Latest juniper ex9251 Vulnerabilities

Junos OS: SRX Series and EX Series: J-Web doesn't sufficiently sanitize input to prevent XSS
Juniper Networks Junos OS
Juniper Networks SRX Series
Juniper Networks EX Series
Juniper JUNOS<20.4
Juniper JUNOS=20.4
Juniper JUNOS=20.4-r1
and 190 more
Junos OS: SRX Series and EX Series: J-Web - unauthenticated access to temporary files containing sensitive information
Juniper Networks Junos OS
Juniper Networks SRX Series
Juniper Networks EX Series
Juniper JUNOS<20.4
Juniper JUNOS=20.4
Juniper JUNOS=20.4-r1
and 197 more
Juniper Junos OS SRX Series Missing Authentication for Critical Function Vulnerability
Juniper JUNOS<20.4
Juniper JUNOS=20.4
Juniper JUNOS=20.4-r1
Juniper JUNOS=20.4-r1-s1
Juniper JUNOS=20.4-r2
Juniper JUNOS=20.4-r2-s1
and 366 more
Juniper Junos OS SRX Series Missing Authentication for Critical Function Vulnerability
Juniper JUNOS<20.4
Juniper JUNOS=20.4
Juniper JUNOS=20.4-r1
Juniper JUNOS=20.4-r1-s1
Juniper JUNOS=20.4-r2
Juniper JUNOS=20.4-r2-s1
and 178 more
Juniper Junos OS EX Series Missing Authentication for Critical Function Vulnerability
Juniper Networks SRX Series firewall
Juniper Networks EX Series switch
Juniper Junos OS
Juniper JUNOS<20.4
Juniper JUNOS=20.4
Juniper JUNOS=20.4-r1
and 177 more
Juniper Junos OS EX Series PHP External Variable Modification Vulnerability
Juniper Networks SRX Series firewall
Juniper Networks EX Series switch
Juniper Junos OS
Juniper JUNOS<20.4
Juniper JUNOS=20.4
Juniper JUNOS=20.4-r1
and 177 more
Juniper Junos OS EX Series and SRX Series PHP External Variable Modification Vulnerability
Juniper JUNOS<20.4
Juniper JUNOS=20.4
Juniper JUNOS=20.4-r1
Juniper JUNOS=20.4-r1-s1
Juniper JUNOS=20.4-r2
Juniper JUNOS=20.4-r2-s1
and 446 more
An Improper Neutralization of Special Elements vulnerability in the download manager of Juniper Networks Junos OS on SRX Series and EX Series allows a locally authenticated attacker with low privilege...
Juniper JUNOS<19.2
Juniper JUNOS=19.2
Juniper JUNOS=19.2-r1
Juniper JUNOS=19.2-r1-s1
Juniper JUNOS=19.2-r1-s2
Juniper JUNOS=19.2-r1-s3
and 194 more
A vulnerability in the processing of specific MPLS packets in Juniper Networks Junos OS on MX Series and EX9200 Series devices with Trio-based MPCs (Modular Port Concentrators) may cause FPC to crash ...
Juniper JUNOS=17.3
Juniper JUNOS=17.3-r1
Juniper JUNOS=17.3-r1-s1
Juniper JUNOS=17.3-r1-s4
Juniper JUNOS=17.3-r2
Juniper JUNOS=17.3-r2-s1
and 221 more
When user-defined ARP Policer is configured and applied on one or more Aggregated Ethernet (AE) interface units, a Time-of-check Time-of-use (TOCTOU) Race Condition vulnerability between the Device Co...
Juniper JUNOS>=5.7<15.1
Juniper JUNOS>=15.2<18.4
Juniper JUNOS=5.6-r1
Juniper JUNOS=18.4
Juniper JUNOS=18.4-r1
Juniper JUNOS=18.4-r1-s1
and 296 more
Improper Handling of Exceptional Conditions in Ethernet interface frame processing of Juniper Networks Junos OS allows an attacker to send specially crafted frames over the local Ethernet segment, cau...
Juniper JUNOS=16.1
Juniper JUNOS=16.1-r1
Juniper JUNOS=16.1-r2
Juniper JUNOS=16.1-r3
Juniper JUNOS=16.1-r3-s10
Juniper JUNOS=16.1-r3-s11
and 181 more
An improper check for unusual or exceptional conditions in Juniper Networks Junos OS and Junos OS Evolved Routing Protocol Daemon (RPD) service allows an attacker to send a valid BGP FlowSpec message ...
Juniper JUNOS=17.3
Juniper JUNOS=17.3-r1-s1
Juniper JUNOS=17.3-r2
Juniper JUNOS=17.3-r2-s1
Juniper JUNOS=17.3-r2-s2
Juniper JUNOS=17.3-r2-s3
and 330 more
A session fixation vulnerability in J-Web on Junos OS may allow an attacker to use social engineering techniques to fix and hijack a J-Web administrators web session and potentially gain administrativ...
Juniper JUNOS=12.3
Juniper JUNOS=12.3-r1
Juniper JUNOS=12.3-r11
Juniper JUNOS=12.3-r12
Juniper JUNOS=12.3-r12-s13
Juniper JUNOS=12.3-r12-s14
and 233 more
A certain crafted HTTP packet can trigger an uninitialized function pointer deference vulnerability in the Packet Forwarding Engine manager (fxpc) on all EX, QFX and MX Series devices in a Virtual Cha...
Juniper JUNOS=14.1x53
Juniper JUNOS=14.1x53-d10
Juniper JUNOS=14.1x53-d15
Juniper JUNOS=14.1x53-d16
Juniper JUNOS=14.1x53-d25
Juniper JUNOS=14.1x53-d26
and 50 more
Receipt of a specific MPLS packet may cause the routing protocol daemon (RPD) process to crash and restart or may lead to remote code execution. By continuously sending specific MPLS packets, an attac...
Juniper JUNOS=12.1x46
Juniper JUNOS=12.1x46-d10
Juniper JUNOS=12.1x46-d15
Juniper JUNOS=12.1x46-d20
Juniper JUNOS=12.1x46-d25
Juniper JUNOS=12.1x46-d30
and 164 more
An issue was discovered in Embedthis GoAhead before 4.0.1 and Appweb before 7.0.2. The server mishandles some HTTP request fields associated with time, which results in a NULL pointer dereference, as ...
Embedthis Appweb<7.0.2
Embedthis GoAhead<4.0.1
Juniper JUNOS=12.1x46
Juniper JUNOS=12.1x46-d10
Juniper JUNOS=12.1x46-d15
Juniper JUNOS=12.1x46-d20
and 426 more

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2024 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203