Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
juniper vulnerabilities and exploits
(subscribe to this query)
7.8
CVSSv2
CVE-2014-2842
Juniper ScreenOS 6.3 and previous versions allows remote malicious users to cause a denial of service (crash and restart or failover) via a malformed SSL/TLS packet.
Juniper Screenos 5.4.0
Juniper Screenos 6.1.0
Juniper Screenos 6.0.0
Juniper Screenos
Juniper Screenos 6.2.0
7.8
CVSSv2
CVE-2014-0618
Juniper Junos prior to 10.4 prior to 10.4R16, 11.4 prior to 11.4R8, 12.1R prior to 12.1R7, 12.1X44 prior to 12.1X44-D20, and 12.1X45 prior to 12.1X45-D10 on SRX Series service gateways, when used as a UAC enforcer and captive portal is enabled, allows remote malicious users to ca...
Juniper Junos 12.1x44
Juniper Junos 12.1x45
Juniper Junos 12.1r
Juniper Junos 11.4
Juniper Junos 10.4
Juniper Srx210 -
Juniper Srx220 -
Juniper Srx110 -
Juniper Srx1400 -
Juniper Srx5800 -
Juniper Srx650 -
Juniper Srx100 -
Juniper Srx550 -
Juniper Srx5600 -
Juniper Srx240 -
Juniper Srx3400 -
Juniper Srx3600 -
7.8
CVSSv2
CVE-2013-4687
flowd in Juniper Junos 10.4 prior to 10.4S14, 11.2 and 11.4 prior to 11.4R6-S2, and 12.1 prior to 12.1R6 on SRX devices, when certain Application Layer Gateways (ALGs) are enabled, allows remote malicious users to cause a denial of service (daemon crash) via crafted TCP packets, ...
Juniper Junos 11.2
Juniper Junos 10.4
Juniper Junos 12.1
Juniper Junos 11.4
Juniper Srx650 -
Juniper Srx1400 -
Juniper Srx100 -
Juniper Srx110 -
Juniper Srx3400 -
Juniper Srx3600 -
Juniper Srx210 -
Juniper Srx220 -
Juniper Srx5600 -
Juniper Srx5800 -
Juniper Srx240 -
Juniper Srx550 -
7.8
CVSSv2
CVE-2013-4688
flowd in Juniper Junos 10.4 prior to 10.4R11 on SRX devices, when the MSRPC Application Layer Gateway (ALG) is enabled, allows remote malicious users to cause a denial of service (daemon crash) via crafted MSRPC requests, aka PR 772834.
Juniper Junos 10.4
Juniper Srx1400 -
Juniper Srx3400 -
Juniper Srx100 -
Juniper Srx110 -
Juniper Srx210 -
Juniper Srx3600 -
Juniper Srx5600 -
Juniper Srx220 -
Juniper Srx240 -
Juniper Srx5800 -
Juniper Srx550 -
Juniper Srx650 -
7.8
CVSSv2
CVE-2013-4684
flowd in Juniper Junos 10.4 prior to 10.4S14, 11.4 prior to 11.4R8, 12.1 prior to 12.1R7, and 12.1X44 prior to 12.1X44-D15 on SRX devices, when PIM and NAT are enabled, allows remote malicious users to cause a denial of service (daemon crash) via crafted PIM packets, aka PR 84225...
Juniper Junos 10.4
Juniper Junos 11.4
Juniper Junos 12.1
Juniper Junos 12.1x44
Juniper Srx210 -
Juniper Srx220 -
Juniper Srx5600 -
Juniper Srx5800 -
Juniper Srx240 -
Juniper Srx550 -
Juniper Srx650 -
Juniper Srx1400 -
Juniper Srx100 -
Juniper Srx110 -
Juniper Srx3400 -
Juniper Srx3600 -
7.8
CVSSv2
CVE-2007-6372
Unspecified vulnerability in Juniper JUNOS 7.3 up to and including 8.4 allows remote malicious users to cause a denial of service (crash) via malformed BGP packets, possibly BGP UPDATE packets that trigger session flapping.
Juniper Junos 8.0
Juniper Junos 8.2
Juniper Junos 7.3
Juniper Junos 7.4
Juniper Junos 7.5
Juniper Junos 8.3
Juniper Junos 8.4
Juniper Junos 7.6
Juniper Junos 8.1
7.8
CVSSv2
CVE-2005-4587
Juniper NetScreen-Security Manager (NSM) 2004 FP2 and FP3 allow remote malicious users to cause a denial of service (crash or hang of server components that are automatically restarted) via a long crafted string on (1) port 7800 (the GUI Server port) or (2) port 7801 (the Device ...
Juniper Netscreen-security Manager 2004
7.6
CVSSv2
CVE-2020-1673
Insufficient Cross-Site Scripting (XSS) protection in Juniper Networks J-Web and web based (HTTP/HTTPS) services allows an unauthenticated malicious user to hijack the target user's HTTP/HTTPS session and perform administrative actions on the Junos device as the targeted use...
Juniper Junos 18.1
Juniper Junos 18.2
Juniper Junos 18.3
Juniper Junos 18.4
Juniper Junos 19.1
Juniper Junos 19.2
Juniper Junos 19.3
Juniper Junos 19.4
Juniper Junos 20.1
7.5
CVSSv2
CVE-2021-31349
The usage of an internal HTTP header created an authentication bypass vulnerability (CWE-287), allowing an malicious user to view internal files, change settings, manipulate services and execute arbitrary code. This issue affects all Juniper Networks 128 Technology Session Smart ...
Juniper 128 Technology Session Smart Router Firmware
7.5
CVSSv2
CVE-2021-31384
Due to a Missing Authorization weakness and Insufficient Granularity of Access Control in a specific device configuration, a vulnerability exists in Juniper Networks Junos OS on SRX Series whereby an attacker who attempts to access J-Web administrative interfaces can successfully...
Juniper Junos 20.4
Juniper Junos 21.1
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-29895
blind SQL injection
CVE-2024-5064
CVE-2023-52677
CVE-2023-52682
CVE-2024-30051
CVE-2024-35849
remote attackers
remote
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
4
5
6
7
8
9
10
NEXT »