| CVE ID | Title | Vendor | Product | Severity | CVSS Score | Published At | AI Analysis |
|---|---|---|---|---|---|---|---|
| CVE-2020-1687 | Junos OS: EX4300-MP/EX4600/QFX5K Series: High CPU load due to receipt of specific layer 2 frames in EVPN-VXLAN deployment. | Juniper Networks | Junos OS | Medium | 6.5 | 2020-10-16 20:31:38 | Deep Dive |
| CVE-2020-1688 | Junos OS: SRX and NFX Series: Insufficient Web API private key protection | Juniper Networks | Junos OS | Medium | 6.5 | 2020-10-16 20:31:38 | Deep Dive |
| CVE-2020-1685 | Junos OS: EX4600, QFX5K Series: Stateless firewall filter matching 'user-vlan-id' will cause incomplete discard action | Juniper Networks | Junos OS | Medium | 5.8 | 2020-10-16 20:31:37 | Deep Dive |
| CVE-2020-1686 | Junos OS: Kernel crash (vmcore) upon receipt of a malformed IPv6 packet. | Juniper Networks | Junos OS | High | 7.5 | 2020-10-16 20:31:37 | Deep Dive |
| CVE-2020-1683 | Junos OS: Memory leak leads to kernel crash (vmcore) due to SNMP polling | Juniper Networks | Junos OS | High | 7.5 | 2020-10-16 20:31:36 | Deep Dive |
| CVE-2020-1684 | Junos OS: SRX Series: High CPU load due to processing for HTTP traffic when Application Identification is enabled. | Juniper Networks | Junos OS | High | 7.5 | 2020-10-16 20:31:36 | Deep Dive |
| CVE-2020-1680 | Junos OS: MX Series: MS-MPC/MIC might crash when processing malformed IPv6 packet in NAT64 configuration. | Juniper Networks | Junos OS | Medium | 5.3 | 2020-10-16 20:31:35 | Deep Dive |
| CVE-2020-1681 | Junos OS Evolved: Receipt of a specifically malformed NDP packet could lead to Denial of Service | Juniper Networks | Junos OS Evolved | Medium | 6.5 | 2020-10-16 20:31:35 | Deep Dive |
| CVE-2020-1682 | Junos OS: SRX1500, vSRX, SRX4K, NFX150, NFX250: Denial of service vulnerability executing local CLI command | Juniper Networks | Junos OS | Medium | 5.5 | 2020-10-16 20:31:35 | Deep Dive |
| CVE-2020-1678 | Junos OS and Junos OS Evolved: RPD can crash due to a slow memory leak. | Juniper Networks | Junos OS | Medium | 6.5 | 2020-10-16 20:31:34 | Deep Dive |
| CVE-2020-1679 | Junos OS: PTX/QFX Series: Kernel Routing Table (KRT) queue stuck after packet sampling a malformed packet when the tunnel-observation mpls-over-udp configuration is enabled. | Juniper Networks | Junos OS | High | 7.5 | 2020-10-16 20:31:34 | Deep Dive |
| CVE-2020-1672 | Junos OS: jdhcpd process crash when processing a specific DHCPDv6 packet in DHCPv6 relay configuration. | Juniper Networks | Junos OS | High | 7.5 | 2020-10-16 20:31:31 | Deep Dive |
| CVE-2020-1673 | Junos OS: Reflected Cross-site Scripting vulnerability in J-Web and web based (HTTP/HTTPS) services | Juniper Networks | Junos OS | High | 8.8 | 2020-10-16 20:31:31 | Deep Dive |
| CVE-2020-1669 | Junos OS: NFX350: Password hashes stored in world-readable format | Juniper Networks | Junos OS | Medium | 6.3 | 2020-10-16 20:31:30 | Deep Dive |
| CVE-2020-1670 | Junos OS: EX4300 Series: High CPU load due to receipt of specific IPv4 packets | Juniper Networks | Junos OS | Medium | 6.5 | 2020-10-16 20:31:30 | Deep Dive |
| CVE-2020-1671 | Junos OS: Receipt of malformed DHCPv6 packets causes jdhcpd to crash. | Juniper Networks | Junos OS | High | 7.5 | 2020-10-16 20:31:30 | Deep Dive |
| CVE-2020-1667 | Junos OS: MX Series: Services card might restart due to a race condition when DNS filtering is enabled. | Juniper Networks | Junos OS | High | 8.3 | 2020-10-16 20:31:29 | Deep Dive |
| CVE-2020-1668 | Junos OS: EX2300 Series: High CPU load due to receipt of specific multicast packets on layer 2 interface | Juniper Networks | Junos OS | Medium | 6.5 | 2020-10-16 20:31:29 | Deep Dive |
| CVE-2020-1665 | Junos OS: MX series/EX9200 Series: IPv6 DDoS protection does not work as expected. | Juniper Networks | Junos OS | Medium | 5.3 | 2020-10-16 20:31:28 | Deep Dive |
| CVE-2020-1666 | Junos OS Evolved: 'console log-out-on-disconnect' fails to terminate session on console cable disconnection | Juniper Networks | Junos OS Evolved | Medium | 6.6 | 2020-10-16 20:31:28 | Deep Dive |