Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
juniper junos 18.1 vulnerabilities and exploits
(subscribe to this query)
5.9
CVSSv3
CVE-2021-0258
A vulnerability in the forwarding of transit TCPv6 packets received on the Ethernet management interface of Juniper Networks Junos OS allows an malicious user to trigger a kernel panic, leading to a Denial of Service (DoS). Continued receipt and processing of these transit packet...
7.4
CVSSv3
CVE-2021-0259
Due to a vulnerability in DDoS protection in Juniper Networks Junos OS and Junos OS Evolved on QFX5K Series switches in a VXLAN configuration, instability might be experienced in the underlay network as a consequence of exceeding the default ddos-protection aggregate threshold. I...
Juniper Junos 17.3
Juniper Junos 17.4
Juniper Junos 18.1
Juniper Junos 18.2
Juniper Junos 18.3
Juniper Junos 18.4
Juniper Junos 19.1
Juniper Junos 19.2
Juniper Junos 19.3
Juniper Junos 19.4
Juniper Junos 20.1
Juniper Junos 20.2
Juniper Junos 20.3
Juniper Junos Os Evolved 18.3
Juniper Junos Os Evolved 19.1
Juniper Junos Os Evolved 19.2
Juniper Junos Os Evolved 19.3
Juniper Junos Os Evolved 20.1
Juniper Junos Os Evolved 20.2
Juniper Junos Os Evolved 20.3
7.3
CVSSv3
CVE-2021-0260
An improper authorization vulnerability in the Simple Network Management Protocol daemon (snmpd) service of Juniper Networks Junos OS leads an unauthenticated attacker being able to perform SNMP read actions, an Exposure of System Data to an Unauthorized Control Sphere, or write ...
Juniper Junos 17.2
Juniper Junos 17.3
Juniper Junos 17.4
Juniper Junos 18.1
Juniper Junos 18.2
Juniper Junos 18.3
Juniper Junos 18.4
Juniper Junos 19.1
Juniper Junos 19.2
Juniper Junos 19.3
7.5
CVSSv3
CVE-2021-0261
A vulnerability in the HTTP/HTTPS service used by J-Web, Web Authentication, Dynamic-VPN (DVPN), Firewall Authentication Pass-Through with Web-Redirect, and Captive Portal allows an unauthenticated malicious user to cause an extended Denial of Service (DoS) for these services by ...
Juniper Junos 12.3
Juniper Junos 12.3x48
Juniper Junos 15.1x49
9.3
CVSSv3
CVE-2021-0268
An Improper Neutralization of CRLF Sequences in HTTP Headers ('HTTP Response Splitting') weakness in J-web of Juniper Networks Junos OS leads to buffer overflows, segment faults, or other impacts, which allows an malicious user to modify the integrity of the device and ...
Juniper Junos 18.1
Juniper Junos 18.2
Juniper Junos 18.3
Juniper Junos 18.4
Juniper Junos 19.1
Juniper Junos 19.2
Juniper Junos 19.3
Juniper Junos 19.4
Juniper Junos 20.1
8.8
CVSSv3
CVE-2021-0269
The improper handling of client-side parameters in J-Web of Juniper Networks Junos OS allows an malicious user to perform a number of different malicious actions against a target device when a user is authenticated to J-Web. An attacker may be able to supersede existing parameter...
5.9
CVSSv3
CVE-2021-0270
On PTX Series and QFX10k Series devices with the "inline-jflow" feature enabled, a use after free weakness in the Packet Forwarding Engine (PFE) microkernel architecture of Juniper Networks Junos OS may allow an malicious user to cause a Denial of Service (DoS) conditio...
Juniper Junos 18.1
6.5
CVSSv3
CVE-2021-0272
A kernel memory leak in QFX10002-32Q, QFX10002-60C, QFX10002-72Q, QFX10008, QFX10016 devices Flexible PIC Concentrators (FPCs) on Juniper Networks Junos OS allows an malicious user to send genuine packets destined to the device to cause a Denial of Service (DoS) to the device. On...
Juniper Junos 16.1
Juniper Junos 16.2
Juniper Junos 17.1
Juniper Junos 17.2
Juniper Junos 17.3
Juniper Junos 17.4
Juniper Junos 18.1
Juniper Junos 18.2
Juniper Junos 18.3
Juniper Junos 18.4
Juniper Junos 19.1
Juniper Junos 19.2
Juniper Junos 19.3
Juniper Junos 19.4
Juniper Junos 20.1
8.8
CVSSv3
CVE-2021-0275
A Cross-site Scripting (XSS) vulnerability in J-Web on Juniper Networks Junos OS allows an malicious user to target another user's session thereby gaining access to the users session. The other user session must be active for the attack to succeed. Once successful, the attac...
Juniper Junos 12.3
Juniper Junos 15.1
Juniper Junos 12.3x48
Juniper Junos 15.1x49
Juniper Junos 16.1
Juniper Junos 16.2
Juniper Junos 17.1
Juniper Junos 17.2
Juniper Junos 17.3
Juniper Junos 17.4
Juniper Junos 18.1
Juniper Junos 18.2
Juniper Junos 18.3
Juniper Junos 18.4
Juniper Junos 19.1
Juniper Junos 19.2
Juniper Junos 19.3
6.8
CVSSv3
CVE-2021-0220
The Junos Space Network Management Platform has been found to store shared secrets in a recoverable format that can be exposed through the UI. An attacker who is able to execute arbitrary code in the victim browser (for example via XSS) or access cached contents may be able to ob...
Juniper Junos Space 1.0
Juniper Junos Space 1.1
Juniper Junos Space 1.2
Juniper Junos Space 1.3
Juniper Junos Space 1.4
Juniper Junos Space 2.0
Juniper Junos Space 11.1
Juniper Junos Space 11.2
Juniper Junos Space 11.3
Juniper Junos Space 11.4
Juniper Junos Space 12.1
Juniper Junos Space 12.2
Juniper Junos Space 12.3
Juniper Junos Space 13.1
Juniper Junos Space 13.3
Juniper Junos Space 14.1
Juniper Junos Space 15.1
Juniper Junos Space 15.2
Juniper Junos Space 16.1
Juniper Junos Space 17.1
Juniper Junos Space 17.2
Juniper Junos Space 18.1
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-23316
SQL injection
type confusion
CVE-2024-20697
CVE-2024-4344
local
CVE-2024-30043
CVE-2024-3821
CVE-2024-5041
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
8
9
10
NEXT »