Vulnerabilities > Juniper > Junos > 7.5
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2013-10-17 | CVE-2013-6015 | Improper Input Validation vulnerability in Juniper Junos Juniper Junos before 10.4S14, 11.4 before 11.4R5-S2, 12.1R before 12.1R3, 12.1X44 before 12.1X44-D20, and 12.1X45 before 12.1X45-D15 on SRX Series services gateways, when a plugin using TCP proxy is configured, allows remote attackers to cause a denial of service (flow daemon crash) via an unspecified sequence of TCP packets. | 4.3 |
2013-10-17 | CVE-2013-6013 | Improper Restriction of Operations Within the Bounds of A Memory Buffer vulnerability in Juniper Junos Buffer overflow in the flow daemon (flowd) in Juniper Junos 10.4 before 10.4S14, 11.4 before 11.4R7-S2, 12.1.X44 before 12.1X44-D15, 12.1X45 before 12.1X45-D10 on SRX devices, when using telnet pass-through authentication on the firewall, might allow remote attackers to execute arbitrary code via a crafted telnet message. | 6.8 |
2013-10-17 | CVE-2013-4689 | Cross-Site Request Forgery (CSRF) vulnerability in Juniper Junos J-Web in Juniper Junos before 10.4R13, 11.4 before 11.4R7, 12.1R before 12.1R6, 12.1X44 before 12.1X44-D15, 12.1x45 before 12.1X45-D10, 12.2 before 12.2R3, 12.3 before 12.3R2, and 13.1 before 13.1R3 allow remote attackers to bypass the cross-site request forgery (CSRF) protection mechanism and hijack the authentication of administrators for requests that (1) create new administrator accounts or (2) have other unspecified impacts. | 5.1 |
2007-12-15 | CVE-2007-6372 | Improper Input Validation vulnerability in Juniper Junos Unspecified vulnerability in Juniper JUNOS 7.3 through 8.4 allows remote attackers to cause a denial of service (crash) via malformed BGP packets, possibly BGP UPDATE packets that trigger session flapping. | 7.8 |
2006-07-12 | CVE-2006-3529 | Remote Denial of Service vulnerability in Juniper Networks JUNOS IPv6 Packet Processing Memory leak in Juniper JUNOS 6.4 through 8.0, built before May 10, 2006, allows remote attackers to cause a denial of service (kernel packet memory consumption and crash) via crafted IPv6 packets whose buffers are not released after they are processed. | 5.0 |