Latest juniper ex9200 Vulnerabilities

Junos OS: SRX Series and EX Series: J-Web doesn't sufficiently sanitize input to prevent XSS
Juniper Networks Junos OS
Juniper Networks SRX Series
Juniper Networks EX Series
Juniper JUNOS<20.4
Juniper JUNOS=20.4
Juniper JUNOS=20.4-r1
and 190 more
Junos OS: SRX Series and EX Series: J-Web - unauthenticated access to temporary files containing sensitive information
Juniper Networks Junos OS
Juniper Networks SRX Series
Juniper Networks EX Series
Juniper JUNOS<20.4
Juniper JUNOS=20.4
Juniper JUNOS=20.4-r1
and 197 more
Junos OS: MX Series and EX9200 Series: If the "tcp-reset" option used in an IPv6 filter, matched packets are accepted instead of rejected
Juniper JUNOS<20.4
Juniper JUNOS=20.4
Juniper JUNOS=20.4-r1
Juniper JUNOS=20.4-r1-s1
Juniper JUNOS=20.4-r2
Juniper JUNOS=20.4-r2-s1
and 104 more
An Allocation of Resources Without Limits or Throttling vulnerability in Juniper Networks Junos OS allows an unauthenticated, network-based attacker to cause Denial of Service (DoS). On all Junos OS...
Juniper JUNOS=21.1
Juniper JUNOS=21.1-r1
Juniper JUNOS=21.1-r1-s1
Juniper JUNOS=21.1-r2
Juniper JUNOS=21.1-r2-s1
Juniper JUNOS=21.1-r2-s2
and 86 more
Juniper Junos OS SRX Series Missing Authentication for Critical Function Vulnerability
Juniper JUNOS<20.4
Juniper JUNOS=20.4
Juniper JUNOS=20.4-r1
Juniper JUNOS=20.4-r1-s1
Juniper JUNOS=20.4-r2
Juniper JUNOS=20.4-r2-s1
and 366 more
Juniper Junos OS SRX Series Missing Authentication for Critical Function Vulnerability
Juniper JUNOS<20.4
Juniper JUNOS=20.4
Juniper JUNOS=20.4-r1
Juniper JUNOS=20.4-r1-s1
Juniper JUNOS=20.4-r2
Juniper JUNOS=20.4-r2-s1
and 178 more
Juniper Junos OS EX Series Missing Authentication for Critical Function Vulnerability
Juniper Networks SRX Series firewall
Juniper Networks EX Series switch
Juniper Junos OS
Juniper JUNOS<20.4
Juniper JUNOS=20.4
Juniper JUNOS=20.4-r1
and 177 more
Juniper Junos OS EX Series PHP External Variable Modification Vulnerability
Juniper Networks SRX Series firewall
Juniper Networks EX Series switch
Juniper Junos OS
Juniper JUNOS<20.4
Juniper JUNOS=20.4
Juniper JUNOS=20.4-r1
and 177 more
Juniper Junos OS EX Series and SRX Series PHP External Variable Modification Vulnerability
Juniper JUNOS<20.4
Juniper JUNOS=20.4
Juniper JUNOS=20.4-r1
Juniper JUNOS=20.4-r1-s1
Juniper JUNOS=20.4-r2
Juniper JUNOS=20.4-r2-s1
and 446 more
An Improper Neutralization of Special Elements vulnerability in the download manager of Juniper Networks Junos OS on SRX Series and EX Series allows a locally authenticated attacker with low privilege...
Juniper JUNOS<19.2
Juniper JUNOS=19.2
Juniper JUNOS=19.2-r1
Juniper JUNOS=19.2-r1-s1
Juniper JUNOS=19.2-r1-s2
Juniper JUNOS=19.2-r1-s3
and 194 more
A vulnerability in the processing of specific MPLS packets in Juniper Networks Junos OS on MX Series and EX9200 Series devices with Trio-based MPCs (Modular Port Concentrators) may cause FPC to crash ...
Juniper JUNOS=17.3
Juniper JUNOS=17.3-r1
Juniper JUNOS=17.3-r1-s1
Juniper JUNOS=17.3-r1-s4
Juniper JUNOS=17.3-r2
Juniper JUNOS=17.3-r2-s1
and 221 more
When user-defined ARP Policer is configured and applied on one or more Aggregated Ethernet (AE) interface units, a Time-of-check Time-of-use (TOCTOU) Race Condition vulnerability between the Device Co...
