Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

Juniper Networks — Vulnerabilities & Security Advisories 893

Browse all 893 CVE security advisories affecting Juniper Networks. AI-powered Chinese analysis, POCs, and references for each vulnerability.

CVE IDTitleCVSSSeverityPublished
CVE-2019-0023 Juniper ATP: Persistent Cross-Site Scripting vulnerability in the Golden VM menu — Juniper ATP 5.4 -2019-01-15
CVE-2019-0024 Juniper ATP: Persistent Cross-Site Scripting vulnerability in the Email Collectors menu — Juniper ATP 5.4 -2019-01-15
CVE-2019-0025 Juniper ATP: Persistent Cross-Site Scripting vulnerability in RADIUS configuration menu — Juniper ATP 5.4 -2019-01-15
CVE-2019-0026 Juniper ATP: Persistent Cross-Site Scripting vulnerability in Zone configuration — Juniper ATP 5.4 -2019-01-15
CVE-2019-0027 Juniper ATP: Persistent Cross-Site Scripting vulnerability in Snort Rules configuration — Juniper ATP 5.4 -2019-01-15
CVE-2019-0029 Juniper ATP: Splunk credentials are in logged in clear text — Juniper ATP 7.8 -2019-01-15
CVE-2019-0030 Juniper ATP: Password hashing uses DES and a hardcoded salt — Juniper ATPCWE-327 9.8 -2019-01-15
CVE-2018-0043 Junos OS: RPD daemon crashes upon receipt of specific MPLS packet — Junos OS 8.8 -2018-10-10
CVE-2018-0044 NFX Series: Insecure sshd configuration in Juniper Device Manager (JDM) and host OS — Junos OS 8.1 -2018-10-10
CVE-2018-0045 Junos OS: RPD daemon crashes due to receipt of specific Draft-Rosen MVPN control packet in Draft-Rosen MVPN configuration — Junos OS 9.8 -2018-10-10
CVE-2018-0046 Junos Space: Reflected Cross-site Scripting vulnerability in OpenNMS — Junos Space 6.1 -2018-10-10
CVE-2018-0047 Junos Space Security Director: XSS vulnerability in web administration — Junos Space Security Director 5.4 -2018-10-10
CVE-2018-0048 Junos OS: Memory exhaustion denial of service vulnerability in Routing Protocols Daemon (RPD) with Juniper Extension Toolkit (JET) support. — Junos OSCWE-400 7.5 -2018-10-10
CVE-2018-0049 Junos OS: Receipt of a specifically crafted malicious MPLS packet leads to a Junos kernel crash. — Junos OS 7.5 -2018-10-10
CVE-2018-0050 Junos OS: Receipt of a malformed MPLS RSVP packet leads to a Routing Protocols Daemon (RPD) crash. — Junos OS 7.5 -2018-10-10
CVE-2018-0051 Junos OS: Denial of Service vulnerability in MS-PIC, MS-MIC, MS-MPC, MS-DPC and SRX flow daemon (flowd) related to SIP ALG — Junos OS 5.9 -2018-10-10
CVE-2018-0052 Junos OS: Unauthenticated remote root access possible when RSH service is enabled — Junos OS 9.8 -2018-10-10
CVE-2018-0053 vSRX Series: A local authentication vulnerability may lead to full control of a vSRX instance while the system is booting. — Junos OS 6.8 -2018-10-10
CVE-2018-0054 QFX5000/EX4600 Series: Routing protocol flap upon receipt of high rate of Ethernet frames — Junos OS 7.1 -2018-10-10
CVE-2018-0055 Junos OS: jdhcpd process crash during processing of specially crafted DHCPv6 message — Junos OS 5.9 -2018-10-10
CVE-2018-0056 MX Series: L2ALD daemon may crash if a duplicate MAC is learned by two different interfaces — Junos OS 5.3 -2018-10-10
CVE-2018-0057 Junos OS: authd allows assignment of IP address requested by DHCP subscriber logging in with Option 50 (Requested IP Address) — Junos OS 9.6 -2018-10-10
CVE-2018-0058 MX Series: In BBE configurations, receipt of a crafted IPv6 exception packet causes a Denial of Service — Junos OS 7.5 -2018-10-10
CVE-2018-0059 ScreenOS: Stored Cross-Site Scripting (XSS) vulnerability — ScreenOS 5.4 -2018-10-10
CVE-2018-0060 Junos OS: Invalid IP/mask learned from DHCP server might cause device control daemon (dcd) process crash — Junos OS 5.9 -2018-10-10
CVE-2018-0061 Junos OS: Denial of service in telnetd — Junos OS 5.3 -2018-10-10
CVE-2018-0062 Junos OS: Denial of Service in J-Web — Junos OS 7.5 -2018-10-10
CVE-2018-0063 Junos OS: Nexthop index allocation failed: private index space exhausted after incoming ARP requests to management interface — Junos OS 6.5 -2018-10-10
CVE-2018-0024 Junos OS: A privilege escalation vulnerability exists where authenticated users with shell access can become root — Junos OS 7.8 -2018-07-11
CVE-2018-0025 Junos OS: SRX Series: Credentials exposed when using HTTP and HTTPS Firewall Pass-through User Authentication — Junos OSCWE-319 5.9 -2018-07-11

This page lists every published CVE security advisory associated with Juniper Networks. Each entry links to a detailed page with CVSS scoring, CWE classification, affected products and references. AI-generated Chinese analysis is provided for fast triage.