Latest CVE Feed

Following is the list of latest published vulnerabilities. You can filter the list based on the severity of the vulnerability, whether it is actively exploited (also known as CISA KEV List) or remotely exploitable. You can also sort the list based on the published date, last updated date, or CVSS score.
  • 7.2

    HIGH
    CVE-2021-31375

    An Improper Input Validation vulnerability in routing process daemon (RPD) of Juniper Networks Junos OS devices configured with BGP origin validation using Resource Public Key Infrastructure (RPKI), allows an attacker to send a specific BGP update which m... Read more

    Affected Products : junos
    • EPSS Score: %0.21
    • Published: Oct. 19, 2021
    • Modified: Nov. 21, 2024
  • 7.5

    HIGH
    CVE-2021-31374

    On Juniper Networks Junos OS and Junos OS Evolved devices processing a specially crafted BGP UPDATE or KEEPALIVE message can lead to a routing process daemon (RPD) crash and restart, causing a Denial of Service (DoS). Continued receipt and processing of t... Read more

    Affected Products : junos junos_os_evolved
    • EPSS Score: %0.39
    • Published: Oct. 19, 2021
    • Modified: Nov. 21, 2024
  • 8.0

    HIGH
    CVE-2021-31373

    A persistent Cross-Site Scripting (XSS) vulnerability in Juniper Networks Junos OS on SRX Series, J-Web interface may allow a remote authenticated user to inject persistent and malicious scripts. An attacker can exploit this vulnerability to steal sensiti... Read more

    Affected Products : junos srx100 srx110 srx210 srx220 srx240 srx550 srx650 srx1400 srx3400 +18 more products
    • EPSS Score: %0.28
    • Published: Oct. 19, 2021
    • Modified: Nov. 21, 2024
  • 9.0

    HIGH
    CVE-2021-31372

    An Improper Input Validation vulnerability in J-Web of Juniper Networks Junos OS allows a locally authenticated J-Web attacker to escalate their privileges to root over the target device. This issue affects: Juniper Networks Junos OS All versions prior to... Read more

    Affected Products : junos
    • EPSS Score: %0.52
    • Published: Oct. 19, 2021
    • Modified: Nov. 21, 2024
  • 5.3

    MEDIUM
    CVE-2021-31371

    Juniper Networks Junos OS uses the 128.0.0.0/2 subnet for internal communications between the RE and PFEs. It was discovered that packets utilizing these IP addresses may egress an QFX5000 Series switch, leaking configuration information such as heartbeat... Read more

    Affected Products : junos qfx5100 qfx5200 qfx5110 qfx5120 qfx5210
    • EPSS Score: %0.22
    • Published: Oct. 19, 2021
    • Modified: Nov. 21, 2024
  • 6.5

    MEDIUM
    CVE-2021-31370

    An Incomplete List of Disallowed Inputs vulnerability in Packet Forwarding Engine (PFE) of Juniper Networks Junos OS on QFX5000 Series and EX4600 Series allows an adjacent unauthenticated attacker which sends a high rate of specific multicast traffic to c... Read more

    Affected Products : junos ex4600 ex4600-vc ex4650 qfx5100 qfx5200 qfx5110 qfx5120 qfx5210 qfx5200-32c +5 more products
    • EPSS Score: %0.08
    • Published: Oct. 19, 2021
    • Modified: Nov. 21, 2024
  • 5.3

    MEDIUM
    CVE-2021-31369

    On MX Series platforms with MS-MPC/MS-MIC, an Allocation of Resources Without Limits or Throttling vulnerability in Juniper Networks Junos OS allows an unauthenticated network attacker to cause a partial Denial of Service (DoS) with a high rate of specifi... Read more

    Affected Products : junos mx10 mx104 mx2010 mx2020 mx240 mx40 mx480 mx80 mx960 +8 more products
    • EPSS Score: %0.27
    • Published: Oct. 19, 2021
    • Modified: Nov. 21, 2024
  • 7.8

    HIGH
    CVE-2021-31368

    An Uncontrolled Resource Consumption vulnerability in the kernel of Juniper Networks JUNOS OS allows an unauthenticated network based attacker to cause 100% CPU load and the device to become unresponsive by sending a flood of traffic to the out-of-band ma... Read more

    Affected Products : junos ex2300 ex2300-c ex2300m ex3400 acx710
    • EPSS Score: %0.51
    • Published: Oct. 19, 2021
    • Modified: Nov. 21, 2024
  • 6.5

    MEDIUM
    CVE-2021-31367

    A Missing Release of Memory after Effective Lifetime vulnerability in the Packet Forwarding Engine (PFE) of Juniper Networks Junos OS on PTX Series allows an adjacent attacker to cause a Denial of Service (DoS) by sending genuine BGP flowspec packets whic... Read more

    • EPSS Score: %0.08
    • Published: Oct. 19, 2021
    • Modified: Nov. 21, 2024
  • 6.5

    MEDIUM
    CVE-2021-31366

    An Unchecked Return Value vulnerability in the authd (authentication daemon) of Juniper Networks Junos OS on MX Series configured for subscriber management / BBE allows an adjacent attacker to cause a crash by sending a specific username. This impacts aut... Read more

