Latest CVE Feed
-
5.3
MEDIUMCVE-2021-31361
An Improper Check for Unusual or Exceptional Conditions vulnerability combined with Improper Handling of Exceptional Conditions in Juniper Networks Junos OS on QFX Series and PTX Series allows an unauthenticated network based attacker to cause increased F... Read more
Affected Products : junos ptx1000 ptx1000-72q ptx10000 ptx10001 ptx10001-36mr ptx100016 ptx10002 ptx10002-60c ptx10003 +34 more products- Published: Oct. 19, 2021
- Modified: Nov. 21, 2024
-
7.1
HIGHCVE-2021-31360
An improper privilege management vulnerability in the Juniper Networks Junos OS and Junos OS Evolved command-line interpreter (CLI) allows a low-privileged user to overwrite local files as root, possibly leading to a system integrity issue or Denial of Se... Read more
- Published: Oct. 19, 2021
- Modified: Nov. 21, 2024
-
7.8
HIGHCVE-2021-31359
A local privilege escalation vulnerability in Juniper Networks Junos OS and Junos OS Evolved allows a local, low-privileged user to cause the Juniper DHCP daemon (jdhcpd) process to crash, resulting in a Denial of Service (DoS), or execute arbitrary comma... Read more
- Published: Oct. 19, 2021
- Modified: Nov. 21, 2024
-
7.8
HIGHCVE-2021-31358
A command injection vulnerability in sftp command processing on Juniper Networks Junos OS Evolved allows an attacker with authenticated CLI access to be able to bypass configured access protections to execute arbitrary shell commands within the context of... Read more
Affected Products : junos_os_evolved- Published: Oct. 19, 2021
- Modified: Nov. 21, 2024
-
7.8
HIGHCVE-2021-31357
A command injection vulnerability in tcpdump command processing on Juniper Networks Junos OS Evolved allows an attacker with authenticated CLI access to be able to bypass configured access protections to execute arbitrary shell commands within the context... Read more
Affected Products : junos_os_evolved- Published: Oct. 19, 2021
- Modified: Nov. 21, 2024
-
7.8
HIGHCVE-2021-31356
A command injection vulnerability in command processing on Juniper Networks Junos OS Evolved allows an attacker with authenticated CLI access to be able to bypass configured access protections to execute arbitrary shell commands within the context of the ... Read more
Affected Products : junos_os_evolved- Published: Oct. 19, 2021
- Modified: Nov. 21, 2024
-
8.0
HIGHCVE-2021-31355
A persistent cross-site scripting (XSS) vulnerability in the captive portal graphical user interface of Juniper Networks Junos OS may allow a remote authenticated user to inject web script or HTML and steal sensitive data and credentials from a web admini... Read more
Affected Products : junos- Published: Oct. 19, 2021
- Modified: Nov. 21, 2024
-
8.8
HIGHCVE-2021-31354
An Out Of Bounds (OOB) access vulnerability in the handling of responses by a Juniper Agile License (JAL) Client in Juniper Networks Junos OS and Junos OS Evolved, configured in Network Mode (to use Juniper Agile License Manager) may allow an attacker to ... Read more
- Published: Oct. 19, 2021
- Modified: Nov. 21, 2024
-
7.5
HIGHCVE-2021-31353
An Improper Handling of Exceptional Conditions vulnerability in Juniper Networks Junos OS and Junos OS Evolved allows an attacker to inject a specific BGP update, causing the routing protocol daemon (RPD) to crash and restart, leading to a Denial of Servi... Read more
- Published: Oct. 19, 2021
- Modified: Nov. 21, 2024
-
5.3
MEDIUMCVE-2021-31352
An Information Exposure vulnerability in Juniper Networks SRC Series devices configured for NETCONF over SSH permits the negotiation of weak ciphers, which could allow a remote attacker to obtain sensitive information. A remote attacker with read and writ... Read more
Affected Products : session_and_resource_control- Published: Oct. 19, 2021
- Modified: Nov. 21, 2024
-
7.5
HIGHCVE-2021-31351
An Improper Check for Unusual or Exceptional Conditions in packet processing on the MS-MPC/MS-MIC utilized by Juniper Networks Junos OS allows a malicious attacker to send a specific packet, triggering the MS-MPC/MS-MIC to reset, causing a Denial of Servi... Read more
- Published: Oct. 19, 2021
- Modified: Nov. 21, 2024
-
9.0
HIGHCVE-2021-31350
An Improper Privilege Management vulnerability in the gRPC framework, used by the Juniper Extension Toolkit (JET) API on Juniper Networks Junos OS and Junos OS Evolved, allows a network-based, low-privileged authenticated attacker to perform operations as... Read more
- Published: Oct. 19, 2021
- Modified: Nov. 21, 2024
-
9.8
CRITICALCVE-2021-31349
The usage of an internal HTTP header created an authentication bypass vulnerability (CWE-287), allowing an attacker to view internal files, change settings, manipulate services and execute arbitrary code. This issue affects all Juniper Networks 128 Techno... Read more
Affected Products : 128_technology_session_smart_router_firmware 128_technology_session_smart_router- Published: Oct. 19, 2021
- Modified: Nov. 21, 2024
-
6.5
MEDIUMCVE-2021-31348
An issue was discovered in libezxml.a in ezXML 0.8.6. The function ezxml_parse_str() performs incorrect memory handling while parsing crafted XML files (out-of-bounds read after a certain strcspn failure).... Read more
- Published: Apr. 16, 2021
- Modified: Nov. 21, 2024
-
6.5
MEDIUMCVE-2021-31347
An issue was discovered in libezxml.a in ezXML 0.8.6. The function ezxml_parse_str() performs incorrect memory handling while parsing crafted XML files (writing outside a memory region created by mmap).... Read more
- Published: Apr. 16, 2021
- Modified: Nov. 21, 2024
-
9.1
CRITICALCVE-2021-31346
A vulnerability has been identified in Capital Embedded AR Classic 431-422 (All versions), Capital Embedded AR Classic R20-11 (All versions < V2303), PLUSCONTROL 1st Gen (All versions), SIMOTICS CONNECT 400 (All versions < V0.5.0.0), SIMOTICS CONNECT 400 ... Read more
- Published: Nov. 09, 2021
- Modified: Nov. 21, 2024
-
9.1
CRITICALCVE-2021-31345
A vulnerability has been identified in Capital Embedded AR Classic 431-422 (All versions), Capital Embedded AR Classic R20-11 (All versions < V2303), PLUSCONTROL 1st Gen (All versions). The total length of an UDP payload (set in the IP header) is unchecke... Read more
Affected Products : apogee_pxc_modular_firmware talon_tc_compact_firmware talon_tc_modular_firmware capital_vstar nucleus_net nucleus_readystart_v3 nucleus_source_code apogee_modular_building_controller_firmware apogee_modular_equiment_controller_firmware apogee_pxc_compact_firmware +27 more products- Published: Nov. 09, 2021
- Modified: Nov. 21, 2024
-
6.9
MEDIUMCVE-2021-31344
A vulnerability has been identified in Capital Embedded AR Classic 431-422 (All versions), Capital Embedded AR Classic R20-11 (All versions < V2303), PLUSCONTROL 1st Gen (All versions), SIMOTICS CONNECT 400 (All versions < V0.5.0.0), SIMOTICS CONNECT 400 ... Read more
- Published: Nov. 09, 2021
- Modified: Nov. 21, 2024
-
8.8
HIGHCVE-2021-31343
The jutil.dll library in all versions of Solid Edge SE2020 before 2020MP14 and all versions of Solid Edge SE2021 before SE2021MP5 lack proper validation of user-supplied data when parsing DFT files. This could result in an out-of-bounds write past the end... Read more
- Published: Jun. 08, 2021
- Modified: Nov. 21, 2024
-
8.8
HIGHCVE-2021-31342
The ugeom2d.dll library in all versions of Solid Edge SE2020 before 2020MP14 and all versions of Solid Edge SE2021 before SE2021MP5 lack proper validation of user-supplied data when parsing DFT files. This could result in an out-of-bounds write past the e... Read more
- Published: Jun. 08, 2021
- Modified: Nov. 21, 2024