Filter
AND
AND

Juniper JunosJunos OS: SRX Series and EX Series: Security Vulnerability in J-web allows a preAuth Remote Code Execution

EPSS
0.26%
First published (updated )

Juniper JunosJunos OS: SRX Series: If no-syn-check is enabled, traffic classified as UNKNOWN gets permitted by pre-id-default-policy

First published (updated )

Juniper JunosJunos OS: Vulnerability in J-Web may allow deserialization without authentication

First published (updated )

Juniper JunosJunos OS: Unauthenticated access vulnerability in J-Web

First published (updated )

Juniper JunosJunos OS: EX and SRX Series: A PHP vulnerability in J-Web allows an unauthenticated to control an important environment variable

First published (updated )

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Juniper JunosJunos OS: SRX Series: Traffic classification vulnerability when 'no-syn-check' is enabled

First published (updated )

Juniper JunosJunos OS: J-Web allows a locally authenticated attacker to escalate their privileges to root.

First published (updated )

Juniper JunosJunos OS: PTX1000 System, PTX10002-60C System: After upgrading, configured firewall filters may be applied on incorrect interfaces

First published (updated )

Juniper JunosJunos OS and Junos OS Evolved: An Unchecked Return Value in multiple users interfaces affects confidentiality and integrity of device operations

8.8
First published (updated )

Juniper JunosJunos OS: A XSS vulnerability allows an attacker to execute commands on a target J-Web session

8.8
First published (updated )

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Juniper JunosJunos OS: PHP file inclusion vulnerability in J-Web

8.8
First published (updated )

Juniper Networks Junos OSJunos OS and Junos OS Evolved: A malformed BGP tunnel encapsulation attribute will lead to an rpd crash

8.7
First published (updated )

Juniper JunosJunos OS and Junos OS Evolved: A malformed BGP tunnel encapsulation attribute will lead to an rpd crash

8.7
EPSS
0.04%
First published (updated )

Juniper JunosJunos OS and Junos OS Evolved: A specific EVPN type-5 route causes rpd crash

8.7
EPSS
0.04%
First published (updated )

Juniper JunosJunos OS and Junos OS Evolved: RPD crash when CoS-based forwarding (CBF) policy is configured

8.7
EPSS
0.04%
First published (updated )

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Juniper JunosJunos OS: SRX4600 Series - A high amount of specific traffic causes packet drops and an eventual PFE crash

8.7
EPSS
0.04%
First published (updated )

Juniper JunosJunos OS: An invalid certificate causes a Denial of Service in the Internet Key Exchange (IKE) process

8.7
EPSS
0.04%
First published (updated )

Juniper JunosJunos OS and Junos OS Evolved: Receipt of malformed BGP path attributes leads to a memory leak

8.7
First published (updated )

Juniper JunosJunos OS: An unauthenticated attacker with local access to the device can create a backdoor with root privileges

8.4
First published (updated )

Juniper JunosJunos OS and Junos OS Evolved: The l2ald crashes on receiving telemetry messages from a specific subscription

8.2
EPSS
0.04%
First published (updated )

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Juniper JunosJunos OS and Junos OS Evolved: BGP multipath incremental calculation is resulting in an rpd crash

8.2
First published (updated )

Juniper JunosJunos OS: Upon receipt of specific sequences of genuine packets destined to the device the kernel will crash and restart (vmcore)

7.8
First published (updated )

Juniper JunosJunos OS: A low privileged user can elevate their privileges to the ones of the highest privileged j-web user logged in

7.8
First published (updated )

Juniper JunosJunos OS: Upon receipt of specific sequences of genuine packets destined to the device the kernel will crash and restart (vmcore)

7.8
First published (updated )

Juniper JunosJunos OS: SRX and EX Series: Local privilege escalation flaw in "download" functionality

7.8
First published (updated )

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Juniper JunosJunos OS: MX Series and SRX Series: Processing of a specific SIP packet causes NAT IP allocation to fail

7.5
EPSS
0.05%
First published (updated )

Juniper JunosJunos OS: SRX Series: When "tcp-encap" is configured and specific packets are received flowd will crash

7.5
EPSS
0.05%
First published (updated )

Juniper JunosJunos OS: MX Series: In an AF scenario traffic can bypass configured lo0 firewall filters

7.5
EPSS
0.05%
First published (updated )

Juniper JunosJunos OS and Junos OS Evolved: A crafted BGP UPDATE message allows a remote attacker to de-peer (reset) BGP sessions (CVE-2023-4481)

7.5
First published (updated )

Juniper JunosJunos OS and Junos OS Evolved: RPD crash when attempting to send a very long AS PATH to a non-4-byte-AS capable BGP neighbor

7.5
First published (updated )

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2025 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203