Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
juniper junos 20.4 vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2023-28976
An Improper Check for Unusual or Exceptional Conditions vulnerability in the packet forwarding engine (pfe) of Juniper Networks Junos OS on MX Series allows an unauthenticated, network-based malicious user to cause a Denial of Service (DoS). If specific traffic is received on MX ...
Juniper Junos
Juniper Junos 19.1
Juniper Junos 19.2
Juniper Junos 19.3
Juniper Junos 19.4
Juniper Junos 20.2
Juniper Junos 20.4
Juniper Junos 21.1
Juniper Junos 21.2
Juniper Junos 21.3
Juniper Junos 21.4
Juniper Junos 22.1
NA
CVE-2023-28978
An Insecure Default Initialization of Resource vulnerability in Juniper Networks Junos OS Evolved allows an unauthenticated, network based malicious user to read certain confidential information. In the default configuration it is possible to read confidential information about l...
Juniper Junos Os Evolved 20.4
Juniper Junos Os Evolved 21.1
Juniper Junos Os Evolved 21.2
Juniper Junos Os Evolved 21.3
Juniper Junos Os Evolved
Juniper Junos Os Evolved 21.4
Juniper Junos Os Evolved 22.1
Juniper Junos Os Evolved 22.2
NA
CVE-2023-28979
An Improper Check for Unusual or Exceptional Conditions vulnerability in the kernel of Juniper Networks Junos OS allows an adjacent unauthenticated malicious user to bypass an integrity check. In a 6PE scenario and if an additional integrity check is configured, it will fail to d...
Juniper Junos 19.3
Juniper Junos 19.4
Juniper Junos 20.2
Juniper Junos 20.3
Juniper Junos 20.4
Juniper Junos 21.1
Juniper Junos 21.2
Juniper Junos 21.3
Juniper Junos 21.4
Juniper Junos 22.1
Juniper Junos 22.2
Juniper Junos
NA
CVE-2023-28980
A Use After Free vulnerability in the routing protocol daemon of Juniper Networks Junos OS and Junos OS Evolved allows a locally authenticated attacker with low privileges to cause Denial of Service (DoS). In a rib sharding scenario the rpd process will crash shortly after specif...
Juniper Junos 21.3
Juniper Junos 20.4
Juniper Junos 21.1
Juniper Junos 21.2
Juniper Junos 21.4
Juniper Junos 20.3
Juniper Junos 22.1
Juniper Junos 20.2
Juniper Junos Os Evolved 21.2
Juniper Junos Os Evolved 20.4
Juniper Junos Os Evolved 21.4
Juniper Junos Os Evolved 21.3
Juniper Junos Os Evolved 22.1
NA
CVE-2023-28981
An Improper Input Validation vulnerability in the kernel of Juniper Networks Junos OS and Junos OS Evolved allows an unauthenticated, adjacent malicious user to cause a Denial of Service (DoS). If the receipt of router advertisements is enabled on an interface and a specifically ...
Juniper Junos 20.3
Juniper Junos 20.4
Juniper Junos 21.1
Juniper Junos 21.2
Juniper Junos 21.3
Juniper Junos 21.4
Juniper Junos 22.1
Juniper Junos Os Evolved 20.3
Juniper Junos Os Evolved 20.4
Juniper Junos Os Evolved 21.3
Juniper Junos Os Evolved 21.4
Juniper Junos Os Evolved 22.1
NA
CVE-2023-28982
A Missing Release of Memory after Effective Lifetime vulnerability in the routing protocol daemon of Juniper Networks Junos OS and Junos OS Evolved allows an unauthenticated, network based malicious user to cause a Denial of Service (DoS). In a BGP rib sharding scenario, when an ...
Juniper Junos 20.3
Juniper Junos 20.4
Juniper Junos 21.1
Juniper Junos 21.2
Juniper Junos 21.3
Juniper Junos Os Evolved 20.3
Juniper Junos Os Evolved 20.4
Juniper Junos Os Evolved 21.2
Juniper Junos Os Evolved 21.3
NA
CVE-2023-22391
A vulnerability in class-of-service (CoS) queue management in Juniper Networks Junos OS on the ACX2K Series devices allows an unauthenticated network-based malicious user to cause a Denial of Service (DoS). Specific packets are being incorrectly routed to a queue used for other h...
Juniper Junos 19.4
Juniper Junos 20.2
Juniper Junos 20.3
Juniper Junos 20.4
Juniper Junos 21.1
Juniper Junos 21.2
Juniper Junos
NA
CVE-2023-22394
An Improper Handling of Unexpected Data Type vulnerability in the handling of SIP calls in Juniper Networks Junos OS on SRX Series and MX Series platforms allows an malicious user to cause a memory leak leading to Denial of Services (DoS). This issue occurs on all MX Series platf...
Juniper Junos
Juniper Junos 19.3
Juniper Junos 19.4
Juniper Junos 20.1
Juniper Junos 20.2
Juniper Junos 20.3
Juniper Junos 20.4
Juniper Junos 21.1
Juniper Junos 21.2
Juniper Junos 21.3
Juniper Junos 21.4
Juniper Junos 22.1
NA
CVE-2023-22395
A Missing Release of Memory after Effective Lifetime vulnerability in the kernel of Juniper Networks Junos OS allows an unauthenticated, adjacent malicious user to cause a Denial of Service (DoS). In an MPLS scenario specific packets destined to an Integrated Routing and Bridging...
Juniper Junos 19.3
Juniper Junos 19.4
Juniper Junos 20.1
Juniper Junos 20.2
Juniper Junos 20.3
Juniper Junos 20.4
Juniper Junos 21.1
Juniper Junos 21.2
Juniper Junos 21.3
Juniper Junos 21.4
Juniper Junos 22.1
Juniper Junos
NA
CVE-2023-22396
An Uncontrolled Resource Consumption vulnerability in TCP processing on the Routing Engine (RE) of Juniper Networks Junos OS allows an unauthenticated network-based malicious user to send crafted TCP packets destined to the device, resulting in an MBUF leak that ultimately leads ...
Juniper Junos 19.4
Juniper Junos 18.4
Juniper Junos 15.1
Juniper Junos 20.2
Juniper Junos 20.1
Juniper Junos 19.3
Juniper Junos 19.2
Juniper Junos 21.2
Juniper Junos 21.1
Juniper Junos 12.3
Juniper Junos 20.4
Juniper Junos 17.3
Juniper Junos 19.1
Juniper Junos 20.3
Juniper Junos 21.3
Juniper Junos 21.4
Juniper Junos 22.1
Juniper Junos 22.2
Juniper Junos 22.3
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
cross-site scripting
CVE-2024-5158
XML external entity
CVE-2024-4262
CVE-2024-2036
CVE-2024-4985
CVE-2024-21791
remote attackers
CVE-2023-43208
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
3
4
5
6
7
8
9
10
NEXT »