Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

Juniper Networks — Vulnerabilities & Security Advisories 893

Browse all 893 CVE security advisories affecting Juniper Networks. AI-powered Chinese analysis, POCs, and references for each vulnerability.

Juniper Networks operates as a global provider of networking hardware, software, and services, primarily focusing on enterprise and service provider infrastructure. With 893 recorded Common Vulnerabilities and Exposures, the company’s attack surface reflects the complexity of its extensive product portfolio. Historically, vulnerabilities in its systems have frequently involved remote code execution, cross-site scripting, and privilege escalation flaws, often stemming from input validation errors or improper access controls in management interfaces. Notable incidents include critical flaws in ScreenOS and Junos OS that allowed attackers to bypass authentication or execute arbitrary commands, highlighting risks in legacy and core routing platforms. These issues underscore the necessity for rigorous patch management and secure configuration practices. As a foundational element of global internet infrastructure, the security posture of Juniper Networks directly impacts the stability and integrity of connected networks worldwide, necessitating continuous monitoring and proactive defense strategies.

CVE IDTitleCVSSSeverityPublished
CVE-2019-0023 Juniper ATP: Persistent Cross-Site Scripting vulnerability in the Golden VM menu — Juniper ATP 5.4 -2019-01-15
CVE-2019-0024 Juniper ATP: Persistent Cross-Site Scripting vulnerability in the Email Collectors menu — Juniper ATP 5.4 -2019-01-15
CVE-2019-0025 Juniper ATP: Persistent Cross-Site Scripting vulnerability in RADIUS configuration menu — Juniper ATP 5.4 -2019-01-15
CVE-2019-0026 Juniper ATP: Persistent Cross-Site Scripting vulnerability in Zone configuration — Juniper ATP 5.4 -2019-01-15
CVE-2019-0027 Juniper ATP: Persistent Cross-Site Scripting vulnerability in Snort Rules configuration — Juniper ATP 5.4 -2019-01-15
CVE-2019-0029 Juniper ATP: Splunk credentials are in logged in clear text — Juniper ATP 7.8 -2019-01-15
CVE-2019-0030 Juniper ATP: Password hashing uses DES and a hardcoded salt — Juniper ATPCWE-327 9.8 -2019-01-15
CVE-2018-0043 Junos OS: RPD daemon crashes upon receipt of specific MPLS packet — Junos OS 8.8 -2018-10-10
CVE-2018-0044 NFX Series: Insecure sshd configuration in Juniper Device Manager (JDM) and host OS — Junos OS 8.1 -2018-10-10
CVE-2018-0045 Junos OS: RPD daemon crashes due to receipt of specific Draft-Rosen MVPN control packet in Draft-Rosen MVPN configuration — Junos OS 9.8 -2018-10-10
CVE-2018-0046 Junos Space: Reflected Cross-site Scripting vulnerability in OpenNMS — Junos Space 6.1 -2018-10-10
CVE-2018-0047 Junos Space Security Director: XSS vulnerability in web administration — Junos Space Security Director 5.4 -2018-10-10
CVE-2018-0048 Junos OS: Memory exhaustion denial of service vulnerability in Routing Protocols Daemon (RPD) with Juniper Extension Toolkit (JET) support. — Junos OSCWE-400 7.5 -2018-10-10
CVE-2018-0049 Junos OS: Receipt of a specifically crafted malicious MPLS packet leads to a Junos kernel crash. — Junos OS 7.5 -2018-10-10
CVE-2018-0050 Junos OS: Receipt of a malformed MPLS RSVP packet leads to a Routing Protocols Daemon (RPD) crash. — Junos OS 7.5 -2018-10-10
CVE-2018-0051 Junos OS: Denial of Service vulnerability in MS-PIC, MS-MIC, MS-MPC, MS-DPC and SRX flow daemon (flowd) related to SIP ALG — Junos OS 5.9 -2018-10-10
CVE-2018-0052 Junos OS: Unauthenticated remote root access possible when RSH service is enabled — Junos OS 9.8 -2018-10-10
CVE-2018-0053 vSRX Series: A local authentication vulnerability may lead to full control of a vSRX instance while the system is booting. — Junos OS 6.8 -2018-10-10
CVE-2018-0054 QFX5000/EX4600 Series: Routing protocol flap upon receipt of high rate of Ethernet frames — Junos OS 7.1 -2018-10-10
CVE-2018-0055 Junos OS: jdhcpd process crash during processing of specially crafted DHCPv6 message — Junos OS 5.9 -2018-10-10
CVE-2018-0056 MX Series: L2ALD daemon may crash if a duplicate MAC is learned by two different interfaces — Junos OS 5.3 -2018-10-10
CVE-2018-0057 Junos OS: authd allows assignment of IP address requested by DHCP subscriber logging in with Option 50 (Requested IP Address) — Junos OS 9.6 -2018-10-10
CVE-2018-0058 MX Series: In BBE configurations, receipt of a crafted IPv6 exception packet causes a Denial of Service — Junos OS 7.5 -2018-10-10
CVE-2018-0059 ScreenOS: Stored Cross-Site Scripting (XSS) vulnerability — ScreenOS 5.4 -2018-10-10
CVE-2018-0060 Junos OS: Invalid IP/mask learned from DHCP server might cause device control daemon (dcd) process crash — Junos OS 5.9 -2018-10-10
CVE-2018-0061 Junos OS: Denial of service in telnetd — Junos OS 5.3 -2018-10-10
CVE-2018-0062 Junos OS: Denial of Service in J-Web — Junos OS 7.5 -2018-10-10
CVE-2018-0063 Junos OS: Nexthop index allocation failed: private index space exhausted after incoming ARP requests to management interface — Junos OS 6.5 -2018-10-10
CVE-2018-0024 Junos OS: A privilege escalation vulnerability exists where authenticated users with shell access can become root — Junos OS 7.8 -2018-07-11
CVE-2018-0025 Junos OS: SRX Series: Credentials exposed when using HTTP and HTTPS Firewall Pass-through User Authentication — Junos OSCWE-319 5.9 -2018-07-11

This page lists every published CVE security advisory associated with Juniper Networks. Each entry links to a detailed page with CVSS scoring, CWE classification, affected products and references. AI-generated Chinese analysis is provided for fast triage.