos 20.3
6.4
CVSSv2
CVE-2021-0211
An improper check for unusual or exceptional conditions in Juniper Networks Junos OS and Junos OS Evolved Routing Protocol Daemon (RPD) service allows an malicious user to send a valid BGP FlowSpec message thereby causing an unexpected change in the route advertisements within th...
Juniper Junos 17.3
Juniper Junos 17.4
Juniper Junos 18.1
Juniper Junos 18.2
Juniper Junos 18.3
Juniper Junos 18.4
Juniper Junos 19.1
Juniper Junos 19.2
Juniper Junos Os Evolved 19.3
Juniper Junos Os Evolved 19.2
Juniper Junos 19.3
Juniper Junos 19.4
Juniper Junos 20.1
Juniper Junos Os Evolved 20.1
Juniper Junos 20.2
Juniper Junos 20.3
Juniper Junos Os Evolved 20.3
Juniper Junos Os Evolved 19.4
Juniper Junos Os Evolved 20.2
Juniper Junos 15.1x49
Juniper Junos 15.1x49-d30
Juniper Junos 15.1x49-d60
2.9
CVSSv2
CVE-2020-1678
On Juniper Networks Junos OS and Junos OS Evolved platforms with EVPN configured, receipt of specific BGP packets causes a slow memory leak. If the memory is exhausted the rpd process might crash. If the issue occurs, the memory leak could be seen by executing the "show task...
Juniper Junos 19.4
Juniper Junos 20.1
Juniper Junos Os Evolved 20.1
Juniper Junos Os Evolved 19.4
Juniper Junos Os Evolved 20.2
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
type confusion
IMAP
CVE-2024-36103
CVE-2024-28995
CVE-2024-37325
CVE-2024-30078
CVE-2024-30082
SQL injection
CVE-2024-30052
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5