Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%
Vulnerability List
Found 899 results
CVE IDTitleVendorProductSeverityCVSS ScorePublished AtAI Analysis
CVE-2024-39522 Junos OS Evolved: CLI parameter processing issue allows privilege escalation Juniper NetworksJunos OS Evolved High 7.8 2024-07-11 15:58:26 Deep Dive
CVE-2024-39521 Junos OS Evolved: CLI parameter processing issue allows privilege escalation Juniper NetworksJunos OS Evolved High 7.8 2024-07-11 15:57:44 Deep Dive
CVE-2024-39520 Junos OS Evolved: CLI parameter processing issue allows privilege escalation Juniper NetworksJunos OS Evolved High 7.8 2024-07-11 15:56:54 Deep Dive
CVE-2024-39519 Junos OS Evolved: ACX 7000 Series: Multicast traffic is looped in a multihoming EVPN MPLS scenario Juniper NetworksJunos OS Evolved Medium 6.5 2024-07-11 15:55:37 Deep Dive
CVE-2024-39518 Junos OS: MX240, MX480, MX960 platforms using MPC10E: Memory leak will be observed when subscribed to a specific subscription on Junos Telemetry Interface Juniper NetworksJunos OS High 7.5 2024-07-10 23:08:00 Deep Dive
CVE-2024-39517 Junos OS and Junos OS Evolved: Upon processing specific L2 traffic, rpd can hang in devices with EVPN/VXLAN configured Juniper NetworksJunos OS Medium 6.5 2024-07-10 23:06:40 Deep Dive
CVE-2024-39514 Junos OS and Junos OS Evolved: Receiving specific traffic on devices with EVPN-VPWS with IGMP-snooping enabled will cause the rpd to crash Juniper NetworksJunos OS Medium 6.5 2024-07-10 23:05:27 Deep Dive
CVE-2024-39513 Junos OS Evolved: Execution of a specific CLI command will cause a crash in the AFT manager Juniper NetworksJunos OS Evolved Medium 5.5 2024-07-10 23:03:46 Deep Dive
CVE-2024-39512 Junos OS Evolved: User is not logged out when the console cable is disconnected Juniper NetworksJunos OS Evolved Medium 6.6 2024-07-10 23:02:05 Deep Dive
CVE-2024-39511 Junos OS: The 802.1X Authentication Daemon crashes on running a specific command Juniper NetworksJunos OS Medium 5.5 2024-07-10 22:58:06 Deep Dive
CVE-2024-39565 Junos OS: J-Web: An unauthenticated, network-based attacker can perform XPATH injection attack against a device. Juniper Networks, Inc.Junos OS High 8.8 2024-07-10 22:55:28 Deep Dive
CVE-2024-39562 Junos OS Evolved: A high rate of SSH connections causes a Denial of Service Juniper NetworksJunos OS Evolved High 7.5 2024-07-10 22:47:23 Deep Dive
CVE-2024-39561 Junos OS: SRX4600, SRX5000 Series: TCP packets with SYN/FIN or SYN/RST are transferred after enabling no-syn-check with Express Path Juniper NetworksJunos OS Medium 5.8 2024-07-10 22:46:34 Deep Dive
CVE-2024-39560 Junos OS and Junos OS Evolved: Memory leak due to RSVP neighbor persistent error leading to kernel crash Juniper NetworksJunos OS Medium 6.5 2024-07-10 22:44:56 Deep Dive
CVE-2024-39559 Junos OS Evolved: Receipt of a specific TCP packet may result in a system crash (vmcore) on dual RE systems with NSR enabled Juniper NetworksJunos OS Evolved Medium 5.9 2024-07-10 22:42:03 Deep Dive
CVE-2024-39558 Junos OS and Junos OS Evolved: Receipt of specific PIM packet causes rpd crash when PIM is configured along with MoFRR Juniper NetworksJunos OS Medium 6.5 2024-07-10 22:40:44 Deep Dive
CVE-2024-39557 Junos OS Evolved: MAC table changes cause a memory leak Juniper NetworksJunos OS Evolved Medium 6.5 2024-07-10 22:39:49 Deep Dive
CVE-2024-39556 Junos OS and Junos OS Evolved: Loading a malicious certificate from the CLI may result in a stack-based overflow Juniper NetworksJunos OS Medium 6.4 2024-07-10 22:38:45 Deep Dive
CVE-2024-39555 Junos OS and Junos OS Evolved: Receipt of a specific malformed BGP update causes the session to reset Juniper NetworksJunos OS High 7.5 2024-07-10 22:36:49 Deep Dive
CVE-2024-39554 Junos OS and Junos OS Evolved: BGP multipath incremental calculation is resulting in an rpd crash Juniper NetworksJunos OS Medium 5.9 2024-07-10 22:32:34 Deep Dive