Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%
Vulnerability List
Found 899 results
CVE IDTitleVendorProductSeverityCVSS ScorePublished AtAI Analysis
CVE-2025-52981 Junos OS: SRX Series: Sequence of specific PIM packets causes a flowd crash Juniper NetworksJunos OS High 7.5 2025-07-11 15:08:33 Deep Dive
CVE-2025-52980 Junos OS: SRX300 Series: rpd will crash upon receiving a specific, valid BGP UPDATE message Juniper NetworksJunos OS High 7.5 2025-07-11 15:08:16 Deep Dive
CVE-2025-52964 Junos OS and Junos OS Evolved: Receipt of a specific BGP UPDATE causes an rpd crash on devices with BGP multipath configured Juniper NetworksJunos OS Medium 6.5 2025-07-11 15:06:50 Deep Dive
CVE-2025-52963 Junos OS: A low-privileged user can disable an interface Juniper NetworksJunos OS Medium 5.5 2025-07-11 15:06:27 Deep Dive
CVE-2025-52953 Junos OS and Junos OS Evolved: An unauthenticated adjacent attacker sending a valid BGP UPDATE packet forces a BGP session reset Juniper NetworksJunos OS Medium 6.5 2025-07-11 15:04:55 Deep Dive
CVE-2025-52952 Junos OS: MX Series with MPC-BUILTIN, MPC 1 through MPC 9: Receipt and processing of a malformed packet causes one or more FPCs to crash Juniper NetworksJunos OS Medium 6.5 2025-07-11 15:04:36 Deep Dive
CVE-2025-52958 Junos OS and Junos OS Evolved: When route validation is enabled, BGP connection establishment failure causes RPD crash Juniper NetworksJunos OS Medium 5.3 2025-07-11 14:43:38 Deep Dive
CVE-2025-52955 Junos OS and Junos OS Evolved: When jflow/sflow is configured continuous logical interface flaps causes rpd crash and restart Juniper NetworksJunos OS Medium 6.5 2025-07-11 14:42:20 Deep Dive
CVE-2025-52954 Junos OS Evolved: A low-privileged user can execute arbitrary Junos commands and modify the configuration, thereby compromising the system Juniper NetworksJunos OS Evolved High 7.8 2025-07-11 14:42:02 Deep Dive
CVE-2025-52951 Junos OS: IPv6 firewall filter fails to match payload-protocol Juniper NetworksJunos OS Medium 5.8 2025-07-11 14:41:04 Deep Dive
CVE-2025-52950 Juniper Security Director: Insufficient authorization for multiple endpoints in web interface Juniper NetworksJuniper Security Director Critical 9.6 2025-07-11 14:40:50 Deep Dive
CVE-2025-52949 Junos OS and Junos OS Evolved: In an EVPN environment, receipt of specifically malformed BGP update causes RPD crash Juniper NetworksJunos OS Medium 6.5 2025-07-11 14:40:42 Deep Dive
CVE-2025-52948 Junos OS: Specific unknown traffic pattern causes FPC and system to crash when packet capturing is enabled Juniper NetworksJunos OS Medium 5.9 2025-07-11 14:40:31 Deep Dive
CVE-2025-52947 Junos OS: ACX Series: When 'hot-standby' mode is configured for an L2 circuit, interface flap causes the FEB to crash Juniper NetworksJunos OS Medium 6.5 2025-07-11 14:40:15 Deep Dive
CVE-2025-52946 Junos OS and Junos OS Evolved: With traceoptions enabled, receipt of malformed AS PATH causes RPD crash Juniper NetworksJunos OS High 7.5 2025-07-11 14:39:59 Deep Dive
CVE-2025-30661 Junos OS: Low-privileged user can cause script to run as root, leading to privilege escalation Juniper NetworksJunos OS High 7.3 2025-07-11 14:38:52 Deep Dive
CVE-2025-30660 Junos OS: MX Series: Decapsulation of specific GRE packets leads to PFE reset Juniper NetworksJunos OS High 7.5 2025-04-09 20:05:25 Deep Dive
CVE-2025-30659 Junos OS: SRX Series: A device configured for vector routing crashes when receiving malformed traffic Juniper NetworksJunos OS High 7.5 2025-04-09 20:03:24 Deep Dive
CVE-2025-30658 Junos OS: SRX Series: On devices with Anti-Virus enabled, malicious server responses will cause memory to leak ultimately causing forwarding to stop Juniper NetworksJunos OS High 7.5 2025-04-09 20:02:51 Deep Dive
CVE-2025-30657 Junos OS: Processing of a specific BGP update causes the SRRD process to crash Juniper NetworksJunos OS Medium 5.3 2025-04-09 20:02:22 Deep Dive