Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

Juniper Networks — Vulnerabilities & Security Advisories 893

Browse all 893 CVE security advisories affecting Juniper Networks. AI-powered Chinese analysis, POCs, and references for each vulnerability.

CVE IDTitleCVSSSeverityPublished
CVE-2024-47505 Junos OS Evolved: Specific low privileged CLI commands and SNMP GET requests can trigger a resource leak #1 — Junos OS EvolvedCWE-770 6.5 Medium2024-10-11
CVE-2024-47504 Junos OS: SRX5000 Series: Receipt of a specific malformed packet will cause a flowd crash — Junos OSCWE-1287 7.5 High2024-10-11
CVE-2024-47503 Junos OS: SRX4600 and SRX5000 Series: Sequence of specific PIM packets causes a flowd crash — Junos OSCWE-754 6.5 Medium2024-10-11
CVE-2024-47502 Junos OS Evolved: TCP session state is not always cleared on the Routing Engine leading to DoS — Junos OS EvolvedCWE-770 7.5 High2024-10-11
CVE-2024-47501 Junos OS: MX304, MX with MPC10/11/LC9600, and EX9200 with EX9200-15C: In a VPLS or Junos Fusion scenario specific show commands cause FPCs to crash — Junos OSCWE-476 5.5 Medium2024-10-11
CVE-2024-47499 Junos OS and Junos OS Evolved: In a BMP scenario receipt of a malformed AS PATH attribute can cause an RPD crash — Junos OSCWE-754 7.5 High2024-10-11
CVE-2024-47498 Junos OS Evolved: QFX5000 Series: Configured MAC learning and move limits are not in effect — Junos OS Evolved 6.5 Medium2024-10-11
CVE-2024-47497 Junos OS: SRX Series, QFX Series, MX Series and EX Series: Receiving specific HTTPS traffic causes resource exhaustion — Junos OSCWE-400 7.5 High2024-10-11
CVE-2024-47496 Junos OS: MX Series: The PFE will crash on running specific command — Junos OSCWE-476 5.5 Medium2024-10-11
CVE-2024-47495 Junos OS Evolved: In a dual-RE scenario a locally authenticated attacker with shell privileges can take over the device. — Junos OS EvolvedCWE-639 6.7 Medium2024-10-11
CVE-2024-47494 Junos OS: Due to a race condition AgentD process causes a memory corruption and FPC reset — Junos OSCWE-367 5.9 Medium2024-10-11
CVE-2024-47493 Junos OS: MX Series: Trio-based FPCs: Continuous physical Interface flaps causes local FPC to crash — Junos OSCWE-401 6.5 Medium2024-10-11
CVE-2024-47491 Junos OS and Junos OS Evolved: Receipt of a specific malformed BGP path attribute leads to an RPD crash — Junos OSCWE-755 5.9 Medium2024-10-11
CVE-2024-47490 Junos OS Evolved: ACX 7000 Series: Receipt of specific transit MPLS packets causes resources to be exhausted — Junos OS EvolvedCWE-923 8.2 High2024-10-11
CVE-2024-47489 Junos OS Evolved: ACX Series: Receipt of specific transit protocol packets is incorrectly processed by the RE — Junos OS EvolvedCWE-755 5.8 Medium2024-10-11
CVE-2024-39563 Junos Space: Remote Command Execution (RCE) vulnerability in web application — Junos SpaceCWE-77 7.3 High2024-10-11
CVE-2024-39547 Junos OS and Junos OS Evolved: cRPD: Receipt of crafted TCP traffic can trigger high CPU utilization — Junos OSCWE-755 7.5 High2024-10-11
CVE-2024-39544 Junos OS Evolved: Low privileged local user able to view NETCONF traceoptions files — Junos OS EvolvedCWE-276 5.0 Medium2024-10-11
CVE-2024-39534 Junos OS Evolved: Connections to the network and broadcast address accepted — Junos OS EvolvedCWE-697 5.4 Medium2024-10-11
CVE-2024-39527 Junos OS: SRX Series: Low privileged user able to access sensitive information on file system — Junos OSCWE-200 5.5 Medium2024-10-11
CVE-2024-39526 Junos OS and Junos OS Evolved: MX Series with MPC10/MPC11/LC9600, MX304, EX9200, PTX Series: Receipt of malformed DHCP packets causes interfaces to stop processing packets — Junos OSCWE-755 6.5 Medium2024-10-11
CVE-2024-39525 Junos OS and Junos OS Evolved: When BGP traceoptions is enabled, receipt of specially crafted BGP packet causes RPD crash — Junos OSCWE-755 7.5 High2024-10-09
CVE-2024-39516 Junos OS and Junos OS Evolved: With certain BGP options enabled, receipt of specifically malformed BGP update causes RPD crash — Junos OSCWE-125 7.5 High2024-10-09
CVE-2024-39515 Junos OS and Junos OS Evolved: With BGP traceoptions enabled, receipt of specifically malformed BGP update causes RPD crash — Junos OSCWE-1288 7.5 High2024-10-09
CVE-2024-39553 Junos OS Evolved: Receipt of arbitrary data when sampling service is enabled, leads to partial Denial of Service (DoS). — Junos OS EvolvedCWE-668 6.5 Medium2024-07-11
CVE-2024-39552 Junos OS and Junos OS Evolved: Malformed BGP UPDATE causes RPD crash — Junos OSCWE-755 7.5 High2024-07-11
CVE-2024-39551 Junos OS: SRX Series and MX Series with SPC3 and MS-MPC/MIC: Receipt of specific packets in H.323 ALG causes traffic drop — Junos OSCWE-400 7.5 High2024-07-11
CVE-2024-39550 Junos OS: MX Series with SPC3 line card: Port flaps causes rtlogd memory leak leading to Denial of Service — Junos OSCWE-401 6.5 Medium2024-07-11
CVE-2024-39549 Junos OS and Junos OS Evolved: Receipt of malformed BGP path attributes leads to a memory leak — Junos OSCWE-401 7.5 High2024-07-11
CVE-2024-39548 Junos OS Evolved: Receipt of specific packets in the aftmand process will lead to a memory leak — Junos OS EvolvedCWE-400 7.5 High2024-07-11

This page lists every published CVE security advisory associated with Juniper Networks. Each entry links to a detailed page with CVSS scoring, CWE classification, affected products and references. AI-generated Chinese analysis is provided for fast triage.