| CVE ID | Title | Vendor | Product | Severity | CVSS Score | Published At | AI Analysis |
|---|---|---|---|---|---|---|---|
| CVE-2024-47495 | Junos OS Evolved: In a dual-RE scenario a locally authenticated attacker with shell privileges can take over the device. | Juniper Networks | Junos OS Evolved | Medium | 6.7 | 2024-10-11 15:27:08 | Deep Dive |
| CVE-2024-47494 | Junos OS: Due to a race condition AgentD process causes a memory corruption and FPC reset | Juniper Networks | Junos OS | Medium | 5.9 | 2024-10-11 15:24:36 | Deep Dive |
| CVE-2024-47493 | Junos OS: MX Series: Trio-based FPCs: Continuous physical Interface flaps causes local FPC to crash | Juniper Networks | Junos OS | Medium | 6.5 | 2024-10-11 15:24:02 | Deep Dive |
| CVE-2024-47491 | Junos OS and Junos OS Evolved: Receipt of a specific malformed BGP path attribute leads to an RPD crash | Juniper Networks | Junos OS | Medium | 5.9 | 2024-10-11 15:23:09 | Deep Dive |
| CVE-2024-47490 | Junos OS Evolved: ACX 7000 Series: Receipt of specific transit MPLS packets causes resources to be exhausted | Juniper Networks | Junos OS Evolved | High | 8.2 | 2024-10-11 15:22:40 | Deep Dive |
| CVE-2024-47489 | Junos OS Evolved: ACX Series: Receipt of specific transit protocol packets is incorrectly processed by the RE | Juniper Networks | Junos OS Evolved | Medium | 5.8 | 2024-10-11 15:22:00 | Deep Dive |
| CVE-2024-39563 | Junos Space: Remote Command Execution (RCE) vulnerability in web application | Juniper Networks | Junos Space | High | 7.3 | 2024-10-11 15:21:18 | Deep Dive |
| CVE-2024-39547 | Junos OS and Junos OS Evolved: cRPD: Receipt of crafted TCP traffic can trigger high CPU utilization | Juniper Networks | Junos OS | High | 7.5 | 2024-10-11 15:20:45 | Deep Dive |
| CVE-2024-39544 | Junos OS Evolved: Low privileged local user able to view NETCONF traceoptions files | Juniper Networks | Junos OS Evolved | Medium | 5.0 | 2024-10-11 15:18:39 | Deep Dive |
| CVE-2024-39534 | Junos OS Evolved: Connections to the network and broadcast address accepted | Juniper Networks | Junos OS Evolved | Medium | 5.4 | 2024-10-11 15:18:08 | Deep Dive |
| CVE-2024-39527 | Junos OS: SRX Series: Low privileged user able to access sensitive information on file system | Juniper Networks | Junos OS | Medium | 5.5 | 2024-10-11 15:17:27 | Deep Dive |
| CVE-2024-39526 | Junos OS and Junos OS Evolved: MX Series with MPC10/MPC11/LC9600, MX304, EX9200, PTX Series: Receipt of malformed DHCP packets causes interfaces to stop processing packets | Juniper Networks | Junos OS | Medium | 6.5 | 2024-10-11 15:16:50 | Deep Dive |
| CVE-2024-39525 | Junos OS and Junos OS Evolved: When BGP traceoptions is enabled, receipt of specially crafted BGP packet causes RPD crash | Juniper Networks | Junos OS | High | 7.5 | 2024-10-09 20:01:21 | Deep Dive |
| CVE-2024-39516 | Junos OS and Junos OS Evolved: With certain BGP options enabled, receipt of specifically malformed BGP update causes RPD crash | Juniper Networks | Junos OS | High | 7.5 | 2024-10-09 20:00:59 | Deep Dive |
| CVE-2024-39515 | Junos OS and Junos OS Evolved: With BGP traceoptions enabled, receipt of specifically malformed BGP update causes RPD crash | Juniper Networks | Junos OS | High | 7.5 | 2024-10-09 20:00:40 | Deep Dive |
| CVE-2024-39553 | Junos OS Evolved: Receipt of arbitrary data when sampling service is enabled, leads to partial Denial of Service (DoS). | Juniper Networks | Junos OS Evolved | Medium | 6.5 | 2024-07-11 16:32:04 | Deep Dive |
| CVE-2024-39552 | Junos OS and Junos OS Evolved: Malformed BGP UPDATE causes RPD crash | Juniper Networks | Junos OS | High | 7.5 | 2024-07-11 16:30:37 | Deep Dive |
| CVE-2024-39551 | Junos OS: SRX Series and MX Series with SPC3 and MS-MPC/MIC: Receipt of specific packets in H.323 ALG causes traffic drop | Juniper Networks | Junos OS | High | 7.5 | 2024-07-11 16:29:47 | Deep Dive |
| CVE-2024-39550 | Junos OS: MX Series with SPC3 line card: Port flaps causes rtlogd memory leak leading to Denial of Service | Juniper Networks | Junos OS | Medium | 6.5 | 2024-07-11 16:29:04 | Deep Dive |
| CVE-2024-39549 | Junos OS and Junos OS Evolved: Receipt of malformed BGP path attributes leads to a memory leak | Juniper Networks | Junos OS | High | 7.5 | 2024-07-11 16:27:19 | Deep Dive |