Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
juniper junos 17.1 vulnerabilities and exploits
(subscribe to this query)
5.9
CVSSv3
CVE-2018-0019
A vulnerability in Junos OS SNMP MIB-II subagent daemon (mib2d) may allow a remote network based malicious user to cause the mib2d process to crash resulting in a denial of service condition (DoS) for the SNMP subsystem. While a mib2d process crash can disrupt the network monitor...
Juniper Junos 15.1x49
Juniper Junos 14.1
Juniper Junos 14.1x53
Juniper Junos 15.1x53
Juniper Junos 16.1
Juniper Junos 16.2
Juniper Junos 17.1
Juniper Junos 15.1
Juniper Junos 12.1x46
Juniper Junos 12.3x48
Juniper Junos 14.2
Juniper Junos 17.2
Juniper Junos 12.3
Juniper Junos 16.1x65
Juniper Junos 16.1x70
8.1
CVSSv3
CVE-2018-0052
If RSH service is enabled on Junos OS and if the PAM authentication is disabled, a remote unauthenticated attacker can obtain root access to the device. RSH service is disabled by default on Junos. There is no documented CLI command to enable this service. However, an undocumente...
Juniper Junos 12.1x46
Juniper Junos 12.3
Juniper Junos 12.3x48
Juniper Junos 14.1x53
Juniper Junos 15.1
Juniper Junos 15.1x49
Juniper Junos 15.1x53
Juniper Junos 16.1
Juniper Junos 16.2
Juniper Junos 17.1
Juniper Junos 17.2
Juniper Junos 17.2x75
Juniper Junos 17.3
Juniper Junos 17.4
Juniper Junos 18.2x75
5.3
CVSSv3
CVE-2020-1628
Juniper Networks Junos OS uses the 128.0.0.0/2 subnet for internal communications between the RE and PFEs. It exists that packets utilizing these IP addresses may egress an EX4300 switch, leaking configuration information such as heartbeats, kernel versions, etc. out to the Inter...
Juniper Junos 14.1x53
Juniper Junos 15.1
Juniper Junos 15.1x49
Juniper Junos 16.1
Juniper Junos 17.1
Juniper Junos 17.2
Juniper Junos 17.3
Juniper Junos 17.4
Juniper Junos 18.1
Juniper Junos 18.2
Juniper Junos 18.3
Juniper Junos 18.4
Juniper Junos 19.1
Juniper Junos 19.2
Juniper Junos 19.3
7.5
CVSSv3
CVE-2018-15505
An issue exists in Embedthis GoAhead prior to 4.0.1 and Appweb prior to 7.0.2. An HTTP POST request with a specially crafted "Host" header field may cause a NULL pointer dereference and thus cause a denial of service, as demonstrated by the lack of a trailing ']...
Embedthis Appweb
Embedthis Goahead
Juniper Junos 15.1
Juniper Junos 16.1
Juniper Junos 12.3
Juniper Junos 15.1x53
Juniper Junos 12.3x48
Juniper Junos 15.1x49
Juniper Junos 16.2
Juniper Junos 17.2
Juniper Junos 17.1
Juniper Junos 17.3
Juniper Junos 17.4
Juniper Junos 18.1
5.3
CVSSv3
CVE-2021-0273
An always-incorrect control flow implementation in the implicit filter terms of Juniper Networks Junos OS and Junos OS Evolved on ACX5800, EX9200 Series, MX10000 Series, MX240, MX480, MX960 devices with affected Trio line cards allows an malicious user to exploit an interdependen...
Juniper Junos 15.1
Juniper Junos 15.2
Juniper Junos 16.1
Juniper Junos 17.1
Juniper Junos 17.2
Juniper Junos 17.3
Juniper Junos 17.4
Juniper Junos 18.1
Juniper Junos 18.2
Juniper Junos 18.3
Juniper Junos 18.4
Juniper Junos 19.1
Juniper Junos 19.3
Juniper Junos 19.4
Juniper Junos Os Evolved 19.4
8.6
CVSSv3
CVE-2020-1632
In a certain condition, receipt of a specific BGP UPDATE message might cause Juniper Networks Junos OS and Junos OS Evolved devices to advertise an invalid BGP UPDATE message to other peers, causing the other peers to terminate the established BGP session, creating a Denial of Se...
Juniper Junos 16.1
Juniper Junos 16.2
Juniper Junos 17.1
Juniper Junos 17.2
Juniper Junos 17.2x75
Juniper Junos 17.3
Juniper Junos 17.4
Juniper Junos 18.1
Juniper Junos 18.1x75
Juniper Junos 18.3
Juniper Junos 18.4
Juniper Junos 19.1
Juniper Junos 19.2
Juniper Junos Os Evolved 19.2
6.5
CVSSv3
CVE-2019-0016
A malicious authenticated user may be able to delete a device from the Junos Space database without the necessary privileges through crafted Ajax interactions obtained from another legitimate delete action performed by another administrative user. Affected releases are Juniper Ne...
Juniper Junos Space 15.1
Juniper Junos Space 16.1
Juniper Junos Space 13.3
Juniper Junos Space 14.1
Juniper Junos Space 15.2
Juniper Junos Space 17.1
Juniper Junos Space 17.2
Juniper Junos Space 18.1
Juniper Junos Space 18.2
8.8
CVSSv3
CVE-2019-0017
The Junos Space application, which allows Device Image files to be uploaded, has insufficient validity checking which may allow uploading of malicious images or scripts, or other content types. Affected releases are Juniper Networks Junos Space versions before 18.3R1.
Juniper Junos Space 14.1
Juniper Junos Space 17.2
Juniper Junos Space 18.1
Juniper Junos Space 18.2
Juniper Junos Space 13.3
Juniper Junos Space 15.1
Juniper Junos Space 15.2
Juniper Junos Space 17.1
Juniper Junos Space 16.1
6.5
CVSSv3
CVE-2020-1611
A Local File Inclusion vulnerability in Juniper Networks Junos Space allows an malicious user to view all files on the target when the device receives malicious HTTP packets. This issue affects: Juniper Networks Junos Space versions before 19.4R1.
Juniper Junos Space 17.1
Juniper Junos Space 17.2
Juniper Junos Space 18.1
Juniper Junos Space 18.2
Juniper Junos Space 18.3
Juniper Junos Space 18.4
Juniper Junos Space 19.1
Juniper Junos Space 19.2
Juniper Junos Space 19.3
1 Github repository
6.5
CVSSv3
CVE-2020-1600
In a Point-to-Multipoint (P2MP) Label Switched Path (LSP) scenario, an uncontrolled resource consumption vulnerability in the Routing Protocol Daemon (RPD) in Juniper Networks Junos OS allows a specific SNMP request to trigger an infinite loop causing a high CPU usage Denial of S...
Juniper Junos 12.3x48
Juniper Junos 15.1
Juniper Junos 15.1x49
Juniper Junos 15.1x53
Juniper Junos 16.1
Juniper Junos 16.2
Juniper Junos 17.1
Juniper Junos 17.2
Juniper Junos 17.3
Juniper Junos 17.4
Juniper Junos 18.1
Juniper Junos 18.2
Juniper Junos 18.2x75
Juniper Junos 18.3
Juniper Junos 18.4
Juniper Junos 19.1
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-20065
open redirect
CVE-2024-1086
path traversal
CVE-2024-29825
XXE
CVE-2024-29822
CVE-2024-20696
CVE-2024-3564
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
2
3
4
5
6
7
8
9
10
NEXT »