Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%
Vulnerability List
Found 899 results
CVE IDTitleVendorProductSeverityCVSS ScorePublished AtAI Analysis
CVE-2026-33788 Junos OS Evolved: Local, authenticated attacker can gain privileged access to FPCs Juniper NetworksJunos OS Evolved High 7.8 2026-04-09 21:27:44 Deep Dive
CVE-2026-21919 Junos OS and Junos OS Evolved: A high frequency of connecting and disconnecting NETCONF sessions causes management unavailability Juniper NetworksJunos OS Medium 6.5 2026-04-09 21:26:46 Deep Dive
CVE-2026-21915 JSI Virtual Lightweight Collector: Shell escape allows privilege escalation to root Juniper NetworksJSI LWC Medium 6.7 2026-04-09 21:26:28 Deep Dive
CVE-2026-21904 Junos Space: ilpFilter field on nLegacy.jsp is vulnerable to reflected cross-site script injection Juniper NetworksJunos Space Medium 6.1 2026-04-09 21:26:10 Deep Dive
CVE-2025-59969 Junos OS Evolved: QFX5000 Series and PTX Series: An attacker sending crafted multicast packets will cause evo-aftmand / evo-pfemand to crash and restart Juniper NetworksJunos OS Evolved Medium 6.5 2026-04-09 21:25:33 Deep Dive
CVE-2026-33793 Junos OS and Junos OS Evolved: When an unsigned Python op script configuration is present, a local low privileged user can compromise the system Juniper NetworksJunos OS High 7.8 2026-04-09 21:24:50 Deep Dive
CVE-2025-30650 Junos OS: Privileged local user can gain access to a Linux-based FPC as root Juniper NetworksJunos OS Medium 6.7 2026-04-08 17:26:36 Deep Dive
CVE-2026-21902 Junos OS Evolved: PTX Series: A vulnerability allows a unauthenticated, network-based attacker to execute code as root Juniper NetworksJunos OS Evolved Critical 9.8 2026-02-25 16:59:11 Deep Dive
CVE-2025-21589 Session Smart Router, Session Smart Conductor, WAN Assurance Router: API Authentication Bypass vulnerability Juniper NetworksSession Smart Router Critical 9.8 2026-01-27 20:32:13 Deep Dive
CVE-2026-21921 Junos OS and Junos OS Evolved: When telemetry collectors are frequently subscribing and unsubscribing to sensors chassisd or rpd will crash Juniper NetworksJunos OS Medium 6.5 2026-01-15 20:28:30 Deep Dive
CVE-2026-21920 Junos OS: SRX Series: If a specific request is processed by the DNS subsystem flowd will crash Juniper NetworksJunos OS High 7.5 2026-01-15 20:28:11 Deep Dive
CVE-2026-21918 Junos OS: SRX and MX Series: When TCP packets occur in a specific sequence flowd crashes Juniper NetworksJunos OS High 7.5 2026-01-15 20:27:55 Deep Dive
CVE-2026-21917 Junos OS: SRX Series: Specifically malformed SSL packet causes FPC crash Juniper NetworksJunos OS High 7.5 2026-01-15 20:27:11 Deep Dive
CVE-2026-21914 Junos OS: SRX Series: A specifically malformed GTP message will cause an FPC crash Juniper NetworksJunos OS High 7.5 2026-01-15 20:25:36 Deep Dive
CVE-2026-21913 Junos OS: EX4000: A high volume of traffic destined to the device leads to a crash and restart Juniper NetworksJunos OS High 7.5 2026-01-15 20:25:03 Deep Dive
CVE-2026-21912 Junos OS: MX10k Series: 'show system firmware' CLI command may lead to LC480 or LC2101 line card reset Juniper NetworksJunos OS Medium 5.5 2026-01-15 20:24:20 Deep Dive
CVE-2026-21911 Junos OS Evolved: Flapping management interface causes MAC learning on label-switched interfaces to stop Juniper NetworksJunos OS Evolved Medium 6.5 2026-01-15 20:23:55 Deep Dive
CVE-2026-21910 Junos OS: EX4k Series, QFX5k Series: In an EVPN-VXLAN configuration link flaps cause Inter-VNI traffic drop Juniper NetworksJunos OS Medium 6.5 2026-01-15 20:23:30 Deep Dive
CVE-2026-21909 Junos OS and Junos OS Evolved: Receipt of specific IS-IS update packet causes memory leak leading to RPD crash Juniper NetworksJunos OS Medium 6.5 2026-01-15 20:22:45 Deep Dive
CVE-2026-21908 Junos OS and Junos OS Evolved: Use after free vulnerability In 802.1X authentication daemon can cause crash of the dot1xd process Juniper NetworksJunos OS High 7.1 2026-01-15 20:21:42 Deep Dive