Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
| Vendor | Product | Affected Versions | CPE | Subscribe |
|---|---|---|---|---|
| Juniper Networks | Junos OS | 16.1 ~ 16.1R7-S6 | - |
| # | POC Description | Source Link | Shenlong Link |
|---|
No public POC found.
Login to generate AI POC| CVE-2020-1614 | 10.0 CRITICAL | NFX250 Series: Hardcoded credentials in the vSRX VNF instance. |
| CVE-2020-1615 | 9.8 CRITICAL | Junos OS: vMX: Default credentials supplied in vMX configuration |
| CVE-2020-1613 | 8.6 HIGH | Junos OS: BGP session termination upon receipt of specific BGP FlowSpec advertisement. |
| CVE-2020-1639 | 7.5 HIGH | Junos OS: A crafted Ethernet OAM packet received by Junos may cause the Ethernet OAM conne |
| CVE-2020-1617 | 7.5 HIGH | Junos OS: PTX1000 and PTX10000 Series, QFX10000 Series using non-AFT architectures: A spec |
| CVE-2020-1626 | 7.5 HIGH | Junos OS Evolved: Denial of Service vulnerability in processing high rate of specific pack |
| CVE-2020-1627 | 7.5 HIGH | Junos OS: vMX and MX150: Denial of Service vulnerability in packet processing |
| CVE-2020-1634 | 7.5 HIGH | Junos OS: High-End SRX Series: Multicast traffic might cause all FPCs to reset. |
| CVE-2020-1638 | 7.5 HIGH | Junos OS & Junos OS Evolved: A specific IPv4 packet can lead to FPC restart. |
| CVE-2020-1637 | 7.2 HIGH | Junos OS: SRX Series: Unified Access Control (UAC) bypass vulnerability |
| CVE-2020-1618 | 6.3 MEDIUM | Junos OS: EX and QFX Series: Console port authentication bypass vulnerability |
| CVE-2020-1619 | 6.0 MEDIUM | Junos OS: QFX10K Series, EX9200 Series, MX Series, PTX Series: Privilege escalation vulner |
| CVE-2020-1629 | 5.9 MEDIUM | Junos OS: A race condition vulnerability may cause RPD daemon to crash when processing a B |
| CVE-2020-1624 | 5.5 MEDIUM | Junos OS Evolved: objmon logs may leak sensitive information |
| CVE-2020-1622 | 5.5 MEDIUM | Junos OS Evolved: EvoSharedObjStore may leak sensitive information |
| CVE-2020-1623 | 5.5 MEDIUM | Junos OS Evolved: ev.ops file may leak sensitive information |
| CVE-2020-1620 | 5.5 MEDIUM | Junos OS Evolved: Configd leaks hashes via log file and is world readable |
| CVE-2020-1621 | 5.5 MEDIUM | Junos OS Evolved: Configd leaks hashes via stream and is world readable |
| CVE-2020-1628 | 5.3 MEDIUM | Junos OS: EX4300: Traffic from the network internal to the device (128.0.0.0) may be forwa |
| CVE-2020-1616 | 5.3 MEDIUM | JATP Series: JATP Is susceptible to slow brute force attacks on the SSH service. |
Showing top 20 of 22 CVEs. View all on vendor page → →
No comments yet