Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
evo vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2024-30395
An Improper Validation of Specified Type of Input vulnerability in Routing Protocol Daemon (RPD) of Junos OS and Junos OS Evolved allows an unauthenticated, network-based malicious user to cause Denial of Service (DoS). If a BGP update is received over an established BGP session ...
NA
CVE-2024-30386
A Use-After-Free vulnerability in the Layer 2 Address Learning Daemon (l2ald) of Juniper Networks Junos OS and Junos OS Evolved allows an unauthenticated, adjacent malicious user to cause l2ald to crash leading to a Denial-of-Service (DoS). In an EVPN-VXLAN scenario, when state u...
NA
CVE-2023-22401
An Improper Validation of Array Index vulnerability in the Advanced Forwarding Toolkit Manager daemon (aftmand) of Juniper Networks Junos OS and Junos OS Evolved allows an unauthenticated, network-based malicious user to cause a Denial of Service (DoS). On the PTX10008 and PTX100...
Juniper Junos 22.1
Juniper Junos Os Evolved 21.4
Juniper Junos 22.2
Juniper Junos Os Evolved 22.2
Juniper Junos Os Evolved 21.3
Juniper Junos Os Evolved 22.1
NA
CVE-2023-22400
An Uncontrolled Resource Consumption vulnerability in the PFE management daemon (evo-pfemand) of Juniper Networks Junos OS Evolved allows an unauthenticated, network-based malicious user to cause an FPC crash leading to a Denial of Service (DoS). When a specific SNMP GET operatio...
Juniper Junos Os Evolved 20.4
Juniper Junos Os Evolved 21.1
Juniper Junos Os Evolved 21.2
Juniper Junos Os Evolved 21.3
Juniper Junos Os Evolved 21.4
NA
CVE-2024-30390
An Improper Restriction of Excessive Authentication Attempts vulnerability in Juniper Networks Junos OS Evolved allows an unauthenticated, network-based malicious user to cause a limited Denial of Service (DoS) to the management plane. When an incoming connection was blocked beca...
NA
CVE-2024-21618
An Access of Memory Location After End of Buffer vulnerability in the Layer-2 Control Protocols Daemon (l2cpd) of Juniper Networks Junos OS and Junos OS Evolved allows an adjacent, unauthenticated malicious user to cause Denial of Service (DoS). On all Junos OS and Junos OS Evolv...
NA
CVE-2023-28980
A Use After Free vulnerability in the routing protocol daemon of Juniper Networks Junos OS and Junos OS Evolved allows a locally authenticated attacker with low privileges to cause Denial of Service (DoS). In a rib sharding scenario the rpd process will crash shortly after specif...
Juniper Junos 21.3
Juniper Junos 20.4
Juniper Junos 21.1
Juniper Junos 21.2
Juniper Junos 21.4
Juniper Junos 20.3
Juniper Junos 22.1
Juniper Junos 20.2
Juniper Junos Os Evolved 21.2
Juniper Junos Os Evolved 20.4
Juniper Junos Os Evolved 21.4
Juniper Junos Os Evolved 21.3
Juniper Junos Os Evolved 22.1
NA
CVE-2024-21604
An Allocation of Resources Without Limits or Throttling vulnerability in the kernel of Juniper Networks Junos OS Evolved allows an unauthenticated, network-based malicious user to cause a Denial of Service (DoS). If a high rate of specific valid packets are processed by the rout...
Juniper Junos Os Evolved 21.2
Juniper Junos Os Evolved 21.4
Juniper Junos Os Evolved 22.1
Juniper Junos Os Evolved 22.2
Juniper Junos Os Evolved 22.3
Juniper Junos Os Evolved 22.4
NA
CVE-2024-30394
A Stack-based Buffer Overflow vulnerability in the Routing Protocol Daemon (RPD) component of Junos OS and Junos OS Evolved allows an unauthenticated, network-based malicious user to cause an rpd crash, leading to Denial of Service (DoS). On all Junos OS and Junos OS Evolved plat...
NA
CVE-2024-21602
A NULL Pointer Dereference vulnerability in Juniper Networks Junos OS Evolved on ACX7024, ACX7100-32C and ACX7100-48L allows an unauthenticated, network-based malicious user to cause a Denial of Service (DoS). If a specific IPv4 UDP packet is received and sent to the Routing Eng...
Juniper Junos Os Evolved 21.4
Juniper Junos Os Evolved 22.1
Juniper Junos Os Evolved 22.2
Juniper Junos Os Evolved 22.3
VMScore
CVSSv2
CVSSv3
VMScore
Recommendations:
NULL pointer dereference
CVE-2023-52689
CVE-2024-23803
client side
CVE-2023-52696
information disclosure
CVE-2024-35843
CVE-2024-27130
CVE-2023-52697
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
8
NEXT »