Latest CVE Feed
-
7.8
HIGHCVE-2025-7028
A vulnerability in the Software SMI handler (SwSmiInputValue 0x20) allows a local attacker to supply a crafted pointer (FuncBlock) through RBX and RCX register values. This pointer is passed unchecked into multiple flash management functions (ReadFlash, W... Read more
Affected Products :- Published: Jul. 11, 2025
- Modified: Jul. 15, 2025
- Vuln Type: Memory Corruption
-
8.2
HIGHCVE-2025-7027
A vulnerability in the Software SMI handler (SwSmiInputValue 0xB2) allows a local attacker to control both the read and write addresses used by the CommandRcx1 function. The write target is derived from an unvalidated UEFI NVRAM variable (SetupXtuBufferAd... Read more
Affected Products :- Published: Jul. 11, 2025
- Modified: Jul. 15, 2025
- Vuln Type: Memory Corruption
-
8.2
HIGHCVE-2025-7026
A vulnerability in the Software SMI handler (SwSmiInputValue 0xB2) allows a local attacker to control the RBX register, which is used as an unchecked pointer in the CommandRcx0 function. If the contents at RBX match certain expected values (e.g., '$DB$' o... Read more
Affected Products :- Published: Jul. 11, 2025
- Modified: Jul. 15, 2025
- Vuln Type: Memory Corruption
-
6.9
MEDIUMCVE-2025-6549
An Incorrect Authorization vulnerability in the web server of Juniper Networks Junos OS on SRX Series allows an unauthenticated, network-based attacker to reach the Juniper Web Device Manager (J-Web). When Juniper Secure connect (JSC) is enabled on s... Read more
Affected Products : junos- Published: Jul. 11, 2025
- Modified: Jul. 15, 2025
- Vuln Type: Authorization
-
6.8
MEDIUMCVE-2025-52989
An Improper Neutralization of Delimiters vulnerability in the UI of Juniper Networks Junos OS and Junos OS Evolved allows a local, authenticated attacker with high privileges to modify the system configuration. A user with limited configuration and com... Read more
- Published: Jul. 11, 2025
- Modified: Jul. 15, 2025
- Vuln Type: Authorization
-
8.4
HIGHCVE-2025-52988
An Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') vulnerability in the CLI of Juniper Networks Junos OS and Junos OS Evolved allows a high privileged, local attacker to escalated their privileges to root. When ... Read more
- Published: Jul. 11, 2025
- Modified: Jul. 15, 2025
- Vuln Type: Injection
-
6.8
MEDIUMCVE-2025-52986
A Missing Release of Memory after Effective Lifetime vulnerability in the routing protocol daemon (rpd) of Juniper Networks Junos OS and Junos OS Evolved allows a local, low privileged user to cause an impact to the availability of the device. When RIB s... Read more
- Published: Jul. 11, 2025
- Modified: Jul. 15, 2025
- Vuln Type: Memory Corruption
-
6.9
MEDIUMCVE-2025-52985
A Use of Incorrect Operator vulnerability in the Routing Engine firewall of Juniper Networks Junos OS Evolved allows an unauthenticated, network-based attacker to bypass security restrictions. When a firewall filter which is applied to the lo0 or re:mgm... Read more
Affected Products : junos_os_evolved- Published: Jul. 11, 2025
- Modified: Jul. 18, 2025
- Vuln Type: Authorization
-
8.2
HIGHCVE-2025-52984
A NULL Pointer Dereference vulnerability in the routing protocol daemon (rpd) of Juniper Networks Junos OS and Junos OS Evolved allows an unauthenticated, network-based attacker to cause impact to the availability of the device. When static route points ... Read more
- Published: Jul. 11, 2025
- Modified: Jul. 15, 2025
- Vuln Type: Denial of Service
-
8.6
HIGHCVE-2025-52983
A UI Discrepancy for Security Feature vulnerability in the UI of Juniper Networks Junos OS on VM Host systems allows a network-based, unauthenticated attacker to access the device. On VM Host Routing Engines (RE), even if the configured public key for... Read more
Affected Products : junos- Published: Jul. 11, 2025
- Modified: Jul. 15, 2025