Juniper JUNOS>=5.7<15.1
Juniper JUNOS>=15.2<18.4
Juniper JUNOS=5.6-r1
Juniper JUNOS=18.4
Juniper JUNOS=18.4-r1
Juniper JUNOS=18.4-r1-s1
and 296 more
Improper Handling of Exceptional Conditions in Ethernet interface frame processing of Juniper Networks Junos OS allows an attacker to send specially crafted frames over the local Ethernet segment, cau...
Juniper JUNOS=16.1
Juniper JUNOS=16.1-r1
Juniper JUNOS=16.1-r2
Juniper JUNOS=16.1-r3
Juniper JUNOS=16.1-r3-s10
Juniper JUNOS=16.1-r3-s11
and 181 more
A Cross-site Scripting (XSS) vulnerability in J-Web on Juniper Networks Junos OS allows an attacker to target another user's session thereby gaining access to the users session. The other user session...
Juniper JUNOS=12.3
Juniper JUNOS=12.3-r1
Juniper JUNOS=12.3-r10
Juniper JUNOS=12.3-r10-s1
Juniper JUNOS=12.3-r10-s2
Juniper JUNOS=12.3-r11
and 313 more
An always-incorrect control flow implementation in the implicit filter terms of Juniper Networks Junos OS and Junos OS Evolved on ACX5800, EX9200 Series, MX10000 Series, MX240, MX480, MX960 devices wi...
Juniper JUNOS=15.1-f6
Juniper JUNOS=15.1-f6-s1
Juniper JUNOS=15.1-f6-s10
Juniper JUNOS=15.1-f6-s12
Juniper JUNOS=15.1-f6-s2
Juniper JUNOS=15.1-f6-s3
and 227 more
A vulnerability in the HTTP/HTTPS service used by J-Web, Web Authentication, Dynamic-VPN (DVPN), Firewall Authentication Pass-Through with Web-Redirect, and Captive Portal allows an unauthenticated at...
Juniper JUNOS=12.3
Juniper JUNOS=12.3-r1
Juniper JUNOS=12.3-r10
Juniper JUNOS=12.3-r10-s1
Juniper JUNOS=12.3-r10-s2
Juniper JUNOS=12.3-r11
and 318 more
Juniper JUNOS=17.3
Juniper JUNOS=17.3-r1
Juniper JUNOS=17.3-r1-s1
Juniper JUNOS=17.3-r1-s4
Juniper JUNOS=17.3-r2
Juniper JUNOS=17.3-r2-s1
and 143 more
A signal handler race condition exists in the Layer 2 Address Learning Daemon (L2ALD) of Juniper Networks Junos OS due to the absence of a specific protection mechanism to avoid a race condition which...
Juniper JUNOS=14.1x53
Juniper JUNOS=14.1x53-d10
Juniper JUNOS=14.1x53-d15
Juniper JUNOS=14.1x53-d16
Juniper JUNOS=14.1x53-d20
Juniper JUNOS=14.1x53-d25
and 262 more
An improper check for unusual or exceptional conditions in Juniper Networks Junos OS and Junos OS Evolved Routing Protocol Daemon (RPD) service allows an attacker to send a valid BGP FlowSpec message ...
Juniper JUNOS=17.3
Juniper JUNOS=17.3-r1-s1
Juniper JUNOS=17.3-r2
Juniper JUNOS=17.3-r2-s1
Juniper JUNOS=17.3-r2-s2
Juniper JUNOS=17.3-r2-s3
and 330 more
A vulnerability in processing of certain DHCP packets from adjacent clients on EX Series and QFX Series switches running Juniper Networks Junos OS with DHCP local/relay server configured may lead to e...
Juniper JUNOS=17.4-r3
Juniper JUNOS=17.4-r3-s1
Juniper JUNOS=17.4-r3-s2
Juniper JUNOS=18.1-r3-s10
Juniper JUNOS=18.1-r3-s7
Juniper JUNOS=18.1-r3-s8
and 67 more
On Juniper Networks MX Series and EX9200 Series platforms with Trio-based MPC (Modular Port Concentrator) where Integrated Routing and Bridging (IRB) interface is configured and it is mapped to a VPLS...
