Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
| Vendor | Product | Affected Versions | CPE | Subscribe |
|---|---|---|---|---|
| Juniper Networks | Junos OS | unspecified ~ 19.3R3-S2 | - | |
| Juniper Networks | Junos OS Evolved | unspecified ~ 20.4R2-S3-EVO, 20.4R3-EVO | - |
| # | POC Description | Source Link | Shenlong Link |
|---|
No public POC found.
Login to generate AI POC| CVE-2021-31349 | 9.8 CRITICAL | Session Smart Router: Authentication Bypass Vulnerability |
| CVE-2021-31385 | 8.8 HIGH | Junos OS: J-Web: A path traversal vulnerability allows an authenticated attacker to elevat |
| CVE-2021-31372 | 8.8 HIGH | Junos OS: J-Web allows a locally authenticated attacker to escalate their privileges to ro |
| CVE-2021-31373 | 8.0 HIGH | Junos OS: SRX Series: Persistent XSS vulnerability in J-Web |
| CVE-2021-31355 | 8.0 HIGH | Junos OS: Stored Cross-Site Scripting (XSS) vulnerability in captive portal |
| CVE-2021-31356 | 7.8 HIGH | Junos OS Evolved: Multiple shell-injection vulnerabilities in EVO UI wrapper scripts |
| CVE-2021-31359 | 7.8 HIGH | Junos OS and Junos OS Evolved: Local Privilege Escalation vulnerability |
| CVE-2021-31358 | 7.8 HIGH | Junos OS Evolved: shell-injection vulnerabilities in evo_sftp UI wrapper script |
| CVE-2021-31357 | 7.8 HIGH | Junos OS Evolved: shell-injection vulnerabilities in evo_tcpdump UI wrapper script |
| CVE-2021-31376 | 7.5 HIGH | Junos OS: ACX Series: Packet Forwarding Engine manager (FXPC) process crashes when process |
| CVE-2021-31379 | 7.5 HIGH | Junos OS: MX Series: MPC 7/8/9/10/11 cards with MAP-E: PFE halts when an attacker sends ma |
| CVE-2021-31374 | 7.5 HIGH | Junos OS and Junos OS Evolved: RPD crash while processing a specially crafted BGP UPDATE o |
| CVE-2021-31351 | 7.5 HIGH | Junos OS: MX Series: Receipt of specific packet on MS-MPC/MS-MIC causes line card reset |
| CVE-2021-31350 | 7.5 HIGH | Junos OS and Junos OS Evolved: Privilege escalation vulnerability in Juniper Extension Too |
| CVE-2021-31383 | 7.5 HIGH | Junos OS and Junos OS Evolved: In Point to MultiPoint (P2MP) scenarios receipt of various |
| CVE-2021-0299 | 7.5 HIGH | Junos OS: Kernel crash (vmcore) upon receipt of a malformed IPv6 packet |
| CVE-2021-31368 | 7.5 HIGH | Junos OS: EX2300 Series, EX3400 Series, and ACX710 might become unresponsive if the out-of |
| CVE-2021-0296 | 7.4 HIGH | CTPView: HSTS not being enforced on CTPView server. |
| CVE-2021-31384 | 7.2 HIGH | Junos OS: SRX Series: Under a specific device configuration an attacker can access the dev |
| CVE-2021-31375 | 7.2 HIGH | Junos OS: Receipt of a specific BGP update may cause RPKI policy-checks to be bypassed |
Showing top 20 of 42 CVEs. View all on vendor page → →
No comments yet