Vulnerabilities > Juniper > Junos > 15.1

DATE CVE VULNERABILITY TITLE RISK
2019-01-15 CVE-2019-0007 Use of Insufficiently Random Values vulnerability in Juniper Junos 15.1
The vMX Series software uses a predictable IP ID Sequence Number.
network
low complexity
juniper CWE-330
critical
10.0
2019-01-15 CVE-2019-0006 Use of Uninitialized Resource vulnerability in Juniper Junos 14.1X53/15.1/15.1X53
A certain crafted HTTP packet can trigger an uninitialized function pointer deference vulnerability in the Packet Forwarding Engine manager (fxpc) on all EX, QFX and MX Series devices in a Virtual Chassis configuration.
network
low complexity
juniper CWE-908
critical
9.8
2019-01-15 CVE-2019-0005 Allocation of Resources Without Limits or Throttling vulnerability in Juniper Junos
On EX2300, EX3400, EX4600, QFX3K and QFX5K series, firewall filter configuration cannot perform packet matching on any IPv6 extension headers.
network
low complexity
juniper CWE-770
5.3
2019-01-15 CVE-2019-0003 Reachable Assertion vulnerability in Juniper Junos
When a specific BGP flowspec configuration is enabled and upon receipt of a specific matching BGP packet meeting a specific term in the flowspec configuration, a reachable assertion failure occurs, causing the routing protocol daemon (rpd) process to crash with a core file being generated.
network
high complexity
juniper CWE-617
5.9
2018-10-10 CVE-2018-0062 Improper Input Validation vulnerability in Juniper Junos
A Denial of Service vulnerability in J-Web service may allow a remote unauthenticated user to cause Denial of Service which may prevent other users to authenticate or to perform J-Web operations.
network
low complexity
juniper CWE-20
7.5
2018-10-10 CVE-2018-0061 Resource Exhaustion vulnerability in Juniper Junos
A denial of service vulnerability in the telnetd service on Junos OS allows remote unauthenticated users to cause high CPU usage which may affect system performance.
network
low complexity
juniper CWE-400
5.3
2018-10-10 CVE-2018-0060 Improper Input Validation vulnerability in Juniper Junos
An improper input validation weakness in the device control daemon process (dcd) of Juniper Networks Junos OS allows an attacker to cause a Denial of Service to the dcd process and interfaces and connected clients when the Junos device is requesting an IP address for itself.
network
high complexity
juniper CWE-20
5.9
2018-10-10 CVE-2018-0058 Improper Input Validation vulnerability in Juniper Junos
Receipt of a specially crafted IPv6 exception packet may be able to trigger a kernel crash (vmcore), causing the device to reboot.
network
low complexity
juniper CWE-20
7.5
2018-10-10 CVE-2018-0057 Unspecified vulnerability in Juniper Junos
On MX Series and M120/M320 platforms configured in a Broadband Edge (BBE) environment, subscribers logging in with DHCP Option 50 to request a specific IP address will be assigned the requested IP address, even if there is a static MAC to IP address binding in the access profile.
network
low complexity
juniper
critical
9.6
2018-10-10 CVE-2018-0056 Improper Input Validation vulnerability in Juniper Junos
If a duplicate MAC address is learned by two different interfaces on an MX Series device, the MAC address learning function correctly flaps between the interfaces.
high complexity
juniper CWE-20
5.3