Vulnerabilities > Juniper

DATE CVE VULNERABILITY TITLE RISK
2023-07-14 CVE-2023-36831 Improper Check or Handling of Exceptional Conditions vulnerability in Juniper Junos 22.2/22.3/22.4
An Improper Check or Handling of Exceptional Conditions vulnerability in the UTM (Unified Threat Management) Web-Filtering feature of Juniper Networks Junos OS on SRX Series causes a jbuf memory leak to occur when accessing certain websites, eventually leading to a Denial of Service (DoS) condition.
network
low complexity
juniper CWE-703
7.5
2023-06-21 CVE-2023-0026 Improper Input Validation vulnerability in Juniper Junos
An Improper Input Validation vulnerability in the Routing Protocol Daemon (rpd) of Juniper Networks Junos OS and Junos OS Evolved allows an unauthenticated, network-based attacker to cause a Denial of Service (DoS).
network
low complexity
juniper CWE-20
7.5
2023-04-17 CVE-2023-28976 Improper Check for Unusual or Exceptional Conditions vulnerability in Juniper Junos
An Improper Check for Unusual or Exceptional Conditions vulnerability in the packet forwarding engine (pfe) of Juniper Networks Junos OS on MX Series allows an unauthenticated, network-based attacker to cause a Denial of Service (DoS).
network
low complexity
juniper CWE-754
7.5
2023-04-17 CVE-2023-28978 Insecure Default Initialization of Resource vulnerability in Juniper Junos OS Evolved
An Insecure Default Initialization of Resource vulnerability in Juniper Networks Junos OS Evolved allows an unauthenticated, network based attacker to read certain confidential information.
network
low complexity
juniper CWE-1188
5.3
2023-04-17 CVE-2023-28979 Improper Check for Unusual or Exceptional Conditions vulnerability in Juniper Junos
An Improper Check for Unusual or Exceptional Conditions vulnerability in the kernel of Juniper Networks Junos OS allows an adjacent unauthenticated attacker to bypass an integrity check.
low complexity
juniper CWE-754
4.7
2023-04-17 CVE-2023-28980 Use After Free vulnerability in Juniper Junos and Junos OS Evolved
A Use After Free vulnerability in the routing protocol daemon of Juniper Networks Junos OS and Junos OS Evolved allows a locally authenticated attacker with low privileges to cause Denial of Service (DoS).
local
low complexity
juniper CWE-416
5.5
2023-04-17 CVE-2023-28981 Improper Input Validation vulnerability in Juniper Junos
An Improper Input Validation vulnerability in the kernel of Juniper Networks Junos OS and Junos OS Evolved allows an unauthenticated, adjacent attacker to cause a Denial of Service (DoS).
low complexity
juniper CWE-20
6.5
2023-04-17 CVE-2023-28982 Memory Leak vulnerability in Juniper Junos and Junos OS Evolved
A Missing Release of Memory after Effective Lifetime vulnerability in the routing protocol daemon of Juniper Networks Junos OS and Junos OS Evolved allows an unauthenticated, network based attacker to cause a Denial of Service (DoS).
network
low complexity
juniper CWE-401
7.5
2023-04-17 CVE-2023-28983 OS Command Injection vulnerability in Juniper Junos OS Evolved 21.4
An OS Command Injection vulnerability in gRPC Network Operations Interface (gNOI) server module of Juniper Networks Junos OS Evolved allows an authenticated, low privileged, network based attacker to inject shell commands and execute code.
network
low complexity
juniper CWE-78
8.8
2023-04-17 CVE-2023-28984 Use After Free vulnerability in Juniper Junos
A Use After Free vulnerability in the Layer 2 Address Learning Manager (l2alm) of Juniper Networks Junos OS on QFX Series allows an adjacent attacker to cause the Packet Forwarding Engine to crash and restart, leading to a Denial of Service (DoS).
high complexity
juniper CWE-416
5.3