Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

Juniper Networks — Vulnerabilities & Security Advisories 893

Browse all 893 CVE security advisories affecting Juniper Networks. AI-powered Chinese analysis, POCs, and references for each vulnerability.

CVE IDTitleCVSSSeverityPublished
CVE-2020-1624 Junos OS Evolved: objmon logs may leak sensitive information — Junos OS EvolvedCWE-532 5.5 Medium2020-04-08
CVE-2020-1625 Junos OS: Kernel memory leak in virtual-memory due to interface flaps — Junos OSCWE-400 6.5 Medium2020-04-08
CVE-2020-1626 Junos OS Evolved: Denial of Service vulnerability in processing high rate of specific packets — Junos OS Evolved 7.5 High2020-04-08
CVE-2020-1622 Junos OS Evolved: EvoSharedObjStore may leak sensitive information — Junos OS EvolvedCWE-664 5.5 Medium2020-04-08
CVE-2020-1623 Junos OS Evolved: ev.ops file may leak sensitive information — Junos OS EvolvedCWE-532 5.5 Medium2020-04-08
CVE-2020-1620 Junos OS Evolved: Configd leaks hashes via log file and is world readable — Junos OS EvolvedCWE-664 5.5 Medium2020-04-08
CVE-2020-1621 Junos OS Evolved: Configd leaks hashes via stream and is world readable — Junos OS EvolvedCWE-664 5.5 Medium2020-04-08
CVE-2020-1618 Junos OS: EX and QFX Series: Console port authentication bypass vulnerability — Junos OSCWE-288 6.3 Medium2020-04-08
CVE-2020-1619 Junos OS: QFX10K Series, EX9200 Series, MX Series, PTX Series: Privilege escalation vulnerability in NG-RE. — Junos OSCWE-264 6.0 Medium2020-04-08
CVE-2020-1616 JATP Series: JATP Is susceptible to slow brute force attacks on the SSH service. — JATP 5.3 Medium2020-04-08
CVE-2020-1617 Junos OS: PTX1000 and PTX10000 Series, QFX10000 Series using non-AFT architectures: A specific genuine packet inspected by sFlow will cause a reboot. — Junos OS 7.5 High2020-04-08
CVE-2020-1614 NFX250 Series: Hardcoded credentials in the vSRX VNF instance. — Juniper Networks NFX Series Network Services PlatformCWE-798 10.0 Critical2020-04-08
CVE-2020-1615 Junos OS: vMX: Default credentials supplied in vMX configuration — Junos OSCWE-798 9.8 Critical2020-04-08
CVE-2020-1613 Junos OS: BGP session termination upon receipt of specific BGP FlowSpec advertisement. — Junos OSCWE-710 8.6 High2020-04-08
CVE-2020-1608 Junos OS: MX Series: In BBE configurations, receipt of a specific MPLS or IPv6 packet causes a Denial of Service — Junos OS 7.5 High2020-01-15
CVE-2020-1609 Junos OS and Junos OS Evolved: A vulnerability in JDHCPD allows an attacker to send crafted IPv6 packets and arbitrarily execute commands on the target device. — Junos OSCWE-121 8.8 High2020-01-15
CVE-2020-1611 Junos Space: Malicious HTTP packets sent to Junos Space allow an attacker to view all files on the device. — Junos Space 6.5 Medium2020-01-15
CVE-2020-1606 Junos OS: Path traversal vulnerability in J-Web — Junos OSCWE-22 5.4 Medium2020-01-15
CVE-2020-1607 Junos OS: Cross-Site Scripting (XSS) in J-Web — Junos OSCWE-79 7.5 High2020-01-15
CVE-2020-1604 Junos OS: EX4300/EX4600/QFX3500/QFX5100 Series: Stateless IP firewall filter may fail to evaluate certain packets — Junos OSCWE-284 6.5 Medium2020-01-15
CVE-2020-1605 Junos OS and Junos OS Evolved: A vulnerability in JDHCPD allows an attacker to send crafted IPv4 packets and arbitrarily execute commands on the target device. — Junos OSCWE-121 8.8 High2020-01-15
CVE-2020-1602 Junos OS and Junos OS Evolved: A vulnerability in JDHCPD allows an attacker to send crafted IPv4 packets may take over the code execution of the JDHCPD process. — Junos OS 7.1 High2020-01-15
CVE-2020-1603 Junos OS: Improper handling of specific IPv6 packets sent by clients eventually kernel crash (vmcore) the device. — Junos OSCWE-710 8.6 High2020-01-15
CVE-2020-1600 Junos OS: A specific SNMP command can trigger a high CPU usage Denial of Service in the RPD daemon. — Junos OSCWE-400 6.5 Medium2020-01-15
CVE-2020-1601 Junos OS: Upon receipt of certain types of malformed PCEP packets the pccd process may crash. — Junos OS 5.3 Medium2020-01-15
CVE-2019-0059 Junos OS: The routing protocol process (rpd) may crash and generate core files upon receipt of specific valid BGP states from a peered host. — Junos OSCWE-400 7.5 High2019-10-09
CVE-2019-0060 Junos OS: SRX Series: flowd process crash due to processing of specific transit IP packets — Junos OS 7.5 High2019-10-09
CVE-2019-0061 Junos OS: Insecure management daemon (MGD) configuration may allow local privilege escalation — Junos OSCWE-657 7.8 High2019-10-09
CVE-2019-0062 Junos OS: Session fixation vulnerability in J-Web — Junos OSCWE-384 7.5 High2019-10-09
CVE-2019-0063 Junos OS: MX Series: jdhcpd crash when receiving a specific crafted DHCP response message — Junos OS 6.5 Medium2019-10-09

This page lists every published CVE security advisory associated with Juniper Networks. Each entry links to a detailed page with CVSS scoring, CWE classification, affected products and references. AI-generated Chinese analysis is provided for fast triage.