| CVE ID | Title | Vendor | Product | Severity | CVSS Score | Published At | AI Analysis |
|---|---|---|---|---|---|---|---|
| CVE-2021-0293 | Junos OS: Out-of-memory condition and crashes can occur after executing a certain CLI command repeatedly | Juniper Networks | Junos OS | Medium | 5.5 | 2021-07-15 20:01:12 | Deep Dive |
| CVE-2021-0292 | Junos OS Evolved: Memory leak in arpd or ndp processes can lead to Denial of Service (DoS) | Juniper Networks | Junos OS Evolved | Medium | 6.5 | 2021-07-15 20:01:10 | Deep Dive |
| CVE-2021-0291 | Junos OS and Junos OS Evolved: A vulnerability allows a network based unauthenticated attacker which sends a high rate of specific traffic to cause a partial Denial of Service | Juniper Networks | Junos OS | Medium | 6.5 | 2021-07-15 20:01:09 | Deep Dive |
| CVE-2021-0290 | Junos OS: MX Series, EX9200 Series, SRX4600: Ethernet interface vulnerable to specially crafted frames | Juniper Networks | Junos OS | Medium | 6.5 | 2021-07-15 20:01:07 | Deep Dive |
| CVE-2021-0289 | Junos OS: User-defined ARP Policer isn't applied on Aggregated Ethernet (AE) interface until firewall process is restarted | Juniper Networks | Junos OS | Medium | 6.5 | 2021-07-15 20:01:06 | Deep Dive |
| CVE-2021-0288 | Junos OS: MX Series, EX9200 Series: FPC may crash upon receipt of specific MPLS packet affecting Trio-based MPCs | Juniper Networks | Junos OS | Medium | 6.5 | 2021-07-15 20:01:04 | Deep Dive |
| CVE-2021-0287 | Junos OS and Junos OS Evolved: RPD could crash in SR-ISIS/MPLS environment due to a flap of an ISIS link in the network | Juniper Networks | Junos OS | Medium | 6.5 | 2021-07-15 20:01:02 | Deep Dive |
| CVE-2021-0286 | Junos OS Evolved: Specially crafted packets may cause the AFT manager process to crash and restart | Juniper Networks | Junos OS Evolved | High | 7.5 | 2021-07-15 20:01:00 | Deep Dive |
| CVE-2021-0285 | Junos OS: QFX5000 Series and EX4600 Series: Continuous traffic destined to a device configured with MC-LAG leading to nodes losing their control connection which can impact traffic | Juniper Networks | Junos OS | High | 7.5 | 2021-07-15 20:00:59 | Deep Dive |
| CVE-2021-0283 | Junos OS: Upon receipt of specific sequences of genuine packets destined to the device the kernel will crash and restart (vmcore) | Juniper Networks | Junos OS | High | 7.5 | 2021-07-15 20:00:57 | Deep Dive |
| CVE-2021-0282 | Junos OS: RPD crash while processing a specific BGP UPDATE when Multipath or add-path features are enabled | Juniper Networks | Junos OS | High | 7.5 | 2021-07-15 20:00:55 | Deep Dive |
| CVE-2021-0281 | Junos OS and Junos OS Evolved: Specific packets can trigger rpd crash when BGP Origin Validation is configured with RPKI | Juniper Networks | Junos OS | Medium | 5.9 | 2021-07-15 20:00:54 | Deep Dive |
| CVE-2021-0280 | Junos OS: PTX Series, QFX10K Series: Upon receipt of specific packets BFD sessions might flap due to DDoS policer implementation in Packet Forwarding Engine | Juniper Networks | Junos OS | High | 7.5 | 2021-07-15 20:00:52 | Deep Dive |
| CVE-2021-0279 | Contrail Cloud: Hardcoded credentials for RabbitMQ service | Juniper Networks | Contrail Cloud | High | 8.6 | 2021-07-15 20:00:51 | Deep Dive |
| CVE-2021-0278 | Junos OS: J-Web allows a locally authenticated attacker to escalate their privileges to root. | Juniper Networks | Junos OS | High | 8.8 | 2021-07-15 20:00:49 | Deep Dive |
| CVE-2021-0277 | Junos OS and Junos OS Evolved: LLDP Out-of-Bounds Read vulnerability in l2cpd | Juniper Networks | Junos OS | High | 8.8 | 2021-07-15 20:00:47 | Deep Dive |
| CVE-2021-0276 | Steel-Belted Radius Carrier Edition: Remote code execution vulnerability when EAP Authentication is configured. | Juniper Networks | SBR Carrier | Critical | 9.8 | 2021-07-15 20:00:46 | Deep Dive |
| CVE-2021-0275 | Junos OS: J-Web: Cross-site scripting attack allows an attacker to gain control of another users session. | Juniper Networks | Junos OS | High | 8.8 | 2021-04-22 19:37:29 | Deep Dive |
| CVE-2021-0272 | Junos OS: QFX10002-32Q, QFX10002-60C, QFX10002-72Q, QFX10008, QFX10016: In EVPN-VXLAN scenarios receipt of specific genuine packets by an adjacent attacker will cause a kernel memory leak in FPC. | Juniper Networks | Junos OS | Medium | 6.5 | 2021-04-22 19:37:28 | Deep Dive |
| CVE-2021-0273 | Junos OS and Junos OS Evolved: Trio Chipset: Denial of Service due to packet destined to device's interfaces. | Juniper Networks | Junos OS | Medium | 5.3 | 2021-04-22 19:37:28 | Deep Dive |