Juniper JUNOS=17.3-r3-s8
Juniper JUNOS=17.4-r3-s2
Juniper JUNOS=18.2-r3-s4
Juniper JUNOS=18.2-r3-s5
Juniper JUNOS=18.3-r3-s2
Juniper JUNOS=18.3-r3-s3
and 29 more
On Juniper Networks MX Series and EX9200 Series, in a certain condition the IPv6 Distributed Denial of Service (DDoS) protection might not take affect when it reaches the threshold condition. The DDoS...
Juniper JUNOS=17.2
Juniper JUNOS=17.2-r1
Juniper JUNOS=17.2-r1-s1
Juniper JUNOS=17.2-r1-s2
Juniper JUNOS=17.2-r1-s3
Juniper JUNOS=17.2-r1-s4
and 97 more
A vulnerability in the BGP FlowSpec implementation may cause a Juniper Networks Junos OS device to terminate an established BGP session upon receiving a specific BGP FlowSpec advertisement. The BGP NO...
Juniper JUNOS=12.3
Juniper JUNOS=15.1
Juniper JUNOS=15.1-f
Juniper JUNOS=15.1-f1
Juniper JUNOS=15.1-f2
Juniper JUNOS=15.1-f2-s1
and 241 more
Insufficient Cross-Site Scripting (XSS) protection in J-Web may potentially allow a remote attacker to inject web script or HTML, hijack the target user's J-Web session and perform administrative acti...
Juniper JUNOS=12.3
Juniper JUNOS=12.3-r1
Juniper JUNOS=12.3-r11
Juniper JUNOS=12.3-r12
Juniper JUNOS=12.3-r12-s1
Juniper JUNOS=12.3-r12-s10
and 242 more
A path traversal vulnerability in NFX150 Series and QFX10K Series, EX9200 Series, MX Series and PTX Series devices with Next-Generation Routing Engine (NG-RE) allows a local authenticated user to read...
Juniper JUNOS=15.1-f1
Juniper JUNOS=15.1-f2
Juniper JUNOS=15.1-f2-s1
Juniper JUNOS=15.1-f2-s2
Juniper JUNOS=15.1-f2-s3
Juniper JUNOS=15.1-f2-s4
and 59 more
In MPLS environments, receipt of a specific SNMP packet may cause the routing protocol daemon (RPD) process to crash and restart. By continuously sending a specially crafted SNMP packet, an attacker c...
Juniper JUNOS=12.1x46
Juniper JUNOS=12.1x46-d10
Juniper JUNOS=12.1x46-d15
Juniper JUNOS=12.1x46-d20
Juniper JUNOS=12.1x46-d25
Juniper JUNOS=12.1x46-d30
and 215 more
An issue was discovered in Embedthis GoAhead before 4.0.1 and Appweb before 7.0.2. The server mishandles some HTTP request fields associated with time, which results in a NULL pointer dereference, as ...
Embedthis Appweb<7.0.2
Embedthis GoAhead<4.0.1
Juniper JUNOS=12.1x46
Juniper JUNOS=12.1x46-d10
Juniper JUNOS=12.1x46-d15
Juniper JUNOS=12.1x46-d20
and 426 more
A Denial of Service vulnerability exists in the Juniper Networks Junos OS JDHCPD daemon which allows an attacker to core the JDHCPD daemon by sending a crafted IPv6 packet to the system. This issue is...
Juniper JUNOS=12.3
Juniper JUNOS=12.3-r1
Juniper JUNOS=12.3-r10
Juniper JUNOS=12.3-r11
Juniper JUNOS=12.3-r12
Juniper JUNOS=12.3-r2
and 179 more
An Improper Privilege Management vulnerability in a shell session of Juniper Networks Junos OS allows an authenticated unprivileged attacker to gain full control of the system. Affected releases are J...
Juniper JUNOS=12.1x46
Juniper JUNOS=12.1x46-d10
Juniper JUNOS=12.1x46-d15
Juniper JUNOS=12.1x46-d20
Juniper JUNOS=12.1x46-d25
Juniper JUNOS=12.1x46-d30
and 66 more

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2024 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203