Vulmon
Recent Vulnerabilities
Product List
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
juniper junos os evolved vulnerabilities and exploits
(subscribe to this query)
2.9
CVSSv2
CVE-2020-1678
On Juniper Networks Junos OS and Junos OS Evolved platforms with EVPN configured, receipt of specific BGP packets causes a slow memory leak. If the memory is exhausted the rpd process might crash. If the issue occurs, the memory leak could be seen by executing the "show task...
Juniper Junos 19.4
Juniper Junos 20.1
Juniper Junos Os Evolved 20.1
Juniper Junos Os Evolved 19.4
Juniper Junos Os Evolved 20.2
2.1
CVSSv2
CVE-2020-1620
A local, authenticated user with shell can obtain the hashed values of login passwords via configd streamer log. This issue affects all versions of Junos OS Evolved before 19.3R1.
Juniper Junos Os Evolved
2.1
CVSSv2
CVE-2020-1621
A local, authenticated user with shell can obtain the hashed values of login passwords via configd traces. This issue affects all versions of Junos OS Evolved before 19.3R1.
Juniper Junos Os Evolved
2.1
CVSSv2
CVE-2020-1622
A local, authenticated user with shell can obtain the hashed values of login passwords and shared secrets via the EvoSharedObjStore. This issue affects all versions of Junos OS Evolved before 19.1R1.
Juniper Junos Os Evolved
2.1
CVSSv2
CVE-2020-1623
A local, authenticated user with shell can view sensitive configuration information via the ev.ops configuration file. This issue affects all versions of Junos OS Evolved before 19.2R1.
Juniper Junos Os Evolved
2.1
CVSSv2
CVE-2020-1624
A local, authenticated user with shell can obtain the hashed values of login passwords and shared secrets via raw objmon configuration files. This issue affects all versions of Junos OS Evolved before 19.1R1.
Juniper Junos Os Evolved
NA
CVE-2024-30380
An Improper Handling of Exceptional Conditions vulnerability in Juniper Networks Junos OS and Junos OS Evolved allows an adjacent unauthenticated malicious user to cause a Denial of Service (DoS), which causes the l2cpd process to crash by sending a specific TLV. The l2cpd proces...
NA
CVE-2024-30382
An Improper Handling of Exceptional Conditions vulnerability in the routing protocol daemon (rpd) of Juniper Networks Junos OS and Junos OS Evolved allows a network-based, unauthenticated malicious user to send a specific routing update, causing an rpd core due to memory corrupti...
NA
CVE-2024-30386
A Use-After-Free vulnerability in the Layer 2 Address Learning Daemon (l2ald) of Juniper Networks Junos OS and Junos OS Evolved allows an unauthenticated, adjacent malicious user to cause l2ald to crash leading to a Denial-of-Service (DoS). In an EVPN-VXLAN scenario, when state u...
NA
CVE-2024-30390
An Improper Restriction of Excessive Authentication Attempts vulnerability in Juniper Networks Junos OS Evolved allows an unauthenticated, network-based malicious user to cause a limited Denial of Service (DoS) to the management plane. When an incoming connection was blocked beca...
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
SSRF
server-side request forgery
CVE-2024-30067
CVE-2024-5553
CVE-2024-30095
IDOR
CVE-2024-35252
CVE-2024-23692
CVE-2024-27801
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
2
3
4
5
6
7
8
9
10
NEXT »