Browse all 7 CVE security advisories affecting JUNG. AI-powered Chinese analysis, POCs, and references for each vulnerability.
| CVE ID | Title | CVSS | Severity | Published |
|---|---|---|---|---|
| CVE-2026-26369 | JUNG eNet SMART HOME server 2.2.1/2.3.1 Privilege Escalation via setUserGroup — eNet SMART HOME serverCWE-269 | 9.8 | Critical | 2026-02-15 |
| CVE-2026-26368 | JUNG eNet SMART HOME server 2.2.1/2.3.1 Account Takeover via resetUserPassword — eNet SMART HOME serverCWE-862 | 8.8 | High | 2026-02-15 |
| CVE-2026-26367 | JUNG eNet SMART HOME server 2.2.1/2.3.1 Arbitrary User Deletion via deleteUserAccount — eNet SMART HOME serverCWE-862 | 8.1 | High | 2026-02-15 |
| CVE-2026-26366 | JUNG eNet SMART HOME server 2.2.1/2.3.1 Use of Default Credentials — eNet SMART HOME serverCWE-1392 | 9.8 | Critical | 2026-02-15 |
| CVE-2017-20084 | JUNG Smart Visu Server KNX Group Address backdoor — Smart Visu ServerCWE-912 | 5.3 | Medium | 2022-06-22 |
| CVE-2017-20083 | JUNG Smart Visu Server SSH Server backdoor — Smart Visu ServerCWE-912 | 5.3 | Medium | 2022-06-22 |
| CVE-2017-20082 | JUNG Smart Visu Server backdoor — Smart Visu ServerCWE-912 | 5.5 | Medium | 2022-06-22 |
This page lists every published CVE security advisory associated with JUNG. Each entry links to a detailed page with CVSS scoring, CWE classification, affected products and references. AI-generated Chinese analysis is provided for fast triage.