Latest CVE Feed

Following is the list of latest published vulnerabilities. You can filter the list based on the severity of the vulnerability, whether it is actively exploited (also known as CISA KEV List) or remotely exploitable. You can also sort the list based on the published date, last updated date, or CVSS score.
  • 5.9

    MEDIUM
    CVE-2021-31364

    An Improper Check for Unusual or Exceptional Conditions vulnerability combined with a Race Condition in the flow daemon (flowd) of Juniper Networks Junos OS on SRX300 Series, SRX500 Series, SRX1500, and SRX5000 Series with SPC2 allows an unauthenticated n... Read more

    Affected Products : junos srx550 srx5600 srx5800 srx1500 srx300 srx320 srx340 srx345 srx380 +4 more products
    • EPSS Score: %0.22
    • Published: Oct. 19, 2021
    • Modified: Nov. 21, 2024
  • 6.5

    MEDIUM
    CVE-2021-31363

    In an MPLS P2MP environment a Loop with Unreachable Exit Condition vulnerability in the routing protocol daemon (RPD) of Juniper Networks Junos OS and Junos OS Evolved allows an unauthenticated adjacent attacker to cause high load on RPD which in turn may... Read more

    Affected Products : junos junos_os_evolved
    • EPSS Score: %0.08
    • Published: Oct. 19, 2021
    • Modified: Nov. 21, 2024
  • 6.5

    MEDIUM
    CVE-2021-31362

    A Protection Mechanism Failure vulnerability in RPD (routing protocol daemon) of Juniper Networks Junos OS and Junos OS Evolved allows an adjacent unauthenticated attacker to cause established IS-IS adjacencies to go down by sending a spoofed hello PDU le... Read more

    Affected Products : junos junos_os_evolved
    • EPSS Score: %0.08
    • Published: Oct. 19, 2021
    • Modified: Nov. 21, 2024
  • 5.3

    MEDIUM
    CVE-2021-31361

    An Improper Check for Unusual or Exceptional Conditions vulnerability combined with Improper Handling of Exceptional Conditions in Juniper Networks Junos OS on QFX Series and PTX Series allows an unauthenticated network based attacker to cause increased F... Read more

    • EPSS Score: %0.46
    • Published: Oct. 19, 2021
    • Modified: Nov. 21, 2024
  • 7.1

    HIGH
    CVE-2021-31360

    An improper privilege management vulnerability in the Juniper Networks Junos OS and Junos OS Evolved command-line interpreter (CLI) allows a low-privileged user to overwrite local files as root, possibly leading to a system integrity issue or Denial of Se... Read more

    Affected Products : junos junos_os_evolved
    • EPSS Score: %0.12
    • Published: Oct. 19, 2021
    • Modified: Nov. 21, 2024
  • 7.8

    HIGH
    CVE-2021-31359

    A local privilege escalation vulnerability in Juniper Networks Junos OS and Junos OS Evolved allows a local, low-privileged user to cause the Juniper DHCP daemon (jdhcpd) process to crash, resulting in a Denial of Service (DoS), or execute arbitrary comma... Read more

    Affected Products : junos junos_os_evolved
    • EPSS Score: %0.08
    • Published: Oct. 19, 2021
    • Modified: Nov. 21, 2024
  • 7.8

    HIGH
    CVE-2021-31358

    A command injection vulnerability in sftp command processing on Juniper Networks Junos OS Evolved allows an attacker with authenticated CLI access to be able to bypass configured access protections to execute arbitrary shell commands within the context of... Read more

    Affected Products : junos_os_evolved
    • EPSS Score: %0.12
    • Published: Oct. 19, 2021
    • Modified: Nov. 21, 2024
  • 7.8

    HIGH
    CVE-2021-31357

    A command injection vulnerability in tcpdump command processing on Juniper Networks Junos OS Evolved allows an attacker with authenticated CLI access to be able to bypass configured access protections to execute arbitrary shell commands within the context... Read more

    Affected Products : junos_os_evolved
    • EPSS Score: %0.12
    • Published: Oct. 19, 2021
    • Modified: Nov. 21, 2024
  • 7.8

    HIGH
    CVE-2021-31356

    A command injection vulnerability in command processing on Juniper Networks Junos OS Evolved allows an attacker with authenticated CLI access to be able to bypass configured access protections to execute arbitrary shell commands within the context of the ... Read more

    Affected Products : junos_os_evolved
    • EPSS Score: %0.14
    • Published: Oct. 19, 2021
    • Modified: Nov. 21, 2024
  • 8.0

    HIGH
    CVE-2021-31355

    A persistent cross-site scripting (XSS) vulnerability in the captive portal graphical user interface of Juniper Networks Junos OS may allow a remote authenticated user to inject web script or HTML and steal sensitive data and credentials from a web admini... Read more