    Affected Products : junos mx10 mx104 mx2010 mx2020 mx240 mx40 mx480 mx80 mx960 +7 more products
    • EPSS Score: %0.23
    • Published: Oct. 19, 2021
    • Modified: Nov. 21, 2024
  • 6.5

    MEDIUM
    CVE-2021-31365

    An Uncontrolled Resource Consumption vulnerability in Juniper Networks Junos OS on EX2300, EX3400 and EX4300 Series platforms allows an adjacent attacker sending a stream of layer 2 frames will trigger an Aggregated Ethernet (AE) interface to go down and ... Read more

    Affected Products : junos ex2300 ex3400 ex4300 ex4300-mp
    • EPSS Score: %0.08
    • Published: Oct. 19, 2021
    • Modified: Nov. 21, 2024
  • 5.9

    MEDIUM
    CVE-2021-31364

    An Improper Check for Unusual or Exceptional Conditions vulnerability combined with a Race Condition in the flow daemon (flowd) of Juniper Networks Junos OS on SRX300 Series, SRX500 Series, SRX1500, and SRX5000 Series with SPC2 allows an unauthenticated n... Read more

    Affected Products : junos srx550 srx5600 srx5800 srx1500 srx300 srx320 srx340 srx345 srx380 +4 more products
    • EPSS Score: %0.22
    • Published: Oct. 19, 2021
    • Modified: Nov. 21, 2024
  • 6.5

    MEDIUM
    CVE-2021-31363

    In an MPLS P2MP environment a Loop with Unreachable Exit Condition vulnerability in the routing protocol daemon (RPD) of Juniper Networks Junos OS and Junos OS Evolved allows an unauthenticated adjacent attacker to cause high load on RPD which in turn may... Read more

    Affected Products : junos junos_os_evolved
    • EPSS Score: %0.08
    • Published: Oct. 19, 2021
    • Modified: Nov. 21, 2024
  • 6.5

    MEDIUM
    CVE-2021-31362

    A Protection Mechanism Failure vulnerability in RPD (routing protocol daemon) of Juniper Networks Junos OS and Junos OS Evolved allows an adjacent unauthenticated attacker to cause established IS-IS adjacencies to go down by sending a spoofed hello PDU le... Read more

    Affected Products : junos junos_os_evolved
    • EPSS Score: %0.08
    • Published: Oct. 19, 2021
    • Modified: Nov. 21, 2024
  • 5.3

    MEDIUM
    CVE-2021-31361

    An Improper Check for Unusual or Exceptional Conditions vulnerability combined with Improper Handling of Exceptional Conditions in Juniper Networks Junos OS on QFX Series and PTX Series allows an unauthenticated network based attacker to cause increased F... Read more

    • EPSS Score: %0.46
    • Published: Oct. 19, 2021
    • Modified: Nov. 21, 2024
  • 7.1

    HIGH
    CVE-2021-31360

    An improper privilege management vulnerability in the Juniper Networks Junos OS and Junos OS Evolved command-line interpreter (CLI) allows a low-privileged user to overwrite local files as root, possibly leading to a system integrity issue or Denial of Se... Read more

    Affected Products : junos junos_os_evolved
    • EPSS Score: %0.12
    • Published: Oct. 19, 2021
    • Modified: Nov. 21, 2024
  • 7.8

    HIGH
    CVE-2021-31359

    A local privilege escalation vulnerability in Juniper Networks Junos OS and Junos OS Evolved allows a local, low-privileged user to cause the Juniper DHCP daemon (jdhcpd) process to crash, resulting in a Denial of Service (DoS), or execute arbitrary comma... Read more

    Affected Products : junos junos_os_evolved
    • EPSS Score: %0.08
    • Published: Oct. 19, 2021
    • Modified: Nov. 21, 2024
  • 7.8

    HIGH
    CVE-2021-31358

    A command injection vulnerability in sftp command processing on Juniper Networks Junos OS Evolved allows an attacker with authenticated CLI access to be able to bypass configured access protections to execute arbitrary shell commands within the context of... Read more

    Affected Products : junos_os_evolved
    • EPSS Score: %0.12
    • Published: Oct. 19, 2021
    • Modified: Nov. 21, 2024
  • 7.8

    HIGH
    CVE-2021-31357

    A command injection vulnerability in tcpdump command processing on Juniper Networks Junos OS Evolved allows an attacker with authenticated CLI access to be able to bypass configured access protections to execute arbitrary shell commands within the context... Read more

    Affected Products : junos_os_evolved
    • EPSS Score: %0.12
    • Published: Oct. 19, 2021
    • Modified: Nov. 21, 2024
  • 7.8

    HIGH
    CVE-2021-31356

    A command injection vulnerability in command processing on Juniper Networks Junos OS Evolved allows an attacker with authenticated CLI access to be able to bypass configured access protections to execute arbitrary shell commands within the context of the ... Read more

    Affected Products : junos_os_evolved
    • EPSS Score: %0.14
    • Published: Oct. 19, 2021
    • Modified: Nov. 21, 2024
Showing 20 of 292516 Results