| CVE ID | Title | Vendor | Product | Severity | CVSS Score | Published At | AI Analysis |
|---|---|---|---|---|---|---|---|
| CVE-2020-1640 | Junos OS: Receipt of certain genuine BGP packets from any BGP Speaker causes RPD to crash. | Juniper Networks | Junos OS | High | 7.5 | 2020-07-17 18:40:39 | Deep Dive |
| CVE-2020-1631 | Out of Cycle Security Advisory: Junos OS: Security vulnerability in J-Web and web based (HTTP/HTTPS) services | Juniper Networks | Junos OS | High | 8.8 | 2020-05-04 09:25:12 | Deep Dive |
| CVE-2020-1632 | Junos OS and Junos OS Evolved: Invalid BGP UPDATE sent to peer device may cause BGP session to terminate. | Juniper Networks | Junos OS | High | 8.6 | 2020-04-15 20:20:21 | Deep Dive |
| CVE-2020-1633 | Junos OS: MX Series: Crafted packets traversing a Broadband Network Gateway (BNG) configured with IPv6 NDP proxy could lead to Denial of Service | Juniper Networks | Junos OS | High | 7.4 | 2020-04-09 23:09:16 | Deep Dive |
| CVE-2020-1638 | Junos OS & Junos OS Evolved: A specific IPv4 packet can lead to FPC restart. | Juniper Networks | Junos OS | High | 7.5 | 2020-04-08 19:26:02 | Deep Dive |
| CVE-2020-1639 | Junos OS: A crafted Ethernet OAM packet received by Junos may cause the Ethernet OAM connectivity fault management process (CFM) to core. | Juniper Networks | Junos OS | High | 7.5 | 2020-04-08 19:26:02 | Deep Dive |
| CVE-2020-1634 | Junos OS: High-End SRX Series: Multicast traffic might cause all FPCs to reset. | Juniper Networks | Junos OS | High | 7.5 | 2020-04-08 19:26:01 | Deep Dive |
| CVE-2020-1637 | Junos OS: SRX Series: Unified Access Control (UAC) bypass vulnerability | Juniper Networks | Junos OS | High | 7.2 | 2020-04-08 19:26:01 | Deep Dive |
| CVE-2020-1629 | Junos OS: A race condition vulnerability may cause RPD daemon to crash when processing a BGP NOTIFICATION message. | Juniper Networks | Junos OS | Medium | 5.9 | 2020-04-08 19:26:00 | Deep Dive |
| CVE-2020-1630 | Junos OS: Privilege escalation vulnerability in dual REs, VC or HA cluster may allow unauthorized configuration change. | Juniper Networks | Junos OS | Medium | 5.0 | 2020-04-08 19:26:00 | Deep Dive |
| CVE-2020-1627 | Junos OS: vMX and MX150: Denial of Service vulnerability in packet processing | Juniper Networks | Junos OS | High | 7.5 | 2020-04-08 19:25:59 | Deep Dive |
| CVE-2020-1628 | Junos OS: EX4300: Traffic from the network internal to the device (128.0.0.0) may be forwarded to egress interfaces | Juniper Networks | Junos OS | Medium | 5.3 | 2020-04-08 19:25:59 | Deep Dive |
| CVE-2020-1624 | Junos OS Evolved: objmon logs may leak sensitive information | Juniper Networks | Junos OS Evolved | Medium | 5.5 | 2020-04-08 19:25:58 | Deep Dive |
| CVE-2020-1625 | Junos OS: Kernel memory leak in virtual-memory due to interface flaps | Juniper Networks | Junos OS | Medium | 6.5 | 2020-04-08 19:25:58 | Deep Dive |
| CVE-2020-1626 | Junos OS Evolved: Denial of Service vulnerability in processing high rate of specific packets | Juniper Networks | Junos OS Evolved | High | 7.5 | 2020-04-08 19:25:58 | Deep Dive |
| CVE-2020-1622 | Junos OS Evolved: EvoSharedObjStore may leak sensitive information | Juniper Networks | Junos OS Evolved | Medium | 5.5 | 2020-04-08 19:25:57 | Deep Dive |
| CVE-2020-1623 | Junos OS Evolved: ev.ops file may leak sensitive information | Juniper Networks | Junos OS Evolved | Medium | 5.5 | 2020-04-08 19:25:57 | Deep Dive |
| CVE-2020-1620 | Junos OS Evolved: Configd leaks hashes via log file and is world readable | Juniper Networks | Junos OS Evolved | Medium | 5.5 | 2020-04-08 19:25:56 | Deep Dive |
| CVE-2020-1621 | Junos OS Evolved: Configd leaks hashes via stream and is world readable | Juniper Networks | Junos OS Evolved | Medium | 5.5 | 2020-04-08 19:25:56 | Deep Dive |
| CVE-2020-1618 | Junos OS: EX and QFX Series: Console port authentication bypass vulnerability | Juniper Networks | Junos OS | Medium | 6.3 | 2020-04-08 19:25:55 | Deep Dive |