Filter
AND
-Infinity
0

Junos OS EvolvedSRX5000 Series with SPC3, SRX4000 Series, and vSRX: When PowerMode IPsec is configured, the PFE will crash upon receipt of a malformed ESP packet

7.5
First published (updated )

Junos OS EvolvedJunos OS: SRX Series: Upon processing of a genuine packet the pkid process will crash during CMPv2 auto-re-enrollment

7.5
First published (updated )

Junos OS EvolvedJunos OS: QFX10000 Series: In IP/MPLS PHP node scenarios upon receipt of certain crafted packets multiple interfaces in LAG configurations may detach.

7.5
First published (updated )

Junos OS EvolvedJunos OS: IPv6 OAM SRv6 network-enabled devices are vulnerable to Denial of Service (DoS) due to RPD memory leak upon receipt of specific a IPv6 packet

7.5
First published (updated )

Junos OS EvolvedSRX Series: If UTM Enhanced Content Filtering and AntiVirus are enabled, and specific traffic is processed the PFE will crash

7.5
First published (updated )

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Junos OS EvolvedJunos OS: SRX Series: A flowd core will be observed when malformed GPRS traffic is processed

7.5
First published (updated )

Junos OS EvolvedJunos OS: SRX Series and MX Series: When specific valid SIP packets are received the PFE will crash

7.5
First published (updated )

Junos OS EvolvedSRX Series: If Unified Threat Management (UTM) Enhanced Content Filtering (CF) is enabled and specific traffic is processed the PFE will crash

7.5
First published (updated )

Junos OS EvolvedJunos OS: PHP file inclusion vulnerability in J-Web

8.8
First published (updated )

Junos OS EvolvedcSRX Series: Storing Passwords in a Recoverable Format and software permissions issues allows a local attacker to elevate privileges

7.8
First published (updated )

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Junos OS EvolvedJunos OS and Junos OS Evolved: A BGP session will flap upon receipt of a specific, optional transitive attribute in version 22.3R1

7.5
First published (updated )

Junos OS EvolvedJuniper Junos 13.2 before 13.2R3 and 13.3 before 13.3R1, when PIM is enabled, allows remote attacker…

7.1
First published (updated )

Junos OS EvolvedInput Validation

7.1
First published (updated )

Junos OS EvolvedJunos OS: MX Series and SRX Series: The flow processing daemon (flowd) will crash if SIP ALG is enabled and a malformed SIP packet is received

7.5
First published (updated )

Junos OS EvolvedJunos OS: SRX Series: A memory leak might be observed in IPsec VPN scenario leading to an FPC crash

7.5
First published (updated )

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Junos OS EvolvedJunos OS: QFX10K Series: An ICCP flap will be observed due to excessive specific traffic

7.5
First published (updated )

Junos OS EvolvedJunos OS: MX Series and SRX Series: The flow processing daemon (flowd) will crash when specific H.323 packets are received

7.5
First published (updated )

Junos OS EvolvedJunos OS: ACX2K Series: Receipt of a high rate of specific traffic will lead to a Denial of Service (DoS)

7.5
First published (updated )

Junos OS EvolvedJunos OS and Junos OS Evolved: RPD crash upon receipt of BGP route with invalid next-hop

7.5
First published (updated )

Junos OS EvolvedJunos OS: SRX Series and MX Series: Memory leak due to receipt of specially crafted SIP calls

7.5
First published (updated )

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Junos OS EvolvedJunos OS: Receipt of crafted TCP packets destined to the device results in MBUF leak leading to a Denial of Service (DoS)

7.5
First published (updated )

Junos OS EvolvedJunos OS: QFX10K Series: PFE crash upon receipt of specific genuine packets when sFlow is enabled

7.5
First published (updated )

Juniper JUNOSJunos OS and Junos OS Evolved: PTX10008, PTX10016: When a specific SNMP MIB is queried the FPC will crash

7.5
First published (updated )

Junos OS EvolvedJunos OS: SRX 5000 Series: Upon processing of a specific SIP packet an FPC can crash

7.5
First published (updated )

Junos OS EvolvedJunos OS: MX Series with MPC10/MPC11: When Suspicious Control Flow Detection (scfd) is enabled and an attacker is sending specific traffic, this causes a memory leak.

7.5
First published (updated )

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Junos OS EvolvedJunos OS: SRX Series: The flow processing daemon (flowd) will crash when Unified Policies are used with IPv6 and certain dynamic applications are rejected by the device

7.5
First published (updated )

Junos OS EvolvedJunos OS: MX Series and SRX Series: The flow processing daemon (flowd) will crash if the SIP ALG is enabled and specific SIP messages are processed

7.5
First published (updated )

Junos OS EvolvedJunos OS: MX Series: The Multiservices PIC Management Daemon (mspmand) will crash when an IPsec6 tunnel processes specific IPv4 packets

7.5
First published (updated )

Junos OS EvolvedJunos OS: SRX Series, and MX Series with SPC3: Specific valid TCP traffic can cause a pfe crash

8.7
First published (updated )

Junos OS EvolvedJunos OS: MX Series with SPC3 line card: Port flaps causes rtlogd memory leak leading to Denial of Service

7.1
First published (updated )

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2025 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203