Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
| Vendor | Product | Affected Versions | CPE | Subscribe |
|---|---|---|---|---|
| Juniper Networks | Junos OS | 0 ~ 21.4R3-S11 | - | |
| Juniper Networks | Junos OS Evolved | 0 ~ 22.2R3-S7-EVO | - |
| # | POC Description | Source Link | Shenlong Link |
|---|
No public POC found.
Login to generate AI POC| CVE-2025-52950 | 9.6 CRITICAL | Juniper Security Director: Insufficient authorization for multiple endpoints in web interf |
| CVE-2025-52954 | 7.8 HIGH | Junos OS Evolved: A low-privileged user can execute arbitrary Junos commands and modify th |
| CVE-2025-52946 | 7.5 HIGH | Junos OS and Junos OS Evolved: With traceoptions enabled, receipt of malformed AS PATH cau |
| CVE-2025-52981 | 7.5 HIGH | Junos OS: SRX Series: Sequence of specific PIM packets causes a flowd crash |
| CVE-2025-52980 | 7.5 HIGH | Junos OS: SRX300 Series: rpd will crash upon receiving a specific, valid BGP UPDATE messag |
| CVE-2025-30661 | 7.3 HIGH | Junos OS: Low-privileged user can cause script to run as root, leading to privilege escala |
| CVE-2025-52983 | 7.2 HIGH | Junos OS: After removing ssh public key authentication root can still log in |
| CVE-2025-52988 | 6.7 MEDIUM | Junos OS and Junos OS Evolved: Privilege escalation to root via CLI command 'request syste |
| CVE-2025-6549 | 6.5 MEDIUM | Junos OS: SRX Series: J-Web can be exposed on additional interfaces |
| CVE-2025-52947 | 6.5 MEDIUM | Junos OS: ACX Series: When 'hot-standby' mode is configured for an L2 circuit, interface f |
| CVE-2025-52955 | 6.5 MEDIUM | Junos OS and Junos OS Evolved: When jflow/sflow is configured continuous logical interface |
| CVE-2025-52952 | 6.5 MEDIUM | Junos OS: MX Series with MPC-BUILTIN, MPC 1 through MPC 9: Receipt and processing of a mal |
| CVE-2025-52953 | 6.5 MEDIUM | Junos OS and Junos OS Evolved: An unauthenticated adjacent attacker sending a valid BGP UP |
| CVE-2025-52964 | 6.5 MEDIUM | Junos OS and Junos OS Evolved: Receipt of a specific BGP UPDATE causes an rpd crash on dev |
| CVE-2025-52982 | 5.9 MEDIUM | Junos OS: MX Series: When specific SIP packets are processed the MS-MPC will crash |
| CVE-2025-52984 | 5.9 MEDIUM | Junos OS and Junos OS Evolved: When a static route points to a reject next-hop and a gNMI |
| CVE-2025-52948 | 5.9 MEDIUM | Junos OS: Specific unknown traffic pattern causes FPC and system to crash when packet capt |
| CVE-2025-52951 | 5.8 MEDIUM | Junos OS: IPv6 firewall filter fails to match payload-protocol |
| CVE-2025-52963 | 5.5 MEDIUM | Junos OS: A low-privileged user can disable an interface |
| CVE-2025-52986 | 5.5 MEDIUM | Junos OS and Junos OS Evolved: When RIB sharding is configured each time a show command is |
Showing top 20 of 24 CVEs. View all on vendor page → →
No comments yet