Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
| Vendor | Product | Affected Versions | CPE | Subscribe |
|---|---|---|---|---|
| Juniper Networks | Junos OS | 12.3 ~ 12.3R12-S19 | - | |
| Juniper Networks | Junos OS | 15.1 ~ 15.1R7-S10 | - |
| # | POC Description | Source Link | Shenlong Link |
|---|
No public POC found.
Login to generate AI POC| CVE-2021-31349 | 9.8 CRITICAL | Session Smart Router: Authentication Bypass Vulnerability |
| CVE-2021-31372 | 8.8 HIGH | Junos OS: J-Web allows a locally authenticated attacker to escalate their privileges to ro |
| CVE-2021-31373 | 8.0 HIGH | Junos OS: SRX Series: Persistent XSS vulnerability in J-Web |
| CVE-2021-31355 | 8.0 HIGH | Junos OS: Stored Cross-Site Scripting (XSS) vulnerability in captive portal |
| CVE-2021-31359 | 7.8 HIGH | Junos OS and Junos OS Evolved: Local Privilege Escalation vulnerability |
| CVE-2021-31358 | 7.8 HIGH | Junos OS Evolved: shell-injection vulnerabilities in evo_sftp UI wrapper script |
| CVE-2021-31357 | 7.8 HIGH | Junos OS Evolved: shell-injection vulnerabilities in evo_tcpdump UI wrapper script |
| CVE-2021-31356 | 7.8 HIGH | Junos OS Evolved: Multiple shell-injection vulnerabilities in EVO UI wrapper scripts |
| CVE-2021-31376 | 7.5 HIGH | Junos OS: ACX Series: Packet Forwarding Engine manager (FXPC) process crashes when process |
| CVE-2021-31368 | 7.5 HIGH | Junos OS: EX2300 Series, EX3400 Series, and ACX710 might become unresponsive if the out-of |
| CVE-2021-31374 | 7.5 HIGH | Junos OS and Junos OS Evolved: RPD crash while processing a specially crafted BGP UPDATE o |
| CVE-2021-31353 | 7.5 HIGH | Junos OS and Junos OS Evolved: RPD core upon receipt of specific BGP update |
| CVE-2021-31351 | 7.5 HIGH | Junos OS: MX Series: Receipt of specific packet on MS-MPC/MS-MIC causes line card reset |
| CVE-2021-31379 | 7.5 HIGH | Junos OS: MX Series: MPC 7/8/9/10/11 cards with MAP-E: PFE halts when an attacker sends ma |
| CVE-2021-31350 | 7.5 HIGH | Junos OS and Junos OS Evolved: Privilege escalation vulnerability in Juniper Extension Too |
| CVE-2021-0299 | 7.5 HIGH | Junos OS: Kernel crash (vmcore) upon receipt of a malformed IPv6 packet |
| CVE-2021-31383 | 7.5 HIGH | Junos OS and Junos OS Evolved: In Point to MultiPoint (P2MP) scenarios receipt of various |
| CVE-2021-0296 | 7.4 HIGH | CTPView: HSTS not being enforced on CTPView server. |
| CVE-2021-31384 | 7.2 HIGH | Junos OS: SRX Series: Under a specific device configuration an attacker can access the dev |
| CVE-2021-31375 | 7.2 HIGH | Junos OS: Receipt of a specific BGP update may cause RPKI policy-checks to be bypassed |
Showing top 20 of 42 CVEs. View all on vendor page → →
No comments yet