Filter
AND

Versions

18.4-r1
99
18.3-r1
98
18.3-r1-s1
98
18.3
96
18.4
96
19.1-r1
95
18.3-r1-s2
94
18.4-r1-s2
93
19.1-r1-s1
93
18.3-r1-s3
92
19.2-r1
92
19.1-r1-s2
90
19.2-r1-s1
90
19.4-r1
88
17.4-r1
87
19.2-r1-s2
87
17.4
86
19.3-r1
86
19.3-r1-s1
86
18.4-r1-s1
85
19.4-r1-s1
85
18.4-r2
84
19.1
84
19.1-r1-s3
84
18.3-r2
83
18.2
82
19.2
82
19.3
82
19.3-r2
82
18.1
80
18.4-r2-s1
80
19.3-r2-s1
80
19.4-r1-s2
79
18.1-r2
78
18.4-r2-s2
78
19.2-r1-s3
78
20.4-r1
78
15.1x49-d10
77
17.4-r1-s1
77
17.4-r1-s2
77
17.4-r2
77
18.3-r1-s5
77
19.3-r2-s2
77
17.3
76
17.3-r2
76
18.3-r2-s1
76
17.4-r1-s4
75
18.3-r2-s2
75
20.2-r1
75
20.4-r1-s1
75
18.1-r2-s1
74
18.1-r2-s2
74
19.4-r2
74
18.2-r2-s1
73
18.4-r1-s5
73
18.4-r2-s3
73
19.2-r1-s4
73
18.2-r1-s5
72
19.1-r1-s4
72
21.1-r1
72
17.4-r1-s6
71
17.4-r2-s1
71
18.1-r3
71
19.1-r2
71
17.3-r2-s1
70
17.3-r2-s2
70
18.2-r2-s2
70
18.3-r1-s6
70
19.4-r2-s1
70
15.1x49-d20
69
17.4-r2-s4
69
19.3-r2-s3
69
20.2-r1-s1
69
15.1x49-d30
68
17.4-r1-s7
68
17.4-r2-s3
68
18.2-r2-s3
68
15.1x49-d35
67
18.1-r3-s2
67
18.4-r1-s6
67
20.1-r1
67
20.4-r2
67
21.2-r1
67
18.1-r2-s4
66
18.2-r2-s4
66
18.3-r3
66
18.4-r2-s4
66
20.2-r1-s2
66
18.1-r3-s3
65
18.3-r2-s3
65
20.1-r1-s1
65
20.2-r1-s3
65
18.1-r3-s4
64
20.3-r1
64
12.3x48-d10
63
15.1
63
17.4-r2-s5
63
18.2-r1
63
18.4-r1-s4
63
19.1-r2-s1
63
21.1-r1-s1
63
17.3-r3-s1
62
17.3-r3-s2
62
17.3-r3-s3
62
18.4-r1-s3
62
20.4-r2-s1
62
12.1x46
60
12.3x48-d15
60
15.1-r1
60
15.1x49-d40
60
15.1x49-d50
60
19.3-r2-s4
60
20.1-r1-s2
60
20.2-r2
60
15.1-f2
59
17.3-r3-s4
59
17.4-r2-s6
59
18.2-r1-s3
59
18.4-r3
59
21.2-r1-s1
59
17.4-r2-s2
58
18.1-r3-s6
58
18.1-r3-s7
58
18.3-r3-s1
58
19.4-r2-s2
58
20.3-r1-s1
58
17.4-r2-s7
57
18.1-r1
57
18.2-r3
57
20.1-r1-s3
57
20.2-r2-s1
57
21.2
57
15.1-r2
56
15.1x49
56
15.1x49-d45
56
15.1x49-d60
56
18.2-r3-s1
56
19.1-r3
56
19.4-r3
56
20.2-r2-s2
56
21.1-r2
56
15.1-r3
55
15.1x49-d55
55
20.4-r2-s2
55
15.1-f3
54
15.1-f4
54
15.1x49-d65
54
15.1x49-d75
54
18.2-r1-s4
54
18.3-r1-s4
54
