Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

Juniper Networks — Vulnerabilities & Security Advisories 893

Browse all 893 CVE security advisories affecting Juniper Networks. AI-powered Chinese analysis, POCs, and references for each vulnerability.

Juniper Networks operates as a global provider of networking hardware, software, and services, primarily focusing on enterprise and service provider infrastructure. With 893 recorded Common Vulnerabilities and Exposures, the company’s attack surface reflects the complexity of its extensive product portfolio. Historically, vulnerabilities in its systems have frequently involved remote code execution, cross-site scripting, and privilege escalation flaws, often stemming from input validation errors or improper access controls in management interfaces. Notable incidents include critical flaws in ScreenOS and Junos OS that allowed attackers to bypass authentication or execute arbitrary commands, highlighting risks in legacy and core routing platforms. These issues underscore the necessity for rigorous patch management and secure configuration practices. As a foundational element of global internet infrastructure, the security posture of Juniper Networks directly impacts the stability and integrity of connected networks worldwide, necessitating continuous monitoring and proactive defense strategies.

Found 12 results / 893Clear Filters
CVE IDTitleCVSSSeverityPublished
CVE-2019-0004 Juniper ATP: API and device keys are logged in a world-readable permissions file — Juniper ATPCWE-532 5.5 -2019-01-15
CVE-2019-0018 Juniper ATP: Persistent Cross-Site Scripting (XSS) vulnerability in file upload menu — Juniper ATP 5.4 -2019-01-15
CVE-2019-0020 Juniper ATP: Hard coded credentials used in Web Collector — Juniper ATPCWE-798 9.8 -2019-01-15
CVE-2019-0021 Juniper ATP: secret CLI inputs are logged to /var/log/syslog in clear text — Juniper ATPCWE-532 5.5 -2019-01-15
CVE-2019-0022 Juniper ATP: Two hard coded credentials sharing the same password give an attacker the ability to take control of any installation of the software. — Juniper ATPCWE-798 9.8 -2019-01-15
CVE-2019-0023 Juniper ATP: Persistent Cross-Site Scripting vulnerability in the Golden VM menu — Juniper ATP 5.4 -2019-01-15
CVE-2019-0024 Juniper ATP: Persistent Cross-Site Scripting vulnerability in the Email Collectors menu — Juniper ATP 5.4 -2019-01-15
CVE-2019-0025 Juniper ATP: Persistent Cross-Site Scripting vulnerability in RADIUS configuration menu — Juniper ATP 5.4 -2019-01-15
CVE-2019-0026 Juniper ATP: Persistent Cross-Site Scripting vulnerability in Zone configuration — Juniper ATP 5.4 -2019-01-15
CVE-2019-0027 Juniper ATP: Persistent Cross-Site Scripting vulnerability in Snort Rules configuration — Juniper ATP 5.4 -2019-01-15
CVE-2019-0029 Juniper ATP: Splunk credentials are in logged in clear text — Juniper ATP 7.8 -2019-01-15
CVE-2019-0030 Juniper ATP: Password hashing uses DES and a hardcoded salt — Juniper ATPCWE-327 9.8 -2019-01-15

This page lists every published CVE security advisory associated with Juniper Networks. Each entry links to a detailed page with CVSS scoring, CWE classification, affected products and references. AI-generated Chinese analysis is provided for fast triage.