    Affected Products : junos
    • EPSS Score: %0.33
    • Published: Oct. 19, 2021
    • Modified: Nov. 21, 2024
  • 8.8

    HIGH
    CVE-2021-31354

    An Out Of Bounds (OOB) access vulnerability in the handling of responses by a Juniper Agile License (JAL) Client in Juniper Networks Junos OS and Junos OS Evolved, configured in Network Mode (to use Juniper Agile License Manager) may allow an attacker to ... Read more

    Affected Products : junos junos_os_evolved
    • EPSS Score: %0.28
    • Published: Oct. 19, 2021
    • Modified: Nov. 21, 2024
  • 7.5

    HIGH
    CVE-2021-31353

    An Improper Handling of Exceptional Conditions vulnerability in Juniper Networks Junos OS and Junos OS Evolved allows an attacker to inject a specific BGP update, causing the routing protocol daemon (RPD) to crash and restart, leading to a Denial of Servi... Read more

    Affected Products : junos junos_os_evolved
    • EPSS Score: %0.41
    • Published: Oct. 19, 2021
    • Modified: Nov. 21, 2024
  • 5.3

    MEDIUM
    CVE-2021-31352

    An Information Exposure vulnerability in Juniper Networks SRC Series devices configured for NETCONF over SSH permits the negotiation of weak ciphers, which could allow a remote attacker to obtain sensitive information. A remote attacker with read and writ... Read more

    Affected Products : session_and_resource_control
    • EPSS Score: %0.12
    • Published: Oct. 19, 2021
    • Modified: Nov. 21, 2024
  • 7.5

    HIGH
    CVE-2021-31351

    An Improper Check for Unusual or Exceptional Conditions in packet processing on the MS-MPC/MS-MIC utilized by Juniper Networks Junos OS allows a malicious attacker to send a specific packet, triggering the MS-MPC/MS-MIC to reset, causing a Denial of Servi... Read more

    Affected Products : junos mx10 mx104 mx2010 mx2020 mx240 mx40 mx480 mx80 mx960 +8 more products
    • EPSS Score: %0.39
    • Published: Oct. 19, 2021
    • Modified: Nov. 21, 2024
  • 9.0

    HIGH
    CVE-2021-31350

    An Improper Privilege Management vulnerability in the gRPC framework, used by the Juniper Extension Toolkit (JET) API on Juniper Networks Junos OS and Junos OS Evolved, allows a network-based, low-privileged authenticated attacker to perform operations as... Read more

    Affected Products : junos junos_os_evolved
    • EPSS Score: %0.34
    • Published: Oct. 19, 2021
    • Modified: Nov. 21, 2024
  • 9.8

    CRITICAL
    CVE-2021-31349

    The usage of an internal HTTP header created an authentication bypass vulnerability (CWE-287), allowing an attacker to view internal files, change settings, manipulate services and execute arbitrary code. This issue affects all Juniper Networks 128 Techno... Read more

    • EPSS Score: %0.75
    • Published: Oct. 19, 2021
    • Modified: Nov. 21, 2024
  • 6.5

    MEDIUM
    CVE-2021-31348

    An issue was discovered in libezxml.a in ezXML 0.8.6. The function ezxml_parse_str() performs incorrect memory handling while parsing crafted XML files (out-of-bounds read after a certain strcspn failure).... Read more

    Affected Products : debian_linux ezxml
    • EPSS Score: %0.86
    • Published: Apr. 16, 2021
    • Modified: Nov. 21, 2024
  • 6.5

    MEDIUM
    CVE-2021-31347

    An issue was discovered in libezxml.a in ezXML 0.8.6. The function ezxml_parse_str() performs incorrect memory handling while parsing crafted XML files (writing outside a memory region created by mmap).... Read more

    Affected Products : debian_linux ezxml
    • EPSS Score: %1.17
    • Published: Apr. 16, 2021
    • Modified: Nov. 21, 2024
  • 9.1

    CRITICAL
    CVE-2021-31346

    A vulnerability has been identified in Capital Embedded AR Classic 431-422 (All versions), Capital Embedded AR Classic R20-11 (All versions < V2303), PLUSCONTROL 1st Gen (All versions), SIMOTICS CONNECT 400 (All versions < V0.5.0.0), SIMOTICS CONNECT 400 ... Read more

    • EPSS Score: %2.50
    • Published: Nov. 09, 2021
    • Modified: Nov. 21, 2024
  • 9.1

    CRITICAL
    CVE-2021-31345

    A vulnerability has been identified in Capital Embedded AR Classic 431-422 (All versions), Capital Embedded AR Classic R20-11 (All versions < V2303), PLUSCONTROL 1st Gen (All versions). The total length of an UDP payload (set in the IP header) is unchecke... Read more

    • EPSS Score: %1.25
    • Published: Nov. 09, 2021
    • Modified: Nov. 21, 2024
Showing 20 of 292318 Results