Vulnerabilities > Juniper > High
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2022-01-19 | CVE-2022-22177 | Unspecified vulnerability in Juniper Junos 12.3/15.1/18.3 A release of illegal memory vulnerability in the snmpd daemon of Juniper Networks Junos OS, Junos OS Evolved allows an attacker to halt the snmpd daemon causing a sustained Denial of Service (DoS) to the service until it is manually restarted. | 7.5 |
2022-01-19 | CVE-2022-22178 | Unspecified vulnerability in Juniper Junos A Stack-based Buffer Overflow vulnerability in the flow processing daemon (flowd) of Juniper Networks Junos OS on MX Series and SRX series allows an unauthenticated networked attacker to cause a flowd crash and thereby a Denial of Service (DoS). | 7.5 |
2022-01-19 | CVE-2022-22180 | Unspecified vulnerability in Juniper Junos An Improper Check for Unusual or Exceptional Conditions vulnerability in the processing of specific IPv6 packets on certain EX Series devices may lead to exhaustion of DMA memory causing a Denial of Service (DoS). | 7.5 |
2021-10-19 | CVE-2021-31350 | Improper Privilege Management vulnerability in Juniper Junos and Junos OS Evolved An Improper Privilege Management vulnerability in the gRPC framework, used by the Juniper Extension Toolkit (JET) API on Juniper Networks Junos OS and Junos OS Evolved, allows a network-based, low-privileged authenticated attacker to perform operations as root, leading to complete compromise of the targeted system. | 8.8 |
2021-10-19 | CVE-2021-31354 | Out-of-bounds Read vulnerability in Juniper Junos and Junos OS Evolved An Out Of Bounds (OOB) access vulnerability in the handling of responses by a Juniper Agile License (JAL) Client in Juniper Networks Junos OS and Junos OS Evolved, configured in Network Mode (to use Juniper Agile License Manager) may allow an attacker to cause a partial Denial of Service (DoS), or lead to remote code execution (RCE). | 8.8 |
2021-10-19 | CVE-2021-31357 | OS Command Injection vulnerability in Juniper Junos OS Evolved A command injection vulnerability in tcpdump command processing on Juniper Networks Junos OS Evolved allows an attacker with authenticated CLI access to be able to bypass configured access protections to execute arbitrary shell commands within the context of the current user. | 7.8 |
2021-10-19 | CVE-2021-31378 | Missing Release of Resource after Effective Lifetime vulnerability in Juniper Junos In broadband environments, including but not limited to Enhanced Subscriber Management, (CHAP, PPP, DHCP, etc.), on Juniper Networks Junos OS devices where RADIUS servers are configured for managing subscriber access and a subscriber is logged in and then requests to logout, the subscriber may be forced into a "Terminating" state by an attacker who is able to send spoofed messages appearing to originate from trusted RADIUS server(s) destined to the device in response to the subscriber's request. | 7.5 |
2021-09-20 | CVE-2021-39531 | Out-of-bounds Write vulnerability in Juniper Libslax An issue was discovered in libslax through v0.22.1. | 8.8 |
2021-09-20 | CVE-2021-39533 | Out-of-bounds Write vulnerability in Juniper Libslax An issue was discovered in libslax through v0.22.1. | 8.8 |
2021-09-20 | CVE-2021-39534 | Out-of-bounds Write vulnerability in Juniper Libslax An issue was discovered in libslax through v0.22.1. | 8.8 |