19.1-r1-s5
54
19.1-r3-s1
54
15.1x49-d70
53
15.1x49-d80
53
17.4-r1-s5
53
18.1-r3-s1
53
18.4-r3-s1
53
21.2-r1-s2
53
12.3
52
12.3x48-d25
52
15.1-f1
52
17.3-r3
52
18.2-r2
52
18.2-r2-s5
52
20.2-r2-s3
52
21.3-r1
52
15.1-f6
51
16.1-r1
51
17.3-r1-s1
51
17.4-r2-s8
51
18.2-r3-s2
51
19.3-r2-s5
51
20.4
51
18.4-r1-s7
50
19.2-r1-s5
50
19.4-r1-s3
50
19.4-r2-s3
50
20.1-r1-s4
50
20.3-r2
50
21.2-r2
50
15.1-f5
49
15.1-r4
49
18.1-r3-s8
49
18.4-r3-s2
49
21.1
49
21.1-r2-s1
49
21.4-r1
49
15.1x49-d90
48
19.2-r3
48
19.3-r3
48
19.4-r3-s1
48
20.2-r3
48
20.4-r3
48
21.2-r2-s1
48
21.4-r1-s1
48
12.3x48
47
16.1-r2
47
18.4-r3-s3
47
21.3-r1-s1
47
15.1-f2-s1
46
17.3-r2-s3
46
19.2-r2
46
21.2-r2-s2
46
21.4
46
12.3-r1
45
15.1-f2-s2
45
15.1-f2-s3
45
15.1-f2-s4
45
15.1-r6
45
16.1-r3
45
17.3-r2-s4
45
19.1-r3-s2
45
21.3-r1-s2
45
12.1x46-d10
44
14.1x53
44
15.1x53-d20
44
15.1x53-d21
44
17.3-r1
44
18.2-r2-s6
44
20.3-r2-s1
44
21.1-r2-s2
44
12.1x46-d15
43
12.1x46-d20
43
12.1x46-d25
43
15.1x53-d30
43
17.4-r3
43
18.3-r3-s2
43
18.4-r2-s5
43
20.4-r3-s1
43
15.1x53-d32
42
15.1x53-d33
42
19.4-r3-s2
42
21.3
42
21.4-r1-s2
42
12.3x48-d30
41
15.1x49-d100
41
15.1x53-d34
41
16.1
41
17.1-r1
41
17.3-r3-s5
41
18.1-r3-s9
41
15.1-r5
40
15.1x49-d110
40
16.1-r4
40
16.2-r1
40
17.2
40
18.3-r2-s4
40
18.4-r2-s6
40
19.1-r3-s3
40
19.2-r2-s1
40
20.1-r2-s1
40
20.2-r3-s1
40
21.1-r3
40
21.2-r3
40
21.3-r2
40
12.1x46-d30
39
17.4-r2-s9
39
17.4-r3-s1
39
18.4-r3-s4
39
19.2-r3-s1
39
15.1-r7-s1
38
18.4-r3-s5
38
20.4-r3-s2
38
21.3-r2-s1
38
21.3-r2-s2
38
17.4-r2-s10
37
18.2-r3-s3
37
20.1-r2
37
14.1x53-d15
36
14.1x53-d25
36
14.1x53-d26
36
15.1-f7
36
15.1-r7-s2
36
15.1-r7-s3
36
16.2-r2
36
19.2-r1-s6
36
19.4-r2-s4
36
21.1-r3-s1
36
21.4-r2
36
12.1x46-d35
35
12.3-r2
35
12.3x48-d20
35
14.1
35
14.1x53-d10
35
14.1x53-d16
35
15.1x49-d120
35
18.2-r3-s4
35
18.3-r3-s3
35
19.1-r1-s6
35
12.3-r3
34
12.3-r7
34
12.3x48-d35
34
15.1-f6-s3
34
18.1-r3-s5
34
21.4-r2-s1
34
12.3-r4
33
12.3-r5
33
13.3
33
14.1-r1
33
14.1-r2
33

