Normal view
Before yesterdayJuniper Security Advisories
-
Juniper Security Advisories
- 2025-10 Security Bulletin: Junos Space: Multiple XSS vulnerabilities resolved in 24.1R4 release
-
Juniper Security Advisories
- 2025-10 Security Bulletin: Junos OS: When a user with the name ftp or anonymous is configured unauthenticated filesystem access is allowed (CVE-2025-59980)
-
Juniper Security Advisories
- 2025-10 Security Bulletin: Junos Space: Arbitrary file download vulnerability in web interface (CVE-2025-59976)
-
Juniper Security Advisories
- 2025-10 Security Bulletin: Junos Space Security Director: Multiple vulnerabilities resolved in 24.1R4
-
Juniper Security Advisories
- 2025-10 Security Bulletin: Junos Space: Multiple XSS vulnerabilities resolved in 24.1R4 release
-
Juniper Security Advisories
- 2025-10 Security Bulletin: Security Director Policy Enforcer: An unrestricted API allows a network-based unauthenticated attacker to deploy malicious vSRX images to VMWare NSX Server (CVE-2025-11198)
-
Juniper Security Advisories
- 2025-10 Security Bulletin: Junos Space: Flooding device with inbound API calls leads to WebUI and CLI management access DoS (CVE-2025-59975)
-
Juniper Security Advisories
- 2025-10 Security Bulletin: Junos Space: Reflected client-side HTTP parameter pollution vulnerability in web interface (CVE-2025-59977)
-
Juniper Security Advisories
- 2025-10 Security Bulletin: Junos Space: Arbitrary file download vulnerability in web interface (CVE-2025-59976)
-
Juniper Security Advisories
- 2025-10 Security Bulletin: Junos OS and Junos OS Evolved: Device allows login for user with expired password (CVE-2025-60010)
-
Juniper Security Advisories
- 2025-10 Security Bulletin: Junos OS: When a user with the name ftp or anonymous is configured unauthenticated filesystem access is allowed (CVE-2025-59980)
-
Juniper Security Advisories
- 2025-10 Security Bulletin: Junos OS and Junos OS Evolved: Specific BGP EVPN update message causes rpd crash (CVE-2025-60004)
-
Juniper Security Advisories
- 2025-10 Security Bulletin: Junos OS Evolved: Multiple OS command injection vulnerabilities fixed (CVE-2025-60006)
-
Juniper Security Advisories
- 2025-10 Security Bulletin: Juniper Security Director: Insufficient authorization for sensitive resources in web interface (CVE-2025-59968)
-
Juniper Security Advisories
- 2025-10 Security Bulletin: Junos OS Evolved: ACX7024, ACX7024X, ACX7100-32C, ACX7100-48L, ACX7348, ACX7509: When specific valid multicast traffic is received on the L3 interface on a vulnerable device evo-pfemand crashes and restarts (CVE-2025-59967)
-
Juniper Security Advisories
- 2025-10 Security Bulletin: Junos OS: SRX4700: When forwarding-options sampling is enabled any traffic destined to the RE will cause the forwarding line card to crash and restart (CVE-2025-59964)
-
Juniper Security Advisories
- 2025-10 Security Bulletin: Junos OS and Junos OS Evolved: With BGP sharding enabled, change in indirect next-hop can cause RPD crash (CVE-2025-59962)
-
Juniper Security Advisories
- 2025-10 Security Bulletin: Junos OS Evolved: PTX Series: When firewall filter rejects traffic these packets are erroneously sent to the RE (CVE-2025-59958)
-
Juniper Security Advisories
- 2025-10 Security Bulletin: Junos OS: EX4600 Series and QFX5000 Series: An attacker with physical access can open a persistent backdoor (CVE-2025-59957)