| CVE ID | Title | Vendor | Product | Severity | CVSS Score | Published At | AI Analysis |
|---|---|---|---|---|---|---|---|
| CVE-2019-0043 | Junos OS: RPD process crashes upon receipt of a specific SNMP packet | Juniper Networks | Junos OS | 高危 | - | 2019-04-10 20:13:52 | Deep Dive |
| CVE-2019-0044 | Junos OS: SRX5000 series: Kernel crash (vmcore) upon receipt of a specific packet on fxp0 interface | Juniper Networks | Junos OS | 高危 | - | 2019-04-10 20:13:52 | Deep Dive |
| CVE-2019-0008 | QFX5000 Series, EX4300, EX4600: A stack buffer overflow vulnerability in Packet Forwarding Engine manager (FXPC) process | Juniper Networks | Junos OS | 超危 | - | 2019-04-10 20:13:51 | Deep Dive |
| CVE-2019-0019 | BGP packets can trigger rpd crash when BGP tracing is enabled. | Juniper Networks | Junos OS | 高危 | - | 2019-04-10 20:13:51 | Deep Dive |
| CVE-2019-0028 | Junos OS: RPD process crashes due to specific BGP peer restarts condition. | Juniper Networks | Junos OS | 高危 | - | 2019-04-10 20:13:51 | Deep Dive |
| CVE-2019-0031 | Junos OS: jdhcpd daemon memory consumption Denial of Service when receiving specific IPv6 DHCP packets. | Juniper Networks | Junos OS | 高危 | - | 2019-04-10 20:13:51 | Deep Dive |
| CVE-2019-0032 | Junos Space Service Now and Service Insight: Organization username and password stored in plaintext in log files. | Juniper Networks | Service Insight | 高危 | - | 2019-04-10 20:13:51 | Deep Dive |
| CVE-2019-0033 | SRX Series: A remote attacker may cause a high CPU Denial of Service to the device when proxy ARP is configured. | Juniper Networks | Junos OS | 高危 | - | 2019-04-10 20:13:51 | Deep Dive |
| CVE-2019-0035 | Junos OS: 'set system ports console insecure' allows root password recovery on OAM volumes | Juniper Networks | Junos OS | 中危 | - | 2019-04-10 20:13:51 | Deep Dive |
| CVE-2019-0036 | Junos OS: Firewall filter terms named "internal-1" and "internal-2" being ignored | Juniper Networks | Junos OS | 超危 | - | 2019-04-10 20:13:51 | Deep Dive |
| CVE-2019-0037 | Junos OS: jdhcpd crash upon receipt of crafted DHCPv6 solicit message | Juniper Networks | Junos OS | 高危 | - | 2019-04-10 20:13:51 | Deep Dive |
| CVE-2019-0038 | SRX Series: Crafted packets destined to fxp0 management interface on SRX340/SRX345 devices can lead to DoS | Juniper Networks | Junos OS | 中危 | - | 2019-04-10 20:13:51 | Deep Dive |
| CVE-2019-0039 | Junos OS: Login credentials are vulnerable to brute force attacks through the REST API | Juniper Networks | Junos OS | 高危 | - | 2019-04-10 20:13:51 | Deep Dive |
| CVE-2019-0040 | Junos OS: Specially crafted packets sent to port 111 on any interface triggers responses from the management interface | Juniper Networks | Junos OS | 超危 | - | 2019-04-10 20:13:51 | Deep Dive |
| CVE-2019-0001 | Junos OS: MX Series: uncontrolled recursion and crash in Broadband Edge subscriber management daemon (bbe-smgd). | Juniper Networks | Junos OS | 高危 | - | 2019-01-15 21:00:00 | Deep Dive |
| CVE-2019-0002 | Junos OS: EX2300 and EX3400 series: Certain stateless firewall filter rules might not take effect | Juniper Networks | Junos OS | 超危 | - | 2019-01-15 21:00:00 | Deep Dive |
| CVE-2019-0003 | Junos OS: A flowspec BGP update with a specific term-order causes routing protocol daemon (rpd) process to crash with a core. | Juniper Networks | Junos OS | 中危 | - | 2019-01-15 21:00:00 | Deep Dive |
| CVE-2019-0004 | Juniper ATP: API and device keys are logged in a world-readable permissions file | Juniper Networks | Juniper ATP | 中危 | - | 2019-01-15 21:00:00 | Deep Dive |
| CVE-2019-0006 | Junos OS: EX, QFX and MX series: Packet Forwarding Engine manager (FXPC) process crashes due to a crafted HTTP packet in a Virtual Chassis configuration | Juniper Networks | Junos OS | 超危 | - | 2019-01-15 21:00:00 | Deep Dive |
| CVE-2019-0007 | Junos OS: vMX series: Predictable IP ID sequence numbers vulnerability | Juniper Networks | Junos OS | 超危 | - | 2019-01-15 21:00:00 | Deep Dive |