Juniper JUNOSJunos OS and Junos OS Evolved: Receipt of malformed BGP path attributes leads to a memory leak

8.7
First published (updated )

Juniper JUNOSJunos OS: Attempting to access specific sensors on platforms not supporting these will lead to a chassisd crash

8.7
First published (updated )

Juniper JUNOSJunos OS: SRX Series: If DNS traceoptions are configured in a DGA or tunnel detection scenario specific DNS traffic leads to a PFE crash

8.7
First published (updated )

Juniper JUNOSJunos OS: MX Series and SRX Series: Processing of a specific SIP packet causes NAT IP allocation to fail

7.5
EPSS
0.05%
First published (updated )

Juniper JUNOSJunos OS and Junos OS Evolved: A specific query via DREND causes rpd crash

7.5
EPSS
0.05%
First published (updated )

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Juniper JUNOSJunos OS and Junos OS Evolved: In a jflow scenario continuous route churn will cause a memory leak and eventually an rpd crash

7.5
EPSS
0.05%
First published (updated )

Juniper JUNOSJunos OS: SRX Series: When "tcp-encap" is configured and specific packets are received flowd will crash

7.5
EPSS
0.05%
First published (updated )

Juniper JUNOSJunos OS: MX Series: In an AF scenario traffic can bypass configured lo0 firewall filters

7.5
EPSS
0.05%
First published (updated )

Juniper JUNOSJunos OS: EX4100, EX4400, EX4600, QFX5000 Series: A high rate of specific ICMP traffic will cause the PFE to hang

7.5
EPSS
0.05%
First published (updated )

Juniper JUNOSJunos OS: MX Series: In a PTP scenario a prolonged routing protocol churn can trigger an FPC reboot

7.5
First published (updated )

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Juniper JUNOSJunos OS: SRX Series and MX Series: SIP ALG doesn't drop specifically malformed retransmitted SIP packets

7.5
First published (updated )

Juniper JUNOSJunos OS and Junos OS Evolved: An rpd crash may occur when BGP is processing newly learned routes

7.5
First published (updated )

Juniper JUNOSJunos OS: An unauthenticated attacker with local access to the device can create a backdoor with root privileges

8.4
First published (updated )

Juniper JUNOSJunos OS: QFX5000 Series: DMA memory leak is observed when specific DHCP packets are transmitted over pseudo-VTEP

7.5
First published (updated )

Juniper JUNOSJunos OS: QFX5000 Series and EX4000 Series: Denial of Service (DoS) on a large scale VLAN due to PFE hogging

7.5
First published (updated )

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Juniper JUNOSJunos OS and Junos OS Evolved: In an BGP scenario RPD crashes upon receiving and processing a specific malformed ISO VPN BGP UPDATE packet

7.5
First published (updated )

Juniper JUNOSJunos OS and Junos OS Evolved: An Unchecked Return Value in multiple users interfaces affects confidentiality and integrity of device operations

8.8
First published (updated )

Juniper JUNOSJunos OS: QFX5k: l2 loop in the overlay impacts the stability in a EVPN/VXLAN environment

7.5
First published (updated )

Juniper JUNOSJunos OS and Junos OS Evolved: Receipt of a specific genuine PIM packet causes RPD crash

7.5
First published (updated )

Juniper JUNOSJunos OS: SRX Series: The PFE will crash on receiving malformed SSL traffic when Sky ATP is enabled

7.5
First published (updated )

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Juniper JUNOSJunos OS: MX Series: Receipt of malformed TCP traffic will cause a Denial of Service

7.5
First published (updated )

Juniper JUNOSJunos OS and Junos OS Evolved: RPD crash when attempting to send a very long AS PATH to a non-4-byte-AS capable BGP neighbor

7.5
First published (updated )

Juniper JUNOSJunos OS and Junos OS Evolved: A crafted BGP UPDATE message allows a remote attacker to de-peer (reset) BGP sessions (CVE-2023-4481)

7.5
First published (updated )

Juniper JUNOSJunos OS: QFX10000 Series: All traffic will be dropped after a specific valid IP packet has been received which needs to be routed over a VXLAN tunnel

7.5
First published (updated )

Juniper JUNOSSRX Series and MX Series: An FPC core is observed when IDP is enabled on the device and a specific malformed SSL packet is received

7.5
First published (updated )

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Juniper JUNOSJunos OS: MX Series: PFE crash upon receipt of specific packet destined to an AMS interface

7.5
First published (updated )

Juniper JUNOSJunos OS: SRX Series: jbuf memory leak when SSL Proxy and UTM Web-Filtering is applied

7.5
First published (updated )

Juniper JUNOS2023-06: Out-of-Cycle Security Bulletin: Junos OS and Junos OS Evolved: A BGP session will flap upon receipt of a specific, optional transitive attribute

7.5
First published (updated )

Juniper Junos Os EvolvedJunos OS and Junos OS Evolved: An attacker sending genuine BGP packets causes an RPD crash

7.5
First published (updated )

Juniper JUNOSJunos OS and Junos OS Evolved: Malformed BGP flowspec update causes RPD crash

7.5
First published (updated )

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2025 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203