- Vuln Type: Authentication
-
8.2
HIGHCVE-2025-52982
An Improper Resource Shutdown or Release vulnerability in the SIP ALG of Juniper Networks Junos OS on MX Series with MS-MPC allows an unauthenticated, network-based attacker to cause a Denial-of-Service (DoS). When an MX Series device with an MS-MPC is c... Read more
Affected Products : junos- Published: Jul. 11, 2025
- Modified: Jul. 15, 2025
- Vuln Type: Denial of Service
-
8.7
HIGHCVE-2025-52981
An Improper Check for Unusual or Exceptional Conditions vulnerability in the flow processing daemon (flowd) of Juniper Networks Junos OS on SRX1600, SRX2300, SRX 4000 Series, and SRX5000 Series with SPC3 allows an unauthenticated, network-base... Read more
Affected Products : junos- Published: Jul. 11, 2025
- Modified: Jul. 15, 2025
- Vuln Type: Denial of Service
-
8.7
HIGHCVE-2025-52980
A Use of Incorrect Byte Ordering vulnerability in the Routing Protocol Daemon (rpd) of Juniper Networks Junos OS on SRX300 Series allows an unauthenticated, network-based attacker to cause a Denial-of-Service (DoS). When a BGP update is received ov... Read more
Affected Products : junos- Published: Jul. 11, 2025
- Modified: Jul. 15, 2025
- Vuln Type: Denial of Service
-
4.9
MEDIUMCVE-2025-52994
gif_outputAsJpeg in phpThumb through 1.7.23 allows phpthumb.gif.php OS Command Injection via a crafted parameter value. This is fixed in 1.7.23-202506081709.... Read more
Affected Products : phpthumb- Published: Jul. 11, 2025
- Modified: Jul. 15, 2025
- Vuln Type: Injection
-
7.1
HIGHCVE-2025-52964
A Reachable Assertion vulnerability in the Routing Protocol Daemon (rpd) of Juniper Networks Junos OS and Junos OS Evolved allows an unauthenticated, network-based attacker to cause a Denial of Service (DoS). When the device receives a specific BGP UPDAT... Read more
- Published: Jul. 11, 2025
- Modified: Jul. 15, 2025
- Vuln Type: Denial of Service
-
6.8
MEDIUMCVE-2025-52963
An Improper Access Control vulnerability in the User Interface (UI) of Juniper Networks Junos OS allows a local, low-privileged attacker to bring down an interface, leading to a Denial-of-Service. Users with "view" permissions can run a specific request ... Read more
Affected Products : junos- Published: Jul. 11, 2025
- Modified: Jul. 15, 2025
- Vuln Type: Authorization
-
6.0
MEDIUMCVE-2025-52958
A Reachable Assertion vulnerability in the routing protocol daemon (rpd) of Juniper Networks Junos OS and Junos OS Evolved allows an adjacent, unauthenticated attacker to cause a Denial of Service (DoS).On all Junos OS and Junos OS Evolved devices, when r... Read more
- Published: Jul. 11, 2025
- Modified: Jul. 15, 2025
- Vuln Type: Denial of Service
-
7.1
HIGHCVE-2025-52955
An Incorrect Calculation of Buffer Size vulnerability in the routing protocol daemon (rpd) of Juniper Networks Junos OS and Junos OS Evolved allows an adjacent unauthenticated attacker to cause a memory corruption that leads to a rpd crash. Wh... Read more
- Published: Jul. 11, 2025
- Modified: Aug. 20, 2025
- Vuln Type: Memory Corruption
-
8.5
HIGHCVE-2025-52954
A Missing Authorization vulnerability in the internal virtual routing and forwarding (VRF) of Juniper Networks Junos OS Evolved allows a local, low-privileged user to gain root privileges, leading to a system compromise. Any low-privileged user with the ... Read more
Affected Products : junos_os_evolved- Published: Jul. 11, 2025
- Modified: Jul. 15, 2025
- Vuln Type: Authorization
-
7.1
HIGHCVE-2025-52953
An Expected Behavior Violation vulnerability in the routing protocol daemon (rpd) of Juniper Networks Junos OS and Junos OS Evolved allows an unauthenticated adjacent attacker sending a valid BGP UPDATE packet to cause a BGP session reset, resulting in a ... Read more
- Published: Jul. 11, 2025
- Modified: Jul. 15, 2025
- Vuln Type: Denial of Service