| CVE ID | Title | Vendor | Product | Severity | CVSS Score | Published At | AI Analysis |
|---|---|---|---|---|---|---|---|
| CVE-2020-1679 | Junos OS: PTX/QFX Series: Kernel Routing Table (KRT) queue stuck after packet sampling a malformed packet when the tunnel-observation mpls-over-udp configuration is enabled. | Juniper Networks | Junos OS | High | 7.5 | 2020-10-16 20:31:34 | Deep Dive |
| CVE-2020-1676 | Juniper Networks Mist Cloud UI: SAML authentication response handling vulnerability. | Juniper Networks | MIST Cloud UI | High | 7.2 | 2020-10-16 20:31:33 | Deep Dive |
| CVE-2020-1677 | Juniper Networks Mist Cloud UI: SAML authentication attribute elements handling vulnerability. | Juniper Networks | MIST Cloud UI | High | 7.2 | 2020-10-16 20:31:33 | Deep Dive |
| CVE-2020-1675 | Juniper Networks Mist Cloud UI: SAML authentication certificate vulnerability. | Juniper Networks | MIST Cloud UI | High | 8.3 | 2020-10-16 20:31:32 | Deep Dive |
| CVE-2020-1672 | Junos OS: jdhcpd process crash when processing a specific DHCPDv6 packet in DHCPv6 relay configuration. | Juniper Networks | Junos OS | High | 7.5 | 2020-10-16 20:31:31 | Deep Dive |
| CVE-2020-1673 | Junos OS: Reflected Cross-site Scripting vulnerability in J-Web and web based (HTTP/HTTPS) services | Juniper Networks | Junos OS | High | 8.8 | 2020-10-16 20:31:31 | Deep Dive |
| CVE-2020-1669 | Junos OS: NFX350: Password hashes stored in world-readable format | Juniper Networks | Junos OS | Medium | 6.3 | 2020-10-16 20:31:30 | Deep Dive |
| CVE-2020-1670 | Junos OS: EX4300 Series: High CPU load due to receipt of specific IPv4 packets | Juniper Networks | Junos OS | Medium | 6.5 | 2020-10-16 20:31:30 | Deep Dive |
| CVE-2020-1671 | Junos OS: Receipt of malformed DHCPv6 packets causes jdhcpd to crash. | Juniper Networks | Junos OS | High | 7.5 | 2020-10-16 20:31:30 | Deep Dive |
| CVE-2020-1667 | Junos OS: MX Series: Services card might restart due to a race condition when DNS filtering is enabled. | Juniper Networks | Junos OS | High | 8.3 | 2020-10-16 20:31:29 | Deep Dive |
| CVE-2020-1668 | Junos OS: EX2300 Series: High CPU load due to receipt of specific multicast packets on layer 2 interface | Juniper Networks | Junos OS | Medium | 6.5 | 2020-10-16 20:31:29 | Deep Dive |
| CVE-2020-1665 | Junos OS: MX series/EX9200 Series: IPv6 DDoS protection does not work as expected. | Juniper Networks | Junos OS | Medium | 5.3 | 2020-10-16 20:31:28 | Deep Dive |
| CVE-2020-1666 | Junos OS Evolved: 'console log-out-on-disconnect' fails to terminate session on console cable disconnection | Juniper Networks | Junos OS Evolved | Medium | 6.6 | 2020-10-16 20:31:28 | Deep Dive |
| CVE-2020-1662 | Junos OS and Junos OS Evolved: RPD crash due to BGP session flapping. | Juniper Networks | Junos OS | High | 7.5 | 2020-10-16 20:31:27 | Deep Dive |
| CVE-2020-1664 | Junos OS: Buffer overflow vulnerability in device control daemon | Juniper Networks | Junos OS | High | 7.8 | 2020-10-16 20:31:27 | Deep Dive |
| CVE-2020-1657 | Junos OS: SRX Series: An attacker sending spoofed packets to IPSec peers may cause a Denial of Service. | Juniper Networks | Junos OS | High | 7.5 | 2020-10-16 20:31:26 | Deep Dive |
| CVE-2020-1660 | Junos OS: MX Series: Receipt of specific packets can cause services card to restart when DNS filtering is configured. | Juniper Networks | Junos OS | High | 8.3 | 2020-10-16 20:31:26 | Deep Dive |
| CVE-2020-1661 | Junos OS: jdhcpd process crash when forwarding a malformed DHCP packet. | Juniper Networks | Junos OS | Medium | 5.3 | 2020-10-16 20:31:26 | Deep Dive |
| CVE-2020-1656 | Junos OS: When a DHCPv6 Relay-Agent is configured upon receipt of a specific DHCPv6 client message, Remote Code Execution may occur. | Juniper Networks | Junos OS | High | 8.8 | 2020-10-16 20:31:25 | Deep Dive |
| CVE-2020-1655 | Junos OS: MX Series: PFE crash on MPC7/8/9 upon receipt of large packets requiring fragmentation | Juniper Networks | Junos OS | Medium | 5.3 | 2020-07-17 18:40:46 | Deep Dive |