Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

Vulnerability List - Page 33

Found 815 results
CVE IDTitleVendorProductSeverityCVSS ScorePublished AtAI Analysis
CVE-2020-1619 Junos OS: QFX10K Series, EX9200 Series, MX Series, PTX Series: Privilege escalation vulnerability in NG-RE. Juniper NetworksJunos OS Medium 6.0 2020-04-08 19:25:55 Deep Dive
CVE-2020-1617 Junos OS: PTX1000 and PTX10000 Series, QFX10000 Series using non-AFT architectures: A specific genuine packet inspected by sFlow will cause a reboot. Juniper NetworksJunos OS High 7.5 2020-04-08 19:25:54 Deep Dive
CVE-2020-1615 Junos OS: vMX: Default credentials supplied in vMX configuration Juniper NetworksJunos OS Critical 9.8 2020-04-08 19:25:53 Deep Dive
CVE-2020-1613 Junos OS: BGP session termination upon receipt of specific BGP FlowSpec advertisement. Juniper NetworksJunos OS High 8.6 2020-04-08 19:25:52 Deep Dive
CVE-2020-1608 Junos OS: MX Series: In BBE configurations, receipt of a specific MPLS or IPv6 packet causes a Denial of Service Juniper NetworksJunos OS High 7.5 2020-01-15 08:40:38 Deep Dive
CVE-2020-1609 Junos OS and Junos OS Evolved: A vulnerability in JDHCPD allows an attacker to send crafted IPv6 packets and arbitrarily execute commands on the target device. Juniper NetworksJunos OS High 8.8 2020-01-15 08:40:38 Deep Dive
CVE-2020-1611 Junos Space: Malicious HTTP packets sent to Junos Space allow an attacker to view all files on the device. Juniper NetworksJunos Space Medium 6.5 2020-01-15 08:40:38 Deep Dive
CVE-2020-1606 Junos OS: Path traversal vulnerability in J-Web Juniper NetworksJunos OS Medium 5.4 2020-01-15 08:40:37 Deep Dive
CVE-2020-1607 Junos OS: Cross-Site Scripting (XSS) in J-Web Juniper NetworksJunos OS High 7.5 2020-01-15 08:40:37 Deep Dive
CVE-2020-1604 Junos OS: EX4300/EX4600/QFX3500/QFX5100 Series: Stateless IP firewall filter may fail to evaluate certain packets Juniper NetworksJunos OS Medium 6.5 2020-01-15 08:40:36 Deep Dive
CVE-2020-1605 Junos OS and Junos OS Evolved: A vulnerability in JDHCPD allows an attacker to send crafted IPv4 packets and arbitrarily execute commands on the target device. Juniper NetworksJunos OS High 8.8 2020-01-15 08:40:36 Deep Dive
CVE-2020-1602 Junos OS and Junos OS Evolved: A vulnerability in JDHCPD allows an attacker to send crafted IPv4 packets may take over the code execution of the JDHCPD process. Juniper NetworksJunos OS High 7.1 2020-01-15 08:40:35 Deep Dive
CVE-2020-1603 Junos OS: Improper handling of specific IPv6 packets sent by clients eventually kernel crash (vmcore) the device. Juniper NetworksJunos OS High 8.6 2020-01-15 08:40:35 Deep Dive
CVE-2020-1600 Junos OS: A specific SNMP command can trigger a high CPU usage Denial of Service in the RPD daemon. Juniper NetworksJunos OS Medium 6.5 2020-01-15 08:40:34 Deep Dive
CVE-2020-1601 Junos OS: Upon receipt of certain types of malformed PCEP packets the pccd process may crash. Juniper NetworksJunos OS Medium 5.3 2020-01-15 08:40:34 Deep Dive
CVE-2019-0059 Junos OS: The routing protocol process (rpd) may crash and generate core files upon receipt of specific valid BGP states from a peered host. Juniper NetworksJunos OS High 7.5 2019-10-09 19:26:18 Deep Dive
CVE-2019-0060 Junos OS: SRX Series: flowd process crash due to processing of specific transit IP packets Juniper NetworksJunos OS High 7.5 2019-10-09 19:26:18 Deep Dive
CVE-2019-0061 Junos OS: Insecure management daemon (MGD) configuration may allow local privilege escalation Juniper NetworksJunos OS High 7.8 2019-10-09 19:26:18 Deep Dive
CVE-2019-0062 Junos OS: Session fixation vulnerability in J-Web Juniper NetworksJunos OS High 7.5 2019-10-09 19:26:18 Deep Dive
CVE-2019-0063 Junos OS: MX Series: jdhcpd crash when receiving a specific crafted DHCP response message Juniper NetworksJunos OS Medium 6.5 2019-10-09 19:26:18 Deep Dive