Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

Juniper Networks — Vulnerabilities & Security Advisories 893

Browse all 893 CVE security advisories affecting Juniper Networks. AI-powered Chinese analysis, POCs, and references for each vulnerability.

CVE IDTitleCVSSSeverityPublished
CVE-2021-0267 Junos OS: Receipt of a crafted DHCP packet will cause the jdhcpd DHCP service to core. — Junos OSCWE-20 7.4 High2021-04-22
CVE-2021-0265 Contrail Insights: The REST API implementation allows an unauthenticated remote attacker to execute commands as root. — Contrail Insights 8.1 High2021-04-22
CVE-2021-0263 Junos OS: PTX Series: Denial of Service in packet processing due to heavy route churn when J-Flow sampling is enabled — Junos OSCWE-19 5.9 Medium2021-04-22
CVE-2021-0264 Junos OS and Junos OS Evolved: MX Series with MPC10/MPC11, PTX10003, PTX10008: Line card may crash and restart when traffic is hitting a firewall filter having a term with syslog action configured — Junos OSCWE-703 5.9 Medium2021-04-22
CVE-2021-0262 Junos OS: QFX10002-60C: Use after free vulnerability found during static code analysis — Junos OSCWE-416 6.5 Medium2021-04-22
CVE-2021-0260 Junos OS: SNMP fails to properly perform authorization checks on incoming received SNMP requests. — Junos OSCWE-285 7.3 High2021-04-22
CVE-2021-0261 Junos OS: Denial of Service vulnerability in J-Web and web based (HTTP/HTTPS) services caused by a high number of specific requests — Junos OSCWE-125 7.5 High2021-04-22
CVE-2021-0259 Junos OS and Junos OS Evolved: QFX5K Series: Underlay network traffic might not be processed upon receipt of high rate of specific genuine overlay packets in VXLAN scenario — Junos OSCWE-755 7.4 High2021-04-22
CVE-2021-0258 Junos OS: Kernel panic upon receipt of specific TCPv6 packet on management interface — Junos OSCWE-362 5.9 Medium2021-04-22
CVE-2021-0256 Junos OS: mosquitto Local Privilege Escalation vulnerability in SUID binaries — Junos OSCWE-250 5.5 Medium2021-04-22
CVE-2021-0257 Junos OS: MX Series, EX9200 Series: Trio-based MPCs memory leak in VPLS with integrated routing and bridging (IRB) interface — Junos OSCWE-400 6.5 Medium2021-04-22
CVE-2021-0255 Junos OS: ethtraceroute Local Privilege Escalation vulnerability in SUID binaries — Junos OSCWE-250 5.5 Medium2021-04-22
CVE-2021-0253 Junos OS: NFX Series: Local Command Execution Vulnerability in JDMD Leads to Privilege Escalation — Junos OSCWE-77 7.8 High2021-04-22
CVE-2021-0254 Junos OS: Remote code execution vulnerability in overlayd service — Junos OSCWE-131 9.8 Critical2021-04-22
CVE-2021-0252 Junos OS: NFX Series: Local Code Execution Vulnerability in JDMD Leads to Privilege Escalation — Junos OSCWE-77 7.8 High2021-04-22
CVE-2021-0250 Junos OS and Junos OS Evolved: An attacker sending a specific crafted BGP update message will crash RPD — Junos OS 7.5 High2021-04-22
CVE-2021-0251 Junos OS: MX Series with MS-PIC, MS-SPC3, MS-MIC or MS-MPC: The BRAS Subscriber Services service activation portal is vulnerable to a Denial of Service (DoS) via malformed HTTP packets — Junos OS 8.6 High2021-04-22
CVE-2021-0249 Junos OS: SRX Series: A remote attacker may be able to cause a PFE buffer overflow to arbitrarily remotely execute code or commands on the target device with UTM enabled. — Junos OS 8.1 High2021-04-22
CVE-2021-0247 Junos OS: PTX Series, QFX Series: Due to a race condition input loopback firewall filters applied to interfaces may not operate even when listed in the running configuration. — Junos OSCWE-362 5.1 Medium2021-04-22
CVE-2021-0248 NFX Series: Hard-coded credentials allow an attacker to take control of any instance through administrative interfaces. — Junos OSCWE-798 10.0 Critical2021-04-22
CVE-2021-0246 Junos OS: SRX1500, SRX4100, SRX4200, SRX4600, SRX5000 Series with SPC2/SPC3: In a multi-tenant environment, a tenant host administrator may be able to jailbreak out of their network impacting other tenant networks or gather information from other networks. — Junos OS 7.3 High2021-04-22
CVE-2021-0244 Junos OS: A race condition in the storm control profile may allow an attacker to cause a Denial of Service condition — Junos OS 7.4 High2021-04-22
CVE-2021-0245 Junos OS: Junos Fusion: Hard-coded credentials on satellite devices allows a locally authenticated attacker to elevate their privileges. — Junos OSCWE-798 7.8 High2021-04-22
CVE-2021-0243 Junos OS: EX4300: Stateless firewall policer fails to discard traffic — Junos OSCWE-241 4.7 Medium2021-04-22
CVE-2021-0241 Junos OS: Receipt of specific DHCPv6 packet may cause jdhcpd to crash and restart — Junos OSCWE-703 7.4 High2021-04-22
CVE-2021-0242 Junos OS: EX4300: FPC crash upon receipt of specific frames on an interface without L2PT or dot1x configured — Junos OSCWE-119 6.5 Medium2021-04-22
CVE-2021-0240 Junos OS: Receipt of malformed DHCPv6 packets causes jdhcpd to crash and restart. — Junos OSCWE-703 7.4 High2021-04-22
CVE-2021-0238 Junos OS: MX Series: Executing CLI command repetitively may cause the system to run out of disk space — Junos OSCWE-400 5.5 Medium2021-04-22
CVE-2021-0239 Junos OS Evolved: Denial of Service due to receipt of specific genuine layer 2 frames. — Junos OS EvolvedCWE-754 6.5 Medium2021-04-22
CVE-2021-0237 Junos OS: EX4300-MP/EX4600/EX4650/QFX5K Series: Packet Forwarding Engine manager (FXPC) process crashes when deployed in a Virtual Chassis (VC) configuration — Junos OS 6.5 Medium2021-04-22

This page lists every published CVE security advisory associated with Juniper Networks. Each entry links to a detailed page with CVSS scoring, CWE classification, affected products and references. AI-generated Chinese analysis is provided for